Paper On Storage Privacy Via Black-Box And Sanitizable Signature

Main Article Content

Ruchika P Dungarani
Rakesh Shah
Ketan Patel

Abstract

Storage privacy is basic need for security because today’s generation is become digital .Every person use internet for money transaction and other important document transformation. In this paper we use redactable signature and sanitizable signature for security. Sanitizable signature is used to modify the sensitive information of document by sanitizer and this was not known by the original signer. We use black-box for tighten security. We are going to apply this concept in black-box for better security. Sanitizable signature allow third party to do modification in signature.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Ruchika P Dungarani, Rakesh Shah, and Ketan Patel. “Paper On Storage Privacy Via Black-Box And Sanitizable Signature”. Technix International Journal for Engineering Research, vol. 3, no. 8, Aug. 2016, pp. 111-5, https://tijer.org/index.php/tijer/article/view/77.
Dimension
Section
Research Articles

References

“Blackbox: Distributed Peer-to-Peer File Storage and Backup” Payut Pantawongdecha,Isabella Tromba,Chelsea Voss,Gary Wang May 14, 2014

“Rethinking Privacy for Extended Sanitizable Xu, Anjia Yang, Jianying Zhou, and Duncan S. Wong

“A General Framework for Redactable Signatures and New Constructions” David Derler1z, Henrich C. P,ohls2;z;x, Kai Samelin3k, Daniel Slamanig1z

“Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures” Christina Brzuska, Henrich ohls, Kai Samelin

“Active Learning of Nondeterministic Finite State Machines” Warawoot Pacharoen, Toshiaki Aoki, Pattarasinee Bhattarakosol,and Athasit Surarerks

“An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection” Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl

“Sanitizable Signatures”Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros,and Gene Tsudik

“Black Box Backup System”Iyad Aldasouqi & Arafat Awajan International Daniel Slamanig International Conference, CANS 2016, Milan, Italy, November 14-16, 2016. Proceedings, Sara Foresti and Giuseppe Persiano Eds., Springer Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (3) : 2011 368

“A General Framework for Redactable Signatures and New Constructions”David Derler z, Henrich ohls, Kai Samelin, Daniel Slamanig

“ Research Design: Qualitative, Quantitative and Mixed Methods Approaches” ,J. W. Cresswell, 2nd. Ed. California: Sage Publications, Inc. 2002.

“Secure Privacy Preserving Public Auditing for Cloud storage” International Journal of Innovative Research in Science, Engineering Springer-Verlag 1998.

“Using Invariant Detection Mechanism in Black Box Inference” Muzammil Shahbaz and Roland Groz

“Cyber security, Innovation And The Internet Economy”The Department Of Commerce Internet Policy Task Force

“Lightweight Delegatable Proofs of Storage” Jia Fortran” Carla Guillen, Leibniz Supercomputing Centre 19th March 2015.

“Information security and privacy in healthcare:current state of research” Ajit Appari and M. Eric Johnson Int. J. Internet and Enterprise Management, Vol. 6, No. 4, 2010

“The Structure of a Programming Language Revolution”Richard P. Gabriel IBM,2010

“Design and Compilation of an Object-Oriented Microprogramming Language for Wireless Sensor Networks” Felix Jonathan Oppermann, Kay R omer, Luca Mottolayz, Gian Pietro Picco, Andrea Gaglione 978-1-4799-3784-4/14/$31.00 ©2014 IEEE

“Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing”David Derler, Stephan Krenn

“A Cipher Design with Automatic Key Generation using the Combination of Substitution and Transposition Techniques and Basic Arithmetic and Logic Operations” Govind Prasad Arya,Aayushi Nautiyal, Ashish Pant, Shiv Singh & Tishi Handa The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 1, No. 1, March-April 2013

“Recommendation for Cryptographic Key Generation” Allen Roginsky, Elaine Barker NIST Special Publication 800-133 December 2012

“Digital Steganography: A Symmetric Key Algorithm” Joshua C. Clark and Technology Sathiskumar R1, Dr.Jeberson Retnaraj

“On the Determinization of Weighted Finite Automata” Adam L. Buchsbaum, Raffaele Giancarlo, and Jeffery R. Westbrook To appear in Proc. 25th ICALP, Aalborg, Denmark, 1998.

“Eclipse: C/C++ Programming and Fortran” Carla Guillen, Leibniz Supercomputing Centre 19th March 2015

“BlackBox”,2014,Wikipedia,15July2016, <https://en.wikipedia.org/wiki/Black_box > [25]“Angluin’sLearningAlgorithmforDFA’s”,2012,sun.ac.za,viewed,2Aug2016<http://www.cs.sun.ac.za/rw711/2012term2/lectures12/112.pdf>

“8 Best Cloud Storage Providers For Corporate Privacy”, May 5, 2014, Hongkiat ,viewed20 Aug 2016 http://www.hongkiat.com /blog/8-best-cloud-storage-providers-for-corporate - data-privacy/

“Eclipse”,2016,eclipse,viewed 9 October 2016 < https://eclipse.org/>

“Cryptography”, Wikipedia, viewed 22 July 2016 https://en.wikipedia.org/ wiki/ Key_(cryptography) [29] Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security,Milan,Italy,September 12-14, 2005, Proceeding

“Redactable vs. Sanitizable Signatures” Kai Samelin, Henrich C., P ohls, Joachim Posegga, Hermann de Meer , Nov 2012