Open Access Subscription Access
Open Access Subscription Access
A Review on Attribute Based Encryption Techniques of Access Control in Cloud Computing
Cloud computing has emerged as a marked change in the field of Information Technology. Services like “on-demand” and “pay-as-you-go” has caused the migration of government as well as industries IT infrastructures to cloud. As data and business logic is stored at remote cloud server, the security concerns related to cloud environment is different from conventional computing. In cloud computing, security of data is managed by CSPs and the data owner has no control over the security policy of his own data. The security and privacy are two significant factors that restrain the user from switching to untrusted cloud environment. Though switching to cloud cut IT costs enormously but secure data sharing always remain concern for data owners. Thus, these two areas need more focus for making secure data sharing in cloud computing environment. In this paper we have reviewed and compared various schemes for attribute based encryption in respect of cloud computing.
Access Control, Attribute Based Encryption, Cloud Computing, CP-ABE, CP-ASBE, HASBE, KP-ABE.
- K. K. Hausman, S. L. Cook, and T. Sampaio, Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001, June 2013.
- R. Ostrovsky, A. Sahai, and B. Waters, “Attribute based encryption with non-monotonic access structures,” In Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195-203, 2007.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ‘06), ACM, New York, USA, pp. 89-98, 2006.
- L. Cheung, and C. Newport, “Provably secure ciphertext policy ABE,” In Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, p. 465, 2007.
- C. Wang, and J. Luo, “An efficient key-policy attribute-based encryption scheme with constant ciphertext length,” Mathematical Problems in Engineering, vol. 2013, Article ID 810969, 2013.
- C. C. Lee, P. S. Chung, and M. S. Hwang, “A Survey on attribute-based encryption schemes of access control in cloud environments,” International Journal of Network Security, vol. 15, no. 4, pp. 231-240, July 2013.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” In Proceedings of IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
- R. Bobba, H. Khurana, and M. Prabhakaran, “Attributes-sets: A practically motivated enhancement to attribute-based encryption,” In M. Backes, and P. Ning, (eds.), ESCORICS 2009, LNCS, pp. 587-604, 2009.
- G. Wang, Q. Liu, and J. Wu, “Hierachical attribute based encryption for fi ne-grained access control in cloud storage services,” In Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735-737, 2010.
- G. Wang, Q. Liu, J. Wu, and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Computer & Security, vol. 30, no. 5, pp. 320-331, 2011.
- Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
Abstract Views: 29
PDF Views: 0