Smart E-Auction Based on Forward Security for Authentic & Anonymous Data Sharing with Auditing Integrity
Abstract
In digital era, the E-Auction systems provide the
platform to auction the different types of items with less flexibility.
In day-to-day life the information sharing is more demanding over
the cloud computing and precise survey of shared information is
more useful to individuals as well as society. The sharing of data
may incur issues like integrity of data, effectiveness and protection
of information owner. To develop Smart E-Auction with anonymous
and authentic information sharing, the use of ring signature is a
guaranteed scheme where the owners of data confirm their
information which can be kept on cloud for analytical purposes. The
excessive testament check in conventional PKI (Public key
infrastructure) becomes the problem. The use of forward ring ID
signature security eliminates the efforts required for verification of
certificates. The add-on of third party auditor with smart E-auction
evaluates and prevents the risk of cloud storage services.
Full Text:
PDFReferences
X. Huang, J. K. Liu, S. Tang, Yang Xiang, Kaitai Liang, Li Xu and
Jianying Zhou. Cost-Effective Authentic and Anonymous Data Sharing
with Forward Security, IEEE Trans. on Computers, VOL. 64, NO. 4,
APRIL 2015.
M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety
of Keys. In ASIACRYPT 2002, volume 2501 of Lecture Notes in
Computer Science, pages 415–432. Springer, 2002.
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and
Provably Secure Coalition-Resistant Group Signature Scheme. In
CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science,
pages 255–270. Springer, 2000.
B. Wang, B. Li, and H. Li, Oruta: Privacy-Preserving Public Auditing for
Shared Data in the Cloud, Proc. IEEE Fifth Intl Conf. Cloud Computing,
pp. 295-302, 2012.
M. Bellare and S. Miner. A forward-secure digital signature scheme. In
Crypto’99, volume 1666 of Lecture Notes in Computer Science, pages
–448. Springer-Verlag, 1999.
J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau.
Security and privacy-enhancing multicloud architectures. IEEE Trans.
Dependable Sec. Comput., 10(4):212–224, 2013.
A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature
schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.
M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. “Id-based ring signature
scheme secure in the standard model.” In IWSEC,volume 4266 of Lecture
Notes in Computer Science, pages 1–16.Springer, 2006.
S. S. M. Chow, V. K.-W. Wei, J. K. Liu, and T. H. Yuen. “Ring signatures
without random oracles.” In ASIACCS, pages 297–302.ACM, 2006.
C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou,”Privacypreserving
public auditing for secure cloud storage”,IEEE Trans. Comput.,
vol. 62, no. 2, pp. 362-375, 2013.
M. K. Franklin, M. K. Reiter, “The Design and Implementation of a secure
auction service”, IEEE Trans. Software Engineering, vol. 22, no.5, May
Wu CC, Chang CC, Lin IC., “New Sealed-Bid Electronic Auction with
Fairness, Security and Efficiency”, JOURNAL OF COMPUTER
SCIENCE AND TECHNOLOGY 23(2): 253–264 Mar. 2008.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology