Skip to main content

Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing

  • Conference paper
  • First Online:
Computer Communication, Networking and Internet Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 5))

Abstract

Though the widespread popularity of public clouds brought great channel of communication for sharing and retrieving data. The data is vulnerable to security threats as it is fully to the service provider side. So there must be lot many security checkpoints, a real world system should meet. So we are proposing an efficient method of authenticating the data by generating a group key through ID based digital signature approach where a group key is broadcasted to all the users in the group. After the authentication process the data members decrypt the data from the cloud and get their plain format back using Feistel algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jianying Zhou, Shaohua Tang, Li Xu, Yang Xiang, Xinyi Huang, Joseph K. Liu, Kaitai Liang, “Cost-Effective Authentic and Anonymous data sharing with forward security”, IEEE Transactions on computers, volume 64, 2015.

    Google Scholar 

  2. Anna C. Squicciarini, Dan Lin, and Smitha Sundareswaran, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transaction on a secure computing, volume 9, 2012.

    Google Scholar 

  3. S. Huang, A. Squicciarini, D. Lin, and S. Sundareswaran, “Promoting Distributed Accountability in the Cloud,” IEEE Transaction on Cloud Computing, 2011.

    Google Scholar 

  4. Jun’e Liu, Robert H. Deng and ZhiguoWan, “HASBE: A Hierarchical Attribute-Based Solution for flexible and Scalable Access Control in Cloud Computing.

    Google Scholar 

  5. P.-L. Cayrel, P. Gaborit, C. A. Melchor, and F. Laguillaumie. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 57(7):4833–4842, 2011.

    Google Scholar 

  6. M. Mowbray, S. Pearson, and Y. Shen, “A privacy Manager for Cloud Computing”, IEEE transaction on Cloud Computing, pp. 90–106, 2009.

    Google Scholar 

  7. A. Charlesworth, and S. Pearson, “Accountability as a Way Forward for Privacy Protection in the Cloud,” conf. Cloud Computing, 2009.

    Google Scholar 

  8. J.I. den Hartog, I. Staicu, G. Lenzini, S. Etalle, and R. Corin, “A Logic for Auditing Accountability in Decentralized Systems,” IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187–201, 2005.

    Google Scholar 

  9. A. Squicciarini, S. Sundareswaran and D. Lin, “Preventing Information Leakage from Indexing in the Cloud,” Proc. IEEE Int’l Conf. Cloud Computing, 2010.

    Google Scholar 

  10. B. Chun and A. C. Bavier, “Decentralized Trust Management and Accountability in Federated System,” Proc. Ann. Hawaii Int’l Conf. System Science (HICSS), 2004.

    Google Scholar 

  11. A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.

    Google Scholar 

  12. W. Lim and K. Paterson, “Multi-Key Hierarchical Identity-Based Signatures,” Proc. 11th IMA Int’l Conf. Cryptography and Coding (IMA ‟07), S. Galbraith, ed., pp. 384–402, Dec. 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juluru Aruna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Aruna, J., Ashwani, D. (2017). Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3226-4_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3225-7

  • Online ISBN: 978-981-10-3226-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics