UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 5
May-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRFX06005


Registration ID:
516886

Page Number

25-28

Share This Article


Jetir RMS

Title

Enhancing Cost-Effective Anonymous Data Sharing through Improved Authentication

Abstract

Cloud computing, commonly referred to as "the cloud," provides users with instant access to remote servers, networks, and data centers, enabling the analysis of data in a way that is beneficial to society and individuals. However, sharing data with multiple parties can present problems related to efficiency, data integrity, and owner privacy. One potential solution is the use of ring signatures to create an anonymous and trustworthy data-sharing system. For cloud-based analytics, this enables data owners to verify their data anonymously. Identity-based (ID) ring signatures are gaining popularity as an alternative to traditional public-key encryption (PKI), as the time and cost of verifying certificates is a bottleneck in PKI. The research found that encrypting ID-based ring signatures with a variant of SHA-384 and adding forward security significantly increases their security. The padding technique in newer versions of SHA divides the input text into 512-byte blocks and appends the length as a 48-bit number at the end of the hash, which ensures that signatures created with a compromised secret key are still valid. This feature is crucial for large-scale data sharing systems, as it is difficult to require all data owners to re-verify their data if a single user's secret key is compromised. The paper describes a practical and effective implementation of this method, validates its security, and provides a proof of concept. The upgraded SHA-384 approach has proven to be safer for anonymous data exchange in the cloud.

Key Words

Cloud computing, Remote servers, SHA-384, Forward security, Anonymous data exchange, Valid signatures.

Cite This Article

"Enhancing Cost-Effective Anonymous Data Sharing through Improved Authentication", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 5, page no.25-28, May-2023, Available :http://www.jetir.org/papers/JETIRFX06005.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Enhancing Cost-Effective Anonymous Data Sharing through Improved Authentication", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 5, page no. pp25-28, May-2023, Available at : http://www.jetir.org/papers/JETIRFX06005.pdf

Publication Details

Published Paper ID: JETIRFX06005
Registration ID: 516886
Published In: Volume 10 | Issue 5 | Year May-2023
DOI (Digital Object Identifier):
Page No: 25-28
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00090

Print This Page

Current Call For Paper

Jetir RMS