Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Title | Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Singh, G., Garg, S. |
Conference Name | 2020 International Conference on Intelligent Engineering and Management (ICIEM) |
Keywords | Access Control, access control mechanisms, Attribute authority, authorisation, cipher text policy attribute based encryption, cloud computing, Cloud Security, composability, cyber physical systems, data access control scheme, data confidentiality, data privacy, Data security, data transfer, Diffie Hellman, efficient encryption, Elliptic curve cryptography, Encryption, Fuzzy, Fuzzy Cryptography, fuzzy elliptic curve cryptography, fuzzy fined-grained access control, fuzzy set theory, Metrics, pubcrawl, public key cryptography, public key encryption, Receivers, Resiliency, Scalability |
Abstract | Cipher Text Policy Attribute Based Encryption which is a form of Public Key Encryption has become a renowned approach as a Data access control scheme for data security and confidentiality. It not only provides the flexibility and scalability in the access control mechanisms but also enhances security by fuzzy fined-grained access control. However, schemes are there which for more security increases the key size which ultimately leads to high encryption and decryption time. Also, there is no provision for handling the middle man attacks during data transfer. In this paper, a light-weight and more scalable encryption mechanism is provided which not only uses fewer resources for encoding and decoding but also improves the security along with faster encryption and decryption time. Moreover, this scheme provides an efficient key sharing mechanism for providing secure transfer to avoid any man-in-the-middle attacks. Also, due to fuzzy policies inclusion, chances are there to get approximation of user attributes available which makes the process fast and reliable and improves the performance of legitimate users. |
DOI | 10.1109/ICIEM48762.2020.9159961 |
Citation Key | singh_fuzzy_2020 |
- data confidentiality
- Receivers
- public key encryption
- public key cryptography
- fuzzy set theory
- fuzzy fined-grained access control
- fuzzy elliptic curve cryptography
- Fuzzy Cryptography
- Fuzzy
- encryption
- efficient encryption
- Diffie Hellman
- data transfer
- Data Security
- data privacy
- Elliptic curve cryptography
- data access control scheme
- cyber physical systems
- composability
- Cloud Security
- Cloud Computing
- cipher text policy attribute based encryption
- authorisation
- Attribute authority
- access control mechanisms
- Access Control
- Metrics
- Resiliency
- Scalability
- pubcrawl