DigiSecure: Attribute-Based Document Transfer Solution

Authors

  • Trishna Panse Medi-Caps University, Indore, India
  • Prashant Panse Medi-Caps University, Indore, India
  • Reena Thakur Jhulelal Institute of Technology
  • Priyanka Dudhe Jhulelal Institute of Technology
  • Sudhir Shelke Guru Nanak Institute of Technology
  • Uma Patel Jhulelal Institute of Technology

Keywords:

Data Security, MD, Digital_Signature, Rivest, Shamir, Adleman Algorithm, Signature Built on Features, X.509Certificate

Abstract

There are two examples of techniques for guaranteeing user credentials and facts secrecy are authentication and cryptosystems. Message Digest is used to check the uniqueness and accurateness of data traveling over an open channel due to its one-way nature. It recognizes unauthorized alterations and additions to broadcasts. When it comes to document uniqueness and creator oneness, digital signatures frequently use hashing. It is categorized as an attribute-based signature (ABS) and is updated by including new details about the attributes of the users. We looked at many historical approaches to the ABS phenomenon and identified some problems that needed to be handled. As a result, we came up with a solution that lowers the level of difficulty, usage, and operating expense while still enabling signature production and confirmation. We proposed an original DigiSecure: Attribute-Based Document Transfer Solution for Transporting Digital Document to highlight the approach of digital signatures using foundations and their initial reason. The system has policy-based access security limitations as well as adaptable primitives that offer signing authority total control over signature generation. It safeguards the secrecy of signatures and has a first order logic that is message-based. Various advantages were found after rationally studying the method, and these advantages will soon be proven by implementing the solution over the suggested outline under the given significant component.

Downloads

Download data is not yet available.

References

Digital signing of original reports, By ALS Laboratories, Version 1 Published in 2010

James H. Davenport and Dalia Khader, “Digital signatures: What you are versus Who you are", in IACR Technical Review, 2010.

S Sharmila Deva Selvi, Subhashini Venugopalan and C. Pandu Rangan, “A New Approach to Threshold Attribute Based Signatures”, in Theoretical Computer Science Laboratory Department of Computer Science and Engineering Indian Institute of Technology, Madras, 2010.

Hemanta K. Maji, Manoj Prabhakaran and Mike Rosulek, Attribute-Based Signatures”, in Department of Computer Science, University of Illinois, Urbana-Champaign, 2010.

Piyi Yang , Tanveer A. Zia , Zhenfu Cao and Xiaolei Dong , “Efficient and expressive fully secure attribute-based signature in the standard model”, Australian Information Security Management Conference, Edith Cowan University, Dec 2011.

Javier Herranz, Fabien Laguillaumie, Benoit Libert and Carla Rafols, “Short Attribute- Based Signatures for Threshold Predicates”, in RSA Conference, San Francisco, United States, Springer, 2012.

Fugeng ZENG, Chunxiang XU, Qinyi LI and Xiujie ZHANG, “Attribute-based Signature Scheme with Constant Size Signature”, in Journal of Computational Information Systems, ISSN: 2875–2882, Vol 8, Issue 7, 2012.

Rupesh Vaishnav, “Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud”, in International Journal of Engineering Research & Technology (IJERT),ISSN: 2278-0181, Vol. 1 Issue 10, Dec 2012

Feng Cai, Wangmei Guo and Ximeng Liu,“Threshold attribute based universal designated verifier signature scheme in the standard model”, in WSEAS Transaction on Communications, ISSN: 2224-2864, Vol. 13, 2012.

Kefeng Wang, Yi Mu and Fuchun Guo, “Attribute-based signature with message recovery”, in Research Online Lecture Notes in Computer Science, University of Wollongong, 2014.

Brinda Hampiholi, Gergely Alpaar, Fabian van den Broek, and Bart Jacobs, Towards Practical Attribute-Based Signatures””, in Institute for Computing and Information Sciences, Radboud University, Nijmegen, The Netherlands, 2015

Essam Ghadafi, ”Decentralised Traceable Attribute Based Encryption”, Presentation in University College London, April 2015

Nigel Mc Kelvey , Kevin Curran and Nadarajah Subaginy , “The Internet of Things”, in IGI Global Journals, Category of Mobile and Wireless Computing, DOI: 10.4018/978-1- 4666-5888-2.ch570, 2005

S. Sicari, A. Rizzardi, L.A. Grieco and A. Coen-Porisini, “Security, Privacy & Trust in Internet of Things: the road ahead”, in Preprint submitted to Elsevier, Feb 2015.

Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li and Yang Xiang, Secure Outsourced Attribute-Based Signatures””, in IEEE Transaction on Parallel and Distributed Systems, ISSN: 1045-9219, VOL. 25, NO. 12, Dec 2014.

Vivek Kapoor et al.” An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication” International Journal of Computer Applications 50(7):45-50, July 2012.

Panse, P., Panse, T., Verma, R., Bhayal, D.K., Agrawal, A. (2019). An Edutainment Approach to Enhance Teaching–Learning Process. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore.

Mr. Bhushan Bandre, Ms. Rashmi Khalatkar. (2015). Impact of Data Mining Technique in Education Institutions. International Journal of New Practices in Management and Engineering, 4(02), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/35

Leo, L. M. ., Simla, A. J. ., Kumaran, J. C. ., Julalha, A. N. ., & Bhavani, R. . (2023). Blockchain based Automated Construction Model Accuracy Prediction using DeepQ Decision Tree. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 133–138. https://doi.org/10.17762/ijritcc.v11i1.6060

Janani, S., Dilip, R., Talukdar, S. B., Talukdar, V. B., Mishra, K. N., & Dhabliya, D. (2023). IoT and machine learning in smart city healthcare systems. Handbook of research on data-driven mathematical modeling in smart cities (pp. 262-279) doi:10.4018/978-1-6684-6408-3.ch014 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Panse, T. ., Panse, P. ., Thakur, R. ., Dudhe, P. ., Shelke, S. ., & Patel, U. . (2023). DigiSecure: Attribute-Based Document Transfer Solution. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 840–848. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3337

Issue

Section

Research Article