Users online: 1605    [ij] [ij] [ij] 
Email id

Research Journal of Pharmacy and Technology
Year : 2017, Volume : 10, Issue : 1
First page : ( 65) Last page : ( 69)
Print ISSN : 0974-3618. Online ISSN : 0974-360X.
Article DOI : 10.5958/0974-360X.2017.00016.6

Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment

Leeladhar A*, Prabadevi B

School of Information Technology and Engineering, VIT University, Vellore

*Corresponding Author E-mail: annepuleeladhar@yahoo.com, prabadevi.b@vit.ac.in

Online published on 29 April, 2017.


Sharing of Information has a number of problems, comprising integrity, information efficiency and safekeeping of data owner in cloud computing. Ring Signature methods are favorable choice to build an unidentified and authentic information sharing system. Ring have no managers, no setup systems, no denial systems, and no coordination: some person can pick any set of members that take account of himself, and sign message by making use of his secret key and the others ’public keys, without getting their approval. By using Ring signatures we can leak top-secret information in an anonymous way. In the proposed Id-based ring signature the certificate validation process has been removed which is more cost effective. In this project we improved security in ring by implementing time slots i.e. if a super key of any user has lost then there is no need to change all the users’ keys including the lost key user. Security re-confirmation is avoided in ring Signature by using SHA Algorithm. We have also expanded the level of security in diminished time, easy and effective manner.



Cloud computing, signature, data owner, time slots, authentication.


║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
596,219,482 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.