Visible to the public Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security

TitleFuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Publication TypeConference Paper
Year of Publication2020
AuthorsSingh, G., Garg, S.
Conference Name2020 International Conference on Intelligent Engineering and Management (ICIEM)
KeywordsAccess Control, access control mechanisms, Attribute authority, authorisation, cipher text policy attribute based encryption, cloud computing, Cloud Security, composability, cyber physical systems, data access control scheme, data confidentiality, data privacy, Data security, data transfer, Diffie Hellman, efficient encryption, Elliptic curve cryptography, Encryption, Fuzzy, Fuzzy Cryptography, fuzzy elliptic curve cryptography, fuzzy fined-grained access control, fuzzy set theory, Metrics, pubcrawl, public key cryptography, public key encryption, Receivers, Resiliency, Scalability
Abstract

Cipher Text Policy Attribute Based Encryption which is a form of Public Key Encryption has become a renowned approach as a Data access control scheme for data security and confidentiality. It not only provides the flexibility and scalability in the access control mechanisms but also enhances security by fuzzy fined-grained access control. However, schemes are there which for more security increases the key size which ultimately leads to high encryption and decryption time. Also, there is no provision for handling the middle man attacks during data transfer. In this paper, a light-weight and more scalable encryption mechanism is provided which not only uses fewer resources for encoding and decoding but also improves the security along with faster encryption and decryption time. Moreover, this scheme provides an efficient key sharing mechanism for providing secure transfer to avoid any man-in-the-middle attacks. Also, due to fuzzy policies inclusion, chances are there to get approximation of user attributes available which makes the process fast and reliable and improves the performance of legitimate users.

DOI10.1109/ICIEM48762.2020.9159961
Citation Keysingh_fuzzy_2020