Technology integration
Technology integration
Abstract: Securing private information and distribution plays a vital role in distributed environment against
the unauthorized users. Server information can be distributed to the authorized users based on the user’s
identity. Traditional identity based attack which breaks the user’s identity and privacy during the
communication process. Existing attribute based encryption and decryption process relay on policy tree
structure and number of attributes in the setup phase. Due to identity based attacks, data communication within
or outside the network changed or spoofed. Network communication cost increases as the number of users
within the network increases. In order to overcome identity based attacks, a new pattern based user’s identity or
policy structure was implemented in this paper. In this work, each attributes along with user’s policies are
defined in the form of patterns. Each pattern has three parts with three operations namely policy AND, policy
OR and policy ANY. During set up phase and encryption phase each user’s profile is constructed in the form of
patterns. Proposed pattern based mechanism minimizes the policy search space and decryption time during data
communication. Experimental result shows that proposed approach completely protects against the identity
attacks by minimizing the communication and storage overhead.
Keywords - Policy protection, data privacy, pattern policy, storage overhead, encryption and decryption.
I. INTRODUCTION
A broadcast encryption scheme is used whenever an source person wants to send messages to several
receivers using an unsecured network channel. This type scheme actually allows the broadcaster to go with
dynamically a subset of privileged users in the set of all possible authorized receivers and to send a cipher text,
readable only by the privileged users. This sort of schemes is helpful in various real time applications such as
the documents sharing within the LAN and internet or broadcast of multimedia content. Many schemes have
also been suggested to solve this problem regarding communication overhead. The first phase applies to almost
fixed sets of authorized users. In this case the encryption process is efficient but modifying the set of privileged
users entails the sending of causing long message. In the second phase, setting is intended for day-to-day self-
management of very large or minimal sets of privileged users. Schemes develop for that purpose allow one to
change without payment the desirable of privileged users however the size of the encryption grows linearly
when using the size of the desirable of revoked users[1].
www.jst.org.in 11 | Page
Journal of Science and Technology
User Attributes
User Policies
Setup process
Encryption
/Decryption
Cipher/Plain
Text
The efficiency of those schemes can only be proved when few users are revoked, yet the binary tree structure
presented in [4-5] together with its following improvements may be designed to characterize teams of users by
attributes: for instance, the left subtrees of one's internal nodes on a given level may refer to users with the use
of a given attribute, and the right subtrees to users with this attribute missing. The access policy is defined using
the content, and attributes are utilized to build decryption keys handed to users. These ciphertext-policy
attribute-based encryption schemes have direct applications for broadcast: the access policy defines specific
privileged users. With a relevant distribution of attributes, any privileged users might be described by an access
policy.
www.jst.org.in 12 | Page
Journal of Science and Technology
block, and as a consequence the overhead of these schemes is at the moment too large to remain practical. This
provides input and output privacy yet data modification that happened in cloud couldn't be identified.
Revocation of some authorized user especially hard to accomplish efficiently in CP-ABE that is usually
addressed by extending attributes with expiration dates or by an authority distributing keys with expiration dates
[6]. In some cases, a tree of revocable attributes may have to become maintained and a trusted party granted to
validate the revocation statuses of users; the control access could be system-wide or maybe more fine-grained. A
revocation process using linear sharing and binary tree techniques, where each user is associated which includes
an identifier on any revocation tree, is one example. The problem this particular general approach within the
mobile context is the idea that it a change in mobile users required to incur the communication amount of
continually requesting new keys, while wireless communication always remains expensive. Also, the data owner
is typically a mobile user as well, and in consequence the owner cannot effectively manage access control on
demand for additional users on account of its transient connectivity. Revocation for data outsourcing purposes
has been proposed that relies upon stateless key distribution and access control toward the attribute level, but
requirements trusted authority and encumbers the data owner utilizing a pairing operation [7], a cryptographic
function that's very computationally expensive.
Policies List,
Attribute List
Partition Three
patterns
www.jst.org.in 13 | Page
Journal of Science and Technology
Encryption Process:
Calculations:
C0 g Sp ;
'
.g
C g H H .g H ' ' '
3,k
k:=0… .. pat3.length;
p1 2 p3
Decryption Process:
Input: CipherText
e(g p, g p )S ( ) /e(C,D*A)
'
Decryption:= M.
:= M. e(g , g )S ( ) /e( gS , g . g )
' '
p p p p p
, gp )S ( ) / e(gSp , gp )
' '
:= M. e(g p
IV. RESULTS
COMMUNICATION OVERHEAD:
www.jst.org.in 14 | Page
Journal of Science and Technology
1200
1000 Message
Size(x10)
800
KeySize(x10bits)
600
400 EncryptedSize
200
0
1600
1400
1200
EncryptedSize
1000
800 KeySize(x10bits)
600 Message
400 Size(x10)
200
0
ProposedApproach ExistingApproach
COMPUTATIONAL OVERHEAD
www.jst.org.in 15 | Page
Journal of Science and Technology
250
150
Existing Approach
100
Proposed
50 Approach
Bar Graph :Message Encryption and Decryption Computation in Proposed and Existing System
250
200 Message
Size(x10)
150
Existing
Approach
100
Proposed
50 Approach
Line Graph: Message Encryption and Decryption Computation in Proposed and Existing System
V. CONCLUSION
In this paper, a secured identity attack resistance based encryption and decryption model is proposed.
This model successfully works against identity type of attacks. This model takes linear constant time at
encryption and decryption process. Present model minimizes the Communication overhead and storage
overhead during the broadcasting messages. Experimental results are executed on different message sizes with
different policies. Finally, proposed approach outperforms well compare to existing models in terms of time and
overhead is concern.
www.jst.org.in 16 | Page
Journal of Science and Technology
REFERENCES
[1] RAKESH BOBBA, OMID FATEMIEH, FARIBA KHAN, ARINDAM KHAN, CARL A. GUNTER, HIMANSHU KHURANA, and
MANOJ PRABHAKARAN,Attribute-Based Messaging: Access Control and Confidentiality, ACM Transactions on Information and
System Security, Vol. 13, No. 4, Article 31, : December 2010.
[2] Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaume, Benoˆıt Libert, Elie de Panafieu, and Carla R`afols, “Attribute-
Based Encryption Schemes with Constant-Size Ciphertexts”, PKC 2011.
[3] Fugeng ZENG, Chunxiang XU,Attribute-based Signature Scheme with Constant Size Signature, Journal of Computational
Information Systems 8: 7 (2012) 2875–2882.
[4] V.Abinaya, IIV.Ramesh,Attribute Based Mechanism Using Cipher Policy Verification, International Journal of Advanced Research
in Computer Science & Technology (IJARCST 2014).
[5] Peifung E. Lam, John C. Mitchell,Declarative Privacy Policy: Finite Models and Attribute-Based Encryption, ACM 978-1-4503-
0781-9/12/01.
[6] Qinyi Li, Hu Xiong, Fengli Zhang,”An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext”, International
Journal of Network Security, Vol.15, No.3, PP.161-170, May 2013.
[7] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE
Symposium on Security and Privacy, SP ’07, pages 321–334.
www.jst.org.in 17 | Page