Smart E-Auction Based on Forward Security for Authentic & Anonymous Data Sharing with Auditing Integrity

Vidya A. Gaikwad, Sachin D. Babar


In digital era, the E-Auction systems provide the
platform to auction the different types of items with less flexibility.
In day-to-day life the information sharing is more demanding over
the cloud computing and precise survey of shared information is
more useful to individuals as well as society. The sharing of data
may incur issues like integrity of data, effectiveness and protection
of information owner. To develop Smart E-Auction with anonymous
and authentic information sharing, the use of ring signature is a
guaranteed scheme where the owners of data confirm their
information which can be kept on cloud for analytical purposes. The
excessive testament check in conventional PKI (Public key
infrastructure) becomes the problem. The use of forward ring ID
signature security eliminates the efforts required for verification of
certificates. The add-on of third party auditor with smart E-auction
evaluates and prevents the risk of cloud storage services.

Full Text:



X. Huang, J. K. Liu, S. Tang, Yang Xiang, Kaitai Liang, Li Xu and

Jianying Zhou. Cost-Effective Authentic and Anonymous Data Sharing

with Forward Security, IEEE Trans. on Computers, VOL. 64, NO. 4,

APRIL 2015.

M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety

of Keys. In ASIACRYPT 2002, volume 2501 of Lecture Notes in

Computer Science, pages 415–432. Springer, 2002.

G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and

Provably Secure Coalition-Resistant Group Signature Scheme. In

CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science,

pages 255–270. Springer, 2000.

B. Wang, B. Li, and H. Li, Oruta: Privacy-Preserving Public Auditing for

Shared Data in the Cloud, Proc. IEEE Fifth Intl Conf. Cloud Computing,

pp. 295-302, 2012.

M. Bellare and S. Miner. A forward-secure digital signature scheme. In

Crypto’99, volume 1666 of Lecture Notes in Computer Science, pages

–448. Springer-Verlag, 1999.

J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau.

Security and privacy-enhancing multicloud architectures. IEEE Trans.

Dependable Sec. Comput., 10(4):212–224, 2013.

A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature

schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.

M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. “Id-based ring signature

scheme secure in the standard model.” In IWSEC,volume 4266 of Lecture

Notes in Computer Science, pages 1–16.Springer, 2006.

S. S. M. Chow, V. K.-W. Wei, J. K. Liu, and T. H. Yuen. “Ring signatures

without random oracles.” In ASIACCS, pages 297–302.ACM, 2006.

C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou,”Privacypreserving

public auditing for secure cloud storage”,IEEE Trans. Comput.,

vol. 62, no. 2, pp. 362-375, 2013.

M. K. Franklin, M. K. Reiter, “The Design and Implementation of a secure

auction service”, IEEE Trans. Software Engineering, vol. 22, no.5, May

Wu CC, Chang CC, Lin IC., “New Sealed-Bid Electronic Auction with

Fairness, Security and Efficiency”, JOURNAL OF COMPUTER

SCIENCE AND TECHNOLOGY 23(2): 253–264 Mar. 2008.


  • There are currently no refbacks.

Copyright © IJETT, International Journal on Emerging Trends in Technology