31 research outputs found
Cloud Data Auditing Using Proofs of Retrievability
Cloud servers offer data outsourcing facility to their clients. A client
outsources her data without having any copy at her end. Therefore, she needs a
guarantee that her data are not modified by the server which may be malicious.
Data auditing is performed on the outsourced data to resolve this issue.
Moreover, the client may want all her data to be stored untampered. In this
chapter, we describe proofs of retrievability (POR) that convince the client
about the integrity of all her data.Comment: A version has been published as a book chapter in Guide to Security
Assurance for Cloud Computing (Springer International Publishing Switzerland
2015
On the difficult tradeoff between security and privacy: Challenges for the management of digital identities
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_39The deployment of security measures can lead in many occasions
to an infringement of users’ privacy. Indeed, nowadays we have
many examples about surveillance programs or personal data breaches
in online service providers. In order to avoid the latter problem, we need
to establish security measures that do not involve a violation of privacy
rights. In this communication we discuss the main challenges when conciliating
information security and users’ privacy.This work was supported by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE)
Separable and anonymous identity-based key issuing
In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio
Non-conventional digital signatures and their implementations – A review
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_36The current technological scenario determines a profileration
of trust domains, which are usually defined by validating the digital
identity linked to each user. This validation entails critical assumptions
about the way users’ privacy is handled, and this calls for new methods
to construct and treat digital identities. Considering cryptography,
identity management has been constructed and managed through conventional
digital signatures. Nowadays, new types of digital signatures
are required, and this transition should be guided by rigorous evaluation
of the theoretical basis, but also by the selection of properly verified software
means. This latter point is the core of this paper. We analyse the
main non-conventional digital signatures that could endorse an adequate
tradeoff betweeen security and privacy. This discussion is focused on
practical software solutions that are already implemented and available
online. The goal is to help security system designers to discern identity
management functionalities through standard cryptographic software libraries.This work was supported by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE) and the Spanish Government project TIN2010-19607
TRANSPARENT SECURITY OF PRODUCTIVE RELIABLE AND UNAUTHORIZED DATA SHARING
Because of its liability, picture shingle is continually correlated inside a belligerent locale and be subjected to quite a few threats of pact. Shackles of information was don't hold your breath been clear-cut using the improvements of distort computing, and a precise investigation on mutual experiments enjoin be offering many benefits to the institute. In our responsibility we start a recent perception of deliver safeguard Identity-primarily based pull trademark, that is indispensable utensil in behalf of structures Onate profitable tried-and-true in addition secret arrangement of knowledge atinkle. The arrangement allows a theory of equality primarily based bang autograph blueprint to consist of express redemption and may be the primo in literature to smother this selection in behalf of jangle mark in identification based mostly stage setting. In our take we move up contract of integrity primarily based bang mark using foundation of assist aegis. The address solid Identity-based mostly clang autograph is a likeness primarily based location and during this manner, withdrawal of pricey certificate certification practice catch on safe and befitting for interpretation of massive evidence
CONTROL-CURRENT ACCURATE AND SECRET TRUTHS ALLOCATION WITH ADVANCING SAFETY
Due to its openness, data speaking about is continually organized within the hostile setting and uncovered to numerous challenges of security. Speaking about of understanding wasn't have you been simple while using the advancements of cloud computing, along with an exact analysis on shared data provides you with several strengths for that society. Within our work we commence a manuscript idea of forward secure Identity-based ring signature, that's necessary tool for structuring cost-effective reliable furthermore to anonymous system of understanding speaking about. The unit permits an idea of identity based ring signature plan to incorporate forward security the initial in literature to contain this selection for ring signature in identity based setting. Within our work we advance security of identity based ring signature by way of provision of forward security. The forward guaranteed Identity-based ring signature is definitely an name based setting plus this process, removal of pricey certificate verification procedure can make it reliable and suitable for analysis of massive data
Group-oriented ring signature
In this paper, we present an improved Rivest\u27s ring signature scheme. In our scheme, the size of the signature is only related to the ring members, and the signer needs no to publish amount of random numbers. On this basis, we propose a group-oriented ring signature. In this scheme, only the person who belongs to the designated group can verify the validity of the ring signature. The security of these two schemes can be proved by using Forking Lemmas