Amelioration of Decentralized Cipher Text Policy Attribute Based Encryption with Mediator technique by adding Salt

Main Article Content

Suraj U Rasal

Abstract

The existing techniques had focused more on the attribute based encryption, cipher text policies and multiple authorities to make the network security more sheltered. But due to the attribute leak problem, these techniques were disabled to protect user’s privacy. To enhance the security level, the proposed system has added salting method into the DCP-ABE-M scheme. Here both the data and user attributes are utilized to avoid attribute leak problem. The proposed system has a decentralized environment which contains multiple authorities who generates secret keys by using user attributes, data attributes and also contains multiple mediators who act as the middleware between user-authority. Both the power’s doesn’t stores any user details or full secret keys in their DB or in system. That is, all the user details and secret key will be hidden. In some cases the different users may use same keywords as their passwords which may leads to rainbow table attack or dictionary attack. To avoid this problem, salting is added into DCP-ABE-M. A unique salt value is added into the passwords which makes the password more strong and different from other passwords. Hence the proposed system enhances the level of security by adding salt value and is more efficient than the previously existing schemes.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Suraj U Rasal, Bharati Vidyapeeth University College of Engineering Pune

Assistant Professor at Department of Computer Engineering Bharati Vidyapeeth University College of Engineering Pune

References

A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Heidelberg, Germany: Springer-Verlag, 2005, pp. 457–473.

M. Chase and S. S. Chow, “Improving privacy and security in multiauthority attribute-based encryption,†in Proc. 16th ACM Conf. CCS, 2009, pp. 121–130.

M. Chase, “Multi-authority attribute based encryption,†in Theory of Cryptography 2007, (Lecture Notes in Computer Science), vol. 4392. Heidelberg, Germany: Springer-Verlag, pp. 515– 534.

A. Lewko and B. Waters, “Decentralizing attributebased encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632. Heid.elberg, Germany: Springer-Verlag, 2011, pp. 568–588.

Varsha Thanaji Mulik, Shinu A, Suraj Rasal. [2016] Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption, IJRET: International Journal of Research in Engineering and Technology, 05 ( 06) | June.

Varsha Thanaji Mulik, Shinu A, Suraj Rasal. [2016] A Survey on Improving Privacy and Security in Decentralized Cipher Text-Policy Attribute-Based Encryption, IJAECS: International Journal of Advances in Electronics and Computer Science, vol. 03 (05) | May.

D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, pages213–229, 2001

D. Boneh and X. Boyen. “Secure identity based encryption without random oraclesâ€. In CRYPTO, pages 443-459, 2004.

D. Boneh and X. Boyen. “Efficient selective-id secure identity based encryption without random oraclesâ€. In EUROCRYPT, pages 223 - 238, 2004.

Adi Shamir,‖Identity Based Cryptosystems and Signature schemes‖ Departments of applied mathematics, 1998.

A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Heidelberg, Germany: Springer-Verlag, 2005, pp. 457–473.

J. Herranz, F. Laguillaumie, and C. Rà fols, “Constant size cipher texts in threshold attribute-based encryption,†in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6056. Heidelberg, Germany: Springer-Verlag, 2010, pp. 19–34.

R.Ostrovsky, A. Sahai, and B. Waters, “Attribute based encryption with non-monotonic access structures,†in Proc. 14th ACM Conf. CCS, 2007, pp. 195–203.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,†in Proc. 13th ACM Conf. CCS, 2006, pp. 89–98.

H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,†in Progress in Cryptology (Lecture Notes in Computer Science), vol. 5365. Heidelberg, Germany: Springer-Verlag, 2008, pp. 426–436. 678 ieee transactions on information forensics and security, vol. 10, no. 3, march 2015.

Kan Yang, student member, ieee, and xiaohua jia, fellow, ieee. (july 2014). expressive, efficient, and revocable data access control for multi-authority cloud storage. ieee transactions on parallel and distributed systems. vol. 25, no. 7 (1), 1735-1744

J.Bethencourt, A. Sahai, and B. Waters, “Cipher text policy attribute based encryption,†in Proc. IEEE Symp. SP, May 2007, pp. 321–334.

H. Qian, J. Li, and Y. Zhang, “Privacy-preserving decentralized cipher text-policy attribute-based encryption with fully hidden access structure,†in Information and Communications Security (Lecture Notes in Computer Science), vol. 8233. Heidelberg, Germany: Springer-Verlag, 2013, pp. 363–372.

J. Han, W. Susilo, Y. Mu, and J. Yan, “Privacy preserving decentralized key-policy attribute based encryption,†IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 2162, Nov. 2012.

Jinguang han, member, ieee, willy susilo, senior member, ieee, yi mu, senior member, ieee, jianying zhou, and man ho allen au, member, ieee. (march 2015). improving privacy and security in decentralized ciphertext-policy attribute-based

encryption. ieee transactions on information forensics and security. vol. 10, no. 3 (1), 665-678.

Suraj Rasal, Karan Saxena ,Sanya Relan. (2016/5). OTP Processing using UABE & DABE with Session Management. International Journal of Advanced Research in Computer Science and Software Engineering. 6 (5), 57-59.

Varsha S Rasal, Suraj U Rasal, Shraddha T Shelar. (2016/10). ENHANCING PRIVACY AND SECURITY THROUGH MEDIATOR USING DCP-ABE WITH OTP. IIOAB-Institute of Integrative Omics and Applied Biotechnology . 7 (1), 277-283.