Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 16 , Issue 1 , PP: 134-119, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment

A. Jeneba Mary 1 * , K. Kuppusamy 2 , A. Senthilrajan 3 *

  • 1 Research Scholar, Department of Computational Logistics, Alagappa University, Karaikudi, Tamilnadu, India - (jenebamary@gmail.com)
  • 2 Formerly Professor& Head (i/c), Department of Computational Logistics, Alagappa University, Karaikudi, Tamilnadu, India - (ksamyk@alagappauniversity.ac.in)
  • 3 Professor, Department of Computational Logistics, Alagappa University, Karaikudi, Tamilnadu, India - ( senthilrajana@alagappauniversity.ac.in)
  • Doi: https://doi.org/10.54216/JCIM.160111

    Received: November 24, 2024 Revised: January 30, 2025 Accepted: February 27, 2025
    Abstract

    As an increasing number of people and corporations move their data to the cloud side, how to ensure efficient and secure access to data stored on the cloud side has become a key focus of current research. Attribute-Based Encryption (ABE) is largely recognized as the best access control method for safeguarding the cloud storage environment, and numerous solutions based on ABE have been developed successively. Attribute-based encryption (ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing. Hence, the strong and lightweight encryption schemes need more limelight of implementation in ABE to overcome the tampering and leakage problem that may cause the severe consequences to the users. To solve this problem, this paper proposes the Swarm Inspired Chaotic Encryption principles for designing the CP-ABE Systems for effective data sharing process. This scheme utilizes the chaotic properties along with the swarm properties for every individual transmission that leads to the strong defence characteristics. The intensive experimentation is carried out using Multi-modal Inputs such as the biometric images and eye iris images. The extensive experimentation is carried out using the various standard tests such as NIST (National Institute of Standard and technology), communication cost (CC) and metrics such as NPCR, UACI, entropies has been evaluated and analysed. Furthermore, excellence of the proposed model is determined by comparing with the other existing schemes. The evaluation demonstrates the CC of proposed scheme is only 30% than other algorithms and passed all the 12 standard tests. The experimental results illustrate the proposed scheme has more advantage in exhibiting the more randomness and light weight characteristics for health care which can more defensive against the attacks

    Keywords :

    Attribute based encryption , Chaotic Maps , Swarm Intelligence , Biometric Images , Multi-level Inputs

    References

    [1] A. Adeel, M. Ali, A. N. Khan, T. Khalid, F. Rehman, Y. Jararweh, and J. Shuja, “A multi-attack resilient lightweight IoT authentication scheme,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3676, 2022, doi: 10.1002/ett.3676.

    [2] N. Alassaf, B. Alkazemi, and A. Gutub, “Applicable light-weight cryptography to secure medical data in IoT systems,” J. Res. Eng. Appl. Sci., vol. 2, no. 2, pp. 50–58, 2017, doi: 10.46565/jreas.2017.v02i02.002.

    [3] N. Alassaf and A. Gutub, “Simulating light-weight-cryptography implementation for IoT healthcare data security applications,” Int. J. E-Health Med. Commun., vol. 10, no. 4, pp. 1–15, 2019, doi: 10.4018/IJEHMC.2019100101.

    [4] S. Xu, J. Yuan, G. Xu, Y. Li, and X. Liu, “Efficient ciphertext-policy attribute-based encryption with blackbox traceability,” Inf. Sci., vol. 540, pp. 389–404, Oct. 2020.

    [5] C. Ge et al., “Revocable attribute-based encryption with data integrity in clouds,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 5, pp. 2864–2872, 2022, doi: 10.1109/TDSC.2021.30659992446.

    [6] L. Guo, X. Yang, and W. C. Yau, “TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain,” IEEE Access, vol. 9, pp. 8479–8490, 2021, doi: 10.1109/ACCESS.2021.3049549.

    [7] R. Guo, G. Yang, H. Shi, Y. Zhang, and D. Zheng, “O3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system,” IEEE Internet Things J., vol. 8, no. 11, pp. 8949–8963, 2021, doi: 10.1109/JIOT.2021.305554.

    [8] S. Hu, X. Wang, H. He, and T. Zhong, “Complex and flexible data access policy in attribute-based encryption,” J. Supercomput., vol. 78, no. 1, pp. 1010–1029, 2022, doi: 10.1007/s11227-021-03867-5.

    [9] M. Jammula, V. M. Vakamulla, and S. K. Kondoju, “Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment,” 2022.

    [10] X. Fu et al., “A survey of lattice-based expressive attribute-based encryption,” Comput. Sci. Rev., vol. 43, p. 100438, 2022, doi: 10.1016/j.cosrev.2021.100438.

    [11] M. M. AbdulKader and S. G. Kumar, “An efficient geometric octal zones distance estimation and attribute-based encryption for secure transfer of sensitive data,” Telecommun. Syst., vol. 84, no. 2, pp. 251–270, Feb. 2023, doi: 10.1007/s11235-023-01030-4.

    [12] Y. Ming, B. He, and C. Wang, “Efficient revocable multi-authority attribute-based encryption for cloud storage,” IEEE Access, vol. 9, pp. 42593–42603, 2021.

    [13] Z. Lu et al., “Novel searchable attribute-based encryption for the Internet of Things,” Wireless Commun. Mobile Comput., vol. 2022, p. 8350006, 2022, doi: 10.1155/2022/8350006.

    [14] M. S. Nair and S. Dharan, “Design of a multimodal biometric-based protection system by generation of a revocable cryptographic key using separately extracted feature fusion-based convolutional neural network with bat optimization (Version 1, Preprint),” Res. Square, 2024, doi: 10.21203/rs.3.rs-4853162/v1.

    [15] T. Tian et al., “Attribute-based heterogeneous data privacy sharing in blockchain-assisted industrial IoT,” IEEE Internet Things J., 2024, doi: 10.1109/JIOT.2024.3510872.

    [16] D. Pointcheval and R. Schädlich, “Multi-client attribute-based and predicate encryption from standard assumptions,” Cryptol. ePrint Arch., Paper 2024/1945, 2024, doi: 10.1007/978-3-031-78020-2_2.

    [17] M. M. AbdulKader and S. G. Kumar, “An efficient geometric octal zones distance estimation and attribute-based encryption for secure transfer of sensitive data,” Telecommun. Syst., vol. 84, pp. 251–270, 2023, doi: 10.1007/s11235-023-01030-4.

    [18] G. Yang et al., “An efficient attribute-based encryption scheme with data security classification in the multi-cloud environment,” Electronics, vol. 12, no. 20, p. 4237, 2023, doi: 10.3390/electronics12204237.

    [19] S. Agrawal, A. Yadav, and S. Yamada, “Multi-input attribute-based encryption and predicate encryption,” Lecture Notes in Computer Science, vol. 10, pp. 1007–978, 2022, doi: 10.1007/978-3-031-15802-5_21.

    [20] K. M. Nagaraju and R. Boraiah, “Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages,” Indones. J. Electr. Eng. Comput. Sci., vol. 28, no. 1, pp. 545–550, 2022, doi: 10.11591/ijeecs.v28.i1.pp545-550.

    [21] Z. Zhang, S. Cao, and X. Yang, “An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments,” Peer-to-Peer Netw. Appl., vol. 14, pp. 3488–3501, 2021, doi: 10.1007/s12083-021-01195-2.

    [22] A. Tarannum et al., “An efficient multi-modal biometric sensing and authentication framework for distributed applications,” IEEE Sens. J., vol. 20, no. 24, pp. 15014–15025, 2020, doi: 10.1109/JSEN.2020.3012536.

    [23] A. Islam and S. Madria, “Attribute-based encryption scheme for secure multi-group data sharing in cloud,” IEEE Trans. Serv. Comput., 2020, doi: 10.1109/TSC.2020.3038836.

    [24] M. Jammula, V. M. Vakamulla, and S. K. Kondoju, “Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment,” 2022.

    [25] S. Hu, X. Wang, H. He, and T. Zhong, “Complex and flexible data access policy in attribute-based encryption,” J. Supercomput., vol. 78, no. 1, pp. 1010–1029, 2022, doi: 10.1007/s11227-021-03867-5.

    Cite This Article As :
    Jeneba, A.. , Kuppusamy, K.. , Senthilrajan, A.. A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 134-119. DOI: https://doi.org/10.54216/JCIM.160111
    Jeneba, A. Kuppusamy, K. Senthilrajan, A. (2025). A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment. Journal of Cybersecurity and Information Management, (), 134-119. DOI: https://doi.org/10.54216/JCIM.160111
    Jeneba, A.. Kuppusamy, K.. Senthilrajan, A.. A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment. Journal of Cybersecurity and Information Management , no. (2025): 134-119. DOI: https://doi.org/10.54216/JCIM.160111
    Jeneba, A. , Kuppusamy, K. , Senthilrajan, A. (2025) . A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment. Journal of Cybersecurity and Information Management , () , 134-119 . DOI: https://doi.org/10.54216/JCIM.160111
    Jeneba A. , Kuppusamy K. , Senthilrajan A. [2025]. A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment. Journal of Cybersecurity and Information Management. (): 134-119. DOI: https://doi.org/10.54216/JCIM.160111
    Jeneba, A. Kuppusamy, K. Senthilrajan, A. "A Swarm Inspired Chaotic Map Evoked Attribute Encryption Framework Using Multi-Model Inputs in Cloud Environment," Journal of Cybersecurity and Information Management, vol. , no. , pp. 134-119, 2025. DOI: https://doi.org/10.54216/JCIM.160111