Abstract
There are lots of application which are been used by the people where a user’s data has to be protected from the attackers who steal the data by using fake identities which makes difficult to find the real culprit. The main issue is to give strong security to the data and to minimize computational cost with an efficient key management system. We propose a new encryption method in this paper, based on user attributes and access control policy using blowfish which is hybridized and weighted encryption which is a combination of features from two different algorithms to provide a high security to user data and to generate key efficiently. The two algorithms ciphertext policy attribute encryption with access control policy and the hierarchical identity-based encryption with weighted attributes are included. Here, based on the priority, the weights are assigned to the attributes and then the message is combined with access control policy given by the user and encrypted. This algorithm is used to find the culprit who is misusing the application. Also we can add that person to the blacklist, and all the accounts associated with that identity can also be blacklisted. The proposed system provides multi-authority security, efficiency, collusion resistant, secure against chosen plain text attack and reliable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: EUROCRYPT’05, pp. 457–473. Springer (2005)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communication Safety, pp. 89–98 (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Rado, G.T., Suhl, H. (eds.) Magnetism, vol. III, pp. 271–350. Academic, New York
Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. In: IEEE Trans. Inf. Forensics Secur. 7(2) (2012)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Association for Crytologic Research, PKC 2011, LNCS 6571, pp. 53–70, (2011)
Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Int. Sci. 275, 370–384 (2014)
He, K., Chen, M.-R., Mao, Y., Zhang, X., Zhan, Y.: Efficient hierarchical identity–based encryption for mobile ad hoc network. In: Mobile Information System, pp. 407–425
Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and mobile media cloud. IEEE Commun. Mag. 52, 73–79 (2014)
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25, 2201–2210 (2014)
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24, 131–143 (2013)
Mousa, A.: Data encryption performance based on Blowfish. In: Proceedings of 74th International Symposium ELMAR, pp 131–134 (2015)
Wang, Y., Gao, J.: A regulation scheme based on the ciphertext policy hierarchical attribute—based encryption in bitcoin system. In: IEEE Access vol. 6, pp 16267–16278 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Porkodi, S., Kesavaraja, D. (2021). Secure Ciphertext Policy Using Blowfish Hybridized Weighted Attribute-Based Encryption. In: Suresh, P., Saravanakumar, U., Hussein Al Salameh, M. (eds) Advances in Smart System Technologies. Advances in Intelligent Systems and Computing, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-5029-4_10
Download citation
DOI: https://doi.org/10.1007/978-981-15-5029-4_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5028-7
Online ISBN: 978-981-15-5029-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)