Main Reference PaperCost-Effective Authentic and Anonymous Data Sharing with Forward Security, IEEE Transactions on Computers, April 2014.
  • The scalability and flexibility of cloud is attracted by everyone. Data sharing and storing are facilitated in cloud. Due to its directness, data sharing is always deployed in a private environment and vulnerable to security threats. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. This project proposes a new idea called Forward Secure ID-Based Ring Signature. It allows an ID-Based ring signature to have forward security.

+ Description
  • The scalability and flexibility of cloud is attracted by everyone. Data sharing and storing are facilitated in cloud. Due to its directness, data sharing is always deployed in a private environment and vulnerable to security threats. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. This project proposes a new idea called Forward Secure ID-Based Ring Signature. It allows an ID-Based ring signature to have forward security.

  • To provide security in data sharing

  • To provide cost-effective forward security

+ Aim & Objectives
  • To provide security in data sharing

  • To provide cost-effective forward security

  • Identity-based (ID-based) cryptosystem eliminates the process of verifying and validating the public key certificates. Forward Secure ID-Based signature (IDFSRS) eliminates the costly verification. A private key generator (PKG) computes private keys from its master secret for users and associates an implicit public key to each user within the system. It does not need any pairing operations. The size of user secret key is just one integer.

+ Contribution
  • Identity-based (ID-based) cryptosystem eliminates the process of verifying and validating the public key certificates. Forward Secure ID-Based signature (IDFSRS) eliminates the costly verification. A private key generator (PKG) computes private keys from its master secret for users and associates an implicit public key to each user within the system. It does not need any pairing operations. The size of user secret key is just one integer.

  • Java JDK 1.8, MySQL

  • Netbeans 8.0.1, J2SE, (Cloudsim).

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL

  • Netbeans 8.0.1, J2SE, (Cloudsim).

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.