Effective Data Sharing with Forward Security, Identity Based Ring Signature Using HMAC
Freedom of speech is one of the basic human rights, but in today’s world with the boom of technology and use of
internet, the use of data sharing is correspondingly important. The number of users in the internet has got increased to 300%
in nine years. Also, more than 60% of today’s data on the internet which is shared, is uploaded in the last three years of time.
The number of users has increased, so the data usage has increased. The security of data and the individual is equally of
importance with the part of data sharing. This bring anonymity of the individual to be considered as of prime importance, as
the saying goes; give a man a mask, and he will tell you the truth. There is no system in place to help with these
requirements. The PKI system has a bottleneck to support such a vast number of users and their data. The identity based ring
signature can be used instead to overcome this by excluding the part of certificate verification, as it makes use of identity
signature instead, which speeds up the process. Forward security is implemented along with identity ring signature to
advance the data security, which helps to eliminate the flaws of any big data sharing system where the revocation mechanism
is used. This property helps when a key of a single user is compromised for a specific data, then still the past and future
signatures for that user will remain valid and secure, also the other users will be unaffected. This is very important as its very
hard to ask a huge number of users to reauthenticate their data in the time of such crisis. Therefore, to preserve data integrity,
giving user anonymity, and support notion of forward security we propose an identity based ring signature implemented by
HMAC with forward security.
Keywords: Cloud Computing, Data Sharing, Identity Based Ring Signature, Forward Security.