Skip to main content

A Lightweight Effective Randomized Caesar Cipher Algorithm for Security of Data

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Abstract

In any kind of organization in the present scenario, raw data or meaningful data needs to be shared among different personnel; therefore, the chances of frauds or treachery are more that creates vulnerability in the working environment. Therefore, the protection of organizations’ confidential and sensitive data among different levels of employees against these kinds of theft or illegal activity that violates the company security policy is prerequisite. ABE pronounced as attribute-based encryption was introduced. ABE is a parameter that plays a vital role in providing access control in a fine-grained manner for outsourcing data in a data sharing system. Moreover, CP-ABE was introduced that defines an access policy in order to cover all the attributes within the system. In this scheme, for encryption and decryption purposes, the user’s private key is accompanied to the group of attributes. but due to its lack of efficiency and several other paradigms, it was proved ineffective. Hence, in order to overcome the existing issues, we have implemented a new cryptographic algorithm which is competent enough to encrypt and decrypt any type of file that contains any kind of data written in the range of ASCII values. We named this algorithm as randomized Caesar cipher algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta I, Singh AK (2019) Dynamic Threshold based Information Leaker Identification Scheme. Inf Process Lett 147:69–73

    Article  MathSciNet  Google Scholar 

  2. Gupta I, Singh AK (2019) An integrated approach for data leaker detection in cloud environment. J Inf Sci Eng

    Google Scholar 

  3. Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2)

    Google Scholar 

  4. Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Procedia Comput Sci 125:662–668

    Article  Google Scholar 

  5. Jalwa S, Siddiqi AR, Sharma V, Gupta I, Singh AK (2019) Comprehensive and comparative analysis of different files using CP-ABE. In: First international conference on advanced communication & computational technology (ICACCT)

    Google Scholar 

  6. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE

    Google Scholar 

  7. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98

    Google Scholar 

  8. Chor B, Rivest RL (1988) A knapsack-type public key cryptosystem based on arithmetic infinite fields. IEEE Trans Inf Theory 34(5):901–909

    Article  Google Scholar 

  9. Shamir A (1999) Identity-based cryptosystems and signature schemes, 2nd edn. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg

    Google Scholar 

  10. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg

    Google Scholar 

  11. Han F et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30:107–115

    Google Scholar 

  12. Liu P et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications. IEEE

    Google Scholar 

  13. Porwal S, Mittal S (2017) Implementation of Ciphertext policy-attribute based encryption (CP-ABE) for fine grained access control of university data. In: 2017 tenth international conference on contemporary computing (IC3). IEEE

    Google Scholar 

  14. Guo F et al (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771

    Google Scholar 

  15. Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security. Springer, Berlin, Heidelberg

    Google Scholar 

  16. Ning J et al (2016) White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secur Comput 15(5):883–897

    Google Scholar 

  17. Li J et al (2017) User collision avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst J 12(2):1767–1777

    Google Scholar 

  18. Wang S et al (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277

    Google Scholar 

  19. Li L et al (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137–1145

    Google Scholar 

  20. Luo W, Ma W (2018) Efficient and secure access control scheme in the standard model for vehicular cloud computing. IEEE Access 6:40420–40428

    Article  Google Scholar 

  21. Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017). ACM, Tokyo, Japan

    Google Scholar 

  22. Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishu Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, V., Jalwa, S., Siddiqi, A.R., Gupta, I., Singh, A.K. (2021). A Lightweight Effective Randomized Caesar Cipher Algorithm for Security of Data. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics