Abstract
In any kind of organization in the present scenario, raw data or meaningful data needs to be shared among different personnel; therefore, the chances of frauds or treachery are more that creates vulnerability in the working environment. Therefore, the protection of organizations’ confidential and sensitive data among different levels of employees against these kinds of theft or illegal activity that violates the company security policy is prerequisite. ABE pronounced as attribute-based encryption was introduced. ABE is a parameter that plays a vital role in providing access control in a fine-grained manner for outsourcing data in a data sharing system. Moreover, CP-ABE was introduced that defines an access policy in order to cover all the attributes within the system. In this scheme, for encryption and decryption purposes, the user’s private key is accompanied to the group of attributes. but due to its lack of efficiency and several other paradigms, it was proved ineffective. Hence, in order to overcome the existing issues, we have implemented a new cryptographic algorithm which is competent enough to encrypt and decrypt any type of file that contains any kind of data written in the range of ASCII values. We named this algorithm as randomized Caesar cipher algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta I, Singh AK (2019) Dynamic Threshold based Information Leaker Identification Scheme. Inf Process Lett 147:69–73
Gupta I, Singh AK (2019) An integrated approach for data leaker detection in cloud environment. J Inf Sci Eng
Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2)
Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Procedia Comput Sci 125:662–668
Jalwa S, Siddiqi AR, Sharma V, Gupta I, Singh AK (2019) Comprehensive and comparative analysis of different files using CP-ABE. In: First international conference on advanced communication & computational technology (ICACCT)
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Chor B, Rivest RL (1988) A knapsack-type public key cryptosystem based on arithmetic infinite fields. IEEE Trans Inf Theory 34(5):901–909
Shamir A (1999) Identity-based cryptosystems and signature schemes, 2nd edn. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg
Han F et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30:107–115
Liu P et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications. IEEE
Porwal S, Mittal S (2017) Implementation of Ciphertext policy-attribute based encryption (CP-ABE) for fine grained access control of university data. In: 2017 tenth international conference on contemporary computing (IC3). IEEE
Guo F et al (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771
Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security. Springer, Berlin, Heidelberg
Ning J et al (2016) White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secur Comput 15(5):883–897
Li J et al (2017) User collision avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst J 12(2):1767–1777
Wang S et al (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277
Li L et al (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137–1145
Luo W, Ma W (2018) Efficient and secure access control scheme in the standard model for vehicular cloud computing. IEEE Access 6:40420–40428
Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017). ACM, Tokyo, Japan
Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, V., Jalwa, S., Siddiqi, A.R., Gupta, I., Singh, A.K. (2021). A Lightweight Effective Randomized Caesar Cipher Algorithm for Security of Data. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-5258-8_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5257-1
Online ISBN: 978-981-15-5258-8
eBook Packages: EngineeringEngineering (R0)