A Secure Cloud Based Digital Signature Application for IoT

A Secure Cloud Based Digital Signature Application for IoT

Sahar A. El-Rahman (Benha University, Cairo, Egypt & Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Daniyah Aldawsari (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Mona Aldosari (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Omaimah Alrashed (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia) and Ghadeer Alsubaie (Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia)
Copyright: © 2018 |Pages: 19
DOI: 10.4018/IJESMA.2018070103

Abstract

IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain with the growth of IoT and the speed of the life. Different algorithms were utilized to accomplish the integrity of the documents, authenticate users with their unique signatures, and encrypt their documents in order to provide the best adopted solution for cloud-based signature in the field of IoT. Where, ECDSA (Elliptic Curve Digital Signature Algorithm) is utilized to ensure the message source, Hash function (SHA-512) is used to detect all information variations, and AES (Advanced Encryption Standard) is utilized for more security. SignOn is considered as a legal obligated way of signing contracts and documents, keeping the data in electronic form in a secure cloud environment and shortens the duration of the signing process. Whereas, it allows the user to sign electronic documents and then, the verifier can validate the produced signature.
Article Preview
Top

1. Introduction

The vast evolution of the communication and networks in the last two decades changed the way our world works drastically (Srivastava, 2013). Using signature in paper transactions has been spread over the last years as a way of gaining assurance of the identity and authority of the parties involved in a contract (Sumroy and Sherrard, 2012). Electronic communication methods such as Email and the Internet make it potential to execute contracts. The most important formal requirements are the signature; therefore, a contract requiring a signature need to be able to do so electronically (Laborde, 2010). Digital Signature that is defined as an electronic data that is logically associated with or attached to other data in electronic form and that is considered as an authentication method (United Nations Publication, 2009). Also, a digital signature is an arithmetical model used to validate the authenticity and integrity of a digital document, message, or software (Martoni and Palmirani, 2013). Including assurance as to its authenticity even if later the verifying party or signer tries to deny (Chiranth and Shashikala, 2012). Because of the Internet's security protection holes, several of the digital community members explored how to allocate risk if a security breach were to occur. From this investigation, three main issues were identified as security risks: integrity, nonrepudiation, and authentication (Stern, 2001).

Digital signature should provide three main services: Authentication which is linking the creator of the information, Integrity, which means easily detecting any variations to the information provided and Non-repudiation for making sure of the satisfaction (from a legal perspective) about where the electronic signature is coming from (Wang, 2014). Digital signature laws had three generations, which started appearing since 1995 (Blythe, 2007; Embrogno, 2012). Moreover, mobile signatures are predicted to get a great future. To grant signatory mobility apart from a fixed, secure desktop workstation that has a trusted, personal signing tool (Rossnagel and Royer, 2005), and because of how smart devices are taking over PC’s a need for signature applications emerge and many applications started to hit the different markets (Google Play, App Store and windows store).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing