3,199 research outputs found

    A Novel Approach for Efficient User Revocation with Maintaining Shared Data Integrity on Cloud

    Get PDF
    Cloud computing is the biggest innovation in computing world. It provides great facilities of data sharing and data storing to its users. Here a main risk occurs as data security in aspects of data integrity, data privacy and data access by unauthorized users. TTA (Trusted Third Party) is used by cloud service providers to ensure data security and privacy. In cloud, data modification and data sharing among the group of users is very simple task .To maintain integrity of the shared data,group members needs to compute signatures on all shared data which are available in blocks. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. User revocation is one of the biggest security issue during data sharing. After user revocation, shared data signed by revoked user, needs to re-sign by existing user.This task is very inefficacious due to the large size of shared data needs to download before re-signing it. This paper is a detail description of cloud public auditor which is used for the maintaining integrity of shared data with efficient user revocation in the cloud. This mechanism uses concept of proxy re-signatures which allows the cloud to re-sign blocks on behalf of existing users during user revocation, so there is no need of data downloading. It also performs batch monitoring to verify multiple tasks simultaneously. DOI: 10.17762/ijritcc2321-8169.150612

    Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings

    Full text link
    We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage. With this technique, the signer receives a partial private key from a trusted authority and unblinds it to get his private key, in turn, overcomes the key escrow problem which is a constraint in most of the pairing-based proxy signature schemes. The scheme fulfills the necessary security requirements of proxy signature and resists other possible threats

    PKI Scalability Issues

    Full text link
    This report surveys different PKI technologies such as PKIX and SPKI and the issues of PKI that affect scalability. Much focus is spent on certificate revocation methodologies and status verification systems such as CRLs, Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation, OCSP, SCVP and DVCS.Comment: 23 pages, 2 figure

    A SCALABLE APPROACH TOWARDS MANAGEMENT OF CONSISTENT DATA IN CLOUD SETTING

    Get PDF
    A number of modern works spotlighted on preservation of identity privacy from public verifiers during auditing of shared data integrity. Towards ensuring of shared data integrity can be confirmed publicly, users within group need to work out signatures on the entire blocks in shared data. In our work we put forward Panda, which is a new public auditing method for the integrity of shared information with well-organized user revocation within cloud. This method is helpful and scalable, which indicates that it is not only competent to maintain a huge number of users to allocate data and but also proficient to handle numerous auditing tasks simultaneously with batch auditing. It is capable to sustain batch auditing by means of verifying numerous auditing tasks at the same time and is resourceful and secure for the duration of user revocation. By scheming of the proxy re-signature system with fine properties, which traditional proxy re-signatures do not contain, our method is constantly able to make sure reliability of shared data devoid of retrieving the total data from cloud

    3PAC: Enforcing Access Policies for Web Services

    Get PDF
    Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a service oriented architecture is not addressed adequately. We present a novel approach to the distribution and enforcement of credentials-based access policies for Web services (3PAC) which scales well and can be implemented in existing deployments
    • …
    corecore