Reference Hub3
A Secure Cloud Based Digital Signature Application for IoT

A Secure Cloud Based Digital Signature Application for IoT

Sahar A. El-Rahman, Daniyah Aldawsari, Mona Aldosari, Omaimah Alrashed, Ghadeer Alsubaie
Copyright: © 2018 |Volume: 10 |Issue: 3 |Pages: 19
ISSN: 1941-627X|EISSN: 1941-6288|EISBN13: 9781522543688|DOI: 10.4018/IJESMA.2018070103
Cite Article Cite Article

MLA

El-Rahman, Sahar A., et al. "A Secure Cloud Based Digital Signature Application for IoT." IJESMA vol.10, no.3 2018: pp.42-60. http://doi.org/10.4018/IJESMA.2018070103

APA

El-Rahman, S. A., Aldawsari, D., Aldosari, M., Alrashed, O., & Alsubaie, G. (2018). A Secure Cloud Based Digital Signature Application for IoT. International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 42-60. http://doi.org/10.4018/IJESMA.2018070103

Chicago

El-Rahman, Sahar A., et al. "A Secure Cloud Based Digital Signature Application for IoT," International Journal of E-Services and Mobile Applications (IJESMA) 10, no.3: 42-60. http://doi.org/10.4018/IJESMA.2018070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain with the growth of IoT and the speed of the life. Different algorithms were utilized to accomplish the integrity of the documents, authenticate users with their unique signatures, and encrypt their documents in order to provide the best adopted solution for cloud-based signature in the field of IoT. Where, ECDSA (Elliptic Curve Digital Signature Algorithm) is utilized to ensure the message source, Hash function (SHA-512) is used to detect all information variations, and AES (Advanced Encryption Standard) is utilized for more security. SignOn is considered as a legal obligated way of signing contracts and documents, keeping the data in electronic form in a secure cloud environment and shortens the duration of the signing process. Whereas, it allows the user to sign electronic documents and then, the verifier can validate the produced signature.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.