Development of Enhanced Cloud File Sharing Security with eID Token-Based Trust Mechanisms

Authors

  • Umang Chaudhary Research Scholar, JP Institute of Engineering and Technology, Meerut, India Author
  • Ayan Rajput Assistant Professor JP Institute of Engineering and Technology, Meerut, India Author

Keywords:

Electronic identities, privacy, mobile eID, requirements

Abstract

Numerous systems provide users an electronic identification (eID) for document signing or online service authentication (e.g., governmental eIDs, OpenID). Current solutions, however, fail to provide adequate methods for using them as conventional ID cards that digitally verify their holders to another individual in the actual realm. We foresee a comprehensive mobile eID that offers this capability while safeguarding privacy, meets the stringent security standards for governmental identities (such as driver's licenses and passports), and is applicable in the private sector (e.g., as loyalty cards). This study delineates possible applications for a flexible and privacy-preserving mobile eID and examines the notion of privacy-preserving attribute searches. Additionally, we delineate essential functional, mobility, security, and privacy needs, and provide a concise review of alternative methodologies to address each of them.

Downloads

Download data is not yet available.

References

J. Bringer, H. Chabanne, R. Lescuyer, and A. Patey. Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. In Financial Cryptography and Data Security, pages 255–272. Springer, 2014.

J. Bringer, H. Chabanne, R. Lescuyer, and A. Patey. Hierarchical Identities from Group Signatures and Pseudonymous Signatures. In The New Codebreakers, pages 457–469. Springer, 2016.

BSI. Kryptographische Verfahren: Empfehlungen und Schlu¨ssella¨ngen. Technical Report TR-02102-1 v2016-1, Feb. 2016.

J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology, CRYPTO ’97, pages 410–424. Springer, Aug. 1997.

D. Chaum and E. Van Heyst. Group signatures. In Advances in Cryptology, EUROCRYPT ’91, pages 257–265. Springer, 1991.

M. H¨olzl, E. Asnake, R. Mayrhofer, and M. Roland. A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC), 11:374–397, Oct. 2015.

V. Kumar, H. Li, J.-M. J. Park, K. Bian, and Y. Yang. Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. In Proc. CCS 2015, pages 1334–1345. ACM, 2015.

A. Lehmann et al. Survey and Analysis of Existing eID and Credential Systems. FutureID Deliverable D32.1, Apr. 2013.

W. Lueks, G. Alpa´r, J.-H. Hoepman, and P. Vullers. Fast revocation of attribute-based credentials for both users and verifiers. In ICT Systems Security and Privacy Protection, pages 463–478. Springer, 2015.

H. K. Maji, M. Prabhakaran, and M. Rosulek. Attribute-Based Signatures. In Topics in Cryptology, CT-RSA 2011, pages 376–392. Springer, Feb. 2011.

T. Nakanishi and N. Funabiki. Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. In Advances in Cryptology, ASIACRYPT 2005, pages 533–548.

Springer, Dec. 2005.

T. Nyman, J.-E. Ekberg, and N. Asokan. Citizen electronic identities using TPM 2.0. In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pages 37–48. ACM, 2014.

Downloads

Published

05-07-2025

Issue

Section

Research Articles

How to Cite

[1]
Umang Chaudhary and Ayan Rajput, “Development of Enhanced Cloud File Sharing Security with eID Token-Based Trust Mechanisms”, Int J Sci Res Sci Eng Technol, vol. 12, no. 4, pp. 06–14, Jul. 2025, Accessed: Jul. 14, 2025. [Online]. Available: https://www.ijsrset.com/index.php/home/article/view/IJSRSET2512413