scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Identity anonymization and secure data storage using group signature in private cloud

03 Aug 2012-pp 129-132
TL;DR: In this paper a method for identity anonymization and secure data storage in private cloud using GDS (Group Digital Signature) is proposed and implemented.
Abstract: Cloud computing is completely about productivity, economy, and corporate agility. But there raises a question how we can commercially attain those benefits if their cloud management solution becomes inefficient, incomplete, and inflexible. Even though there are many aspects in cloud environment. The data security, confidentiality and privacy plays a major role in cloud deployment model. In case of private cloud the identity anonymization and secured data storage becomes essential to address. But we as developers of cloud can maintain the cloud with perfect methods and protocols which make the cloud service delivery more efficient, productive, and agile. In this paper a method for identity anonymization and secure data storage in private cloud using GDS (Group Digital Signature) is proposed and implemented.
Citations
More filters
Journal ArticleDOI
TL;DR: In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users.
Abstract: In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

6 citations


Cites methods from "Identity anonymization and secure d..."

  • ...In [10], the authors proposed a method for anonymity using group digital signature technology....

    [...]

Proceedings Article
16 Mar 2016
TL;DR: This paper reviews the currently used authentication techniques, methods, mechanisms and protocols for the prevailing state of theart in the field for efficiency perspective in view of ever increasing usage of authentication.
Abstract: Internet is now a vital tool for every field today. Every sphere of individuals, groups, business, trade, government is regulated by safety measures for their activities in the online world. E-cash and identity documents needs varied authorization and certification to be able to access with certain degree of validity. However, privacy and security of any entity in the digital world is inevitably threatened in one or the other way. In order, authentication is underway for verifying the individual's entity who wants to access the resources of a system. However, there is a trade-off between the usability and the security of such approaches. This paper reviews the currently used authentication techniques, methods, mechanisms and protocols for the prevailing state of-the-art in the field. Finding a little or no evident interest on efficiency aspect by researchers, it appeared pertinent to take a look from efficiency perspective in view of ever increasing usage of authentication. In turn, some cues on efficiency aspect are derived, which can result in development of effective as well as efficient authentication measures.

6 citations


Cites methods from "Identity anonymization and secure d..."

  • ...These techniques prevent the data from various attacks like man in the middle, phishing, brute force, denial of service attacks and many more....

    [...]

Proceedings ArticleDOI
24 Jul 2017
TL;DR: This work enhances the security of cloud storage systems through a formal analysis of a cloud storage protocol based on ABS and ABE schemes and clarifies several ambiguities in the design and model the protocol and its security properties with ProVerif an automatic tool for the verification of cryptographic protocols.
Abstract: Cloud storage provides an attractive solution for many organisations and enterprises due to its features such as scalability, availability and reduced costs. However, storing data in the cloud is challenging if we want to ensure data security and user privacy. To address these security issues cryptographic protocols are usually used. Such protocols rely on cryptographic primitives which have to guarantee some security properties such that data and user privacy or authentication. Attribute-based signature (ABS) and attribute-based encryption (ABE) are very adapted for storing data on an untrusted remote entity. In this work, we enhance the security of cloud storage systems through a formal analysis of a cloud storage protocol based on ABS and ABE schemes. We clarify several ambiguities in the design of this protocol and model the protocol and its security properties with ProVerif an automatic tool for the verification of cryptographic protocols. We discover an unknown attack against user privacy in the Ruj et al. (2012) protocol. We propose a correction, and automatically prove the security of the corrected protocol with ProVerif.

5 citations

Patent
26 Mar 2014
TL;DR: In this paper, a permutation function π randomizes the order that regions S 1 S 2,...., S t in the partitioned space S are stored so that an adversary cannot obtain information by observing the data being stored in particular regions.
Abstract: Techniques are provided for anonymizing streamed data. In various embodiments data are anonymized by receiving a data element ( p i , s i ) of a data stream, where P i comprises an identifying portion and s i , comprises associated sensitive information; assigning the identifying portion, p i , to a region S i , of a partitioned space S ; encrypting the associated sensitive information s i , as e { s i ); and storing the encrypted associated sensitive information e( s i ) in a list associated with the assigned region S i ,·. Optionally a permutation function π randomizes the order that regions S 1 S 2 , ...., S t in the partitioned space S are stored so that an adversary cannot obtain information by observing the data being stored in particular regions. The regions S 1 , S 2 ,..., S t have corresponding center points C 1 , C 2 , C t , and a nearest center C i , to p i is optionally determined. The encrypted associated sensitive information e ( s i ) may be stored in a list associated with the nearest center C i .

5 citations

Proceedings ArticleDOI
05 Mar 2015
TL;DR: This paper presents identity management issues in cloud and also review the existing approaches to provide secure Identity management(IdM) system.
Abstract: The role of cloud computing in today's world of globalization has seen major contribution for application development and deployment. Many enterprise see cloud computing as a platform for organizational and economic benefit. Cloud computing offers many businesses a new way of accessing computing services. Nevertheless, this has also exposed the organizations to a range of risks which they are unaware of. In this paper, we present identity management issues in cloud and also review the existing approaches to provide secure Identity management(IdM) system.

3 citations


Cites methods from "Identity anonymization and secure d..."

  • ...The Cloud Security Alhanc � � ecommend � cloud provider to provide stronger authentIcatIOn mechamsm and also (optionally) allow users to use third party identity management and single sign-on platforms like Microsoft Passport[2]....

    [...]

  • ...Group signature is a new approach for securing the user data[2] ....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Abstract: Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

14,980 citations


"Identity anonymization and secure d..." refers background in this paper

  • ...The DH (Diffie-Hellman) is a key distribution algorithm that helps two users to share secret key between them without the need to exchange the secret key[5]....

    [...]

Journal ArticleDOI
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

14,659 citations

Proceedings Article
08 Apr 1991
TL;DR: A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
Abstract: In this paper we present a new type of signature for a group of persons, called a group signature, which has the following properties: (i) only members of the group can sign messages; (ii) the receiver can verify that it is a valid group signature, but cannot discover which group member made it; (iii) if necessary, the signature can be "opened", so that the person who signed the message is revealed. The group signatures are a "generalization" of the credential/ membership authentication schemes, in which one person proves that he belongs to a certain group. We present four schemes that satisfy the properties above. Not all these schemes arc based on the same cryptographic assumption. In some of the schemes a trusted centre is only needed during the setup; and in other schemes, each pason can create the group he belongs to.

1,853 citations

Journal ArticleDOI
01 May 1988
TL;DR: The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard.
Abstract: The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard during the early 1970s, the controversy regarding the proposed standard during the mid-1970s, the growing acceptance and use of the standard in the 1980s, and some recent developments that could affect its future. >

222 citations

Proceedings ArticleDOI
01 Nov 2009
TL;DR: A study of the two popular encryption algorithms: DES and Blowfish, overviewed the base functions and analyzed the security for both algorithms, and evaluated performance in execution speed based on different memory sizes.
Abstract: With the rapid growing of internet and networks applications, data security becomes more important than ever before. Encryption algorithms play a crucial role in information security systems. In this paper, we have a study of the two popular encryption algorithms: DES and Blowfish. We overviewed the base functions and analyzed the security for both algorithms. We also evaluated performance in execution speed based on different memory sizes and compared them. The experimental results show the relationship between function run speed and memory size.

138 citations