Skip to main content

Secure Ciphertext Policy Using Blowfish Hybridized Weighted Attribute-Based Encryption

  • Conference paper
  • First Online:
Advances in Smart System Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1163))

  • 804 Accesses

Abstract

There are lots of application which are been used by the people where a user’s data has to be protected from the attackers who steal the data by using fake identities which makes difficult to find the real culprit. The main issue is to give strong security to the data and to minimize computational cost with an efficient key management system. We propose a new encryption method in this paper, based on user attributes and access control policy using blowfish which is hybridized and weighted encryption which is a combination of features from two different algorithms to provide a high security to user data and to generate key efficiently. The two algorithms ciphertext policy attribute encryption with access control policy and the hierarchical identity-based encryption with weighted attributes are included. Here, based on the priority, the weights are assigned to the attributes and then the message is combined with access control policy given by the user and encrypted. This algorithm is used to find the culprit who is misusing the application. Also we can add that person to the blacklist, and all the accounts associated with that identity can also be blacklisted. The proposed system provides multi-authority security, efficiency, collusion resistant, secure against chosen plain text attack and reliable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: EUROCRYPT’05, pp. 457–473. Springer (2005)

    Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communication Safety, pp. 89–98 (2006)

    Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Rado, G.T., Suhl, H. (eds.) Magnetism, vol. III, pp. 271–350. Academic, New York

    Google Scholar 

  4. Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. In: IEEE Trans. Inf. Forensics Secur. 7(2) (2012)

    Google Scholar 

  5. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Association for Crytologic Research, PKC 2011, LNCS 6571, pp. 53–70, (2011)

    Google Scholar 

  6. Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Int. Sci. 275, 370–384 (2014)

    MathSciNet  MATH  Google Scholar 

  7. He, K., Chen, M.-R., Mao, Y., Zhang, X., Zhan, Y.: Efficient hierarchical identity–based encryption for mobile ad hoc network. In: Mobile Information System, pp. 407–425

    Google Scholar 

  8. Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and mobile media cloud. IEEE Commun. Mag. 52, 73–79 (2014)

    Article  Google Scholar 

  9. Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25, 2201–2210 (2014)

    Article  Google Scholar 

  10. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24, 131–143 (2013)

    Article  Google Scholar 

  11. Mousa, A.: Data encryption performance based on Blowfish. In: Proceedings of 74th International Symposium ELMAR, pp 131–134 (2015)

    Google Scholar 

  12. Wang, Y., Gao, J.: A regulation scheme based on the ciphertext policy hierarchical attribute—based encryption in bitcoin system. In: IEEE Access vol. 6, pp 16267–16278 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Porkodi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Porkodi, S., Kesavaraja, D. (2021). Secure Ciphertext Policy Using Blowfish Hybridized Weighted Attribute-Based Encryption. In: Suresh, P., Saravanakumar, U., Hussein Al Salameh, M. (eds) Advances in Smart System Technologies. Advances in Intelligent Systems and Computing, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-5029-4_10

Download citation

Publish with us

Policies and ethics