Abstract
Though the widespread popularity of public clouds brought great channel of communication for sharing and retrieving data. The data is vulnerable to security threats as it is fully to the service provider side. So there must be lot many security checkpoints, a real world system should meet. So we are proposing an efficient method of authenticating the data by generating a group key through ID based digital signature approach where a group key is broadcasted to all the users in the group. After the authentication process the data members decrypt the data from the cloud and get their plain format back using Feistel algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jianying Zhou, Shaohua Tang, Li Xu, Yang Xiang, Xinyi Huang, Joseph K. Liu, Kaitai Liang, “Cost-Effective Authentic and Anonymous data sharing with forward security”, IEEE Transactions on computers, volume 64, 2015.
Anna C. Squicciarini, Dan Lin, and Smitha Sundareswaran, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transaction on a secure computing, volume 9, 2012.
S. Huang, A. Squicciarini, D. Lin, and S. Sundareswaran, “Promoting Distributed Accountability in the Cloud,” IEEE Transaction on Cloud Computing, 2011.
Jun’e Liu, Robert H. Deng and ZhiguoWan, “HASBE: A Hierarchical Attribute-Based Solution for flexible and Scalable Access Control in Cloud Computing.
P.-L. Cayrel, P. Gaborit, C. A. Melchor, and F. Laguillaumie. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 57(7):4833–4842, 2011.
M. Mowbray, S. Pearson, and Y. Shen, “A privacy Manager for Cloud Computing”, IEEE transaction on Cloud Computing, pp. 90–106, 2009.
A. Charlesworth, and S. Pearson, “Accountability as a Way Forward for Privacy Protection in the Cloud,” conf. Cloud Computing, 2009.
J.I. den Hartog, I. Staicu, G. Lenzini, S. Etalle, and R. Corin, “A Logic for Auditing Accountability in Decentralized Systems,” IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187–201, 2005.
A. Squicciarini, S. Sundareswaran and D. Lin, “Preventing Information Leakage from Indexing in the Cloud,” Proc. IEEE Int’l Conf. Cloud Computing, 2010.
B. Chun and A. C. Bavier, “Decentralized Trust Management and Accountability in Federated System,” Proc. Ann. Hawaii Int’l Conf. System Science (HICSS), 2004.
A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.
W. Lim and K. Paterson, “Multi-Key Hierarchical Identity-Based Signatures,” Proc. 11th IMA Int’l Conf. Cryptography and Coding (IMA ‟07), S. Galbraith, ed., pp. 384–402, Dec. 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aruna, J., Ashwani, D. (2017). Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_35
Download citation
DOI: https://doi.org/10.1007/978-981-10-3226-4_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3225-7
Online ISBN: 978-981-10-3226-4
eBook Packages: EngineeringEngineering (R0)