An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 2, Issue 3
Abstract
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order. If a receiver wants to retrieve a message when he is using a system with limited bandwidth, CPU and memory, then the ESC scheme may not work well. The computational cost for decryption is too high, because the receiver does not perform any partial decipherment. Based on the RSA signature, a Trapdoor Commitment scheme is proposed to improve the security level. This scheme allows the receiver to create a short trapdoor and send it to the Cloud Service Provider (CSP) before retrieving files or messages for finding out part of the cipher text. This scheme allows the sender to participate in the partial signature, so as to reduce the computational cost.
Authors and Affiliations
Palanikkumar D, Sowmya varshini M
An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages i...
Tree Based Scalable Secure Group CommunicationV-parameter Study of Silica-Air 1D Photonic Crystal Fiber by Modulating Geometrical Parameters at Different Optical Communication Ranges
In order to establish a group communication, a common key must be available with all the members of the group. The group key can be used for encrypting data between the group members or restricting access to the resource...
Towards Realization of Large-Scale Botnet Probing Events
Today?s attack scenery is governed by Botnets. Botnet refer to a group of bots?a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious program...
Efficient Application of Selected Mapping with Clipping for PAPR Reduction in OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is an inimitable technology in wireless communication. High peak-to-average power ratio (PAPR) is a challenging issue in OFDM system. Large PAPR results in significant di...
Performance Comparison of Adaptive and Blind Equalization Algorithms for Wireless Communication
Adaptive equalization is a well known method to minimize the Inter-Symbol Interference (ISI) in wireless communication. Often, adaptive algorithm requires transmission of known training sequence to track the time varying...