A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud

被引:2
作者
Thushara, G. A. [1 ]
Bhanu, S. Mary Saira [1 ]
机构
[1] Natl Inst Technol, Dept CSE, Tiruchirappalli 620015, India
来源
2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC) | 2021年
关键词
Cloud Computing; Secure Data Sharing; ABE; KP-ABE; CP-ABE; EFFICIENT;
D O I
10.1109/ICSCC51209.2021.9528198
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing facilitates the access of applications and data from any location by using any device with an internet connection. It enables multiple applications and users to access the same data resources. Cloud based information sharing is a technique that allows researchers to communicate and collaborate, that leads to major new developments in the field. It also enables users to access data over the cloud easily and conveniently. Privacy, authenticity and confidentiality are the three main challenges while sharing data in cloud. There are many methods which support secure data sharing in cloud environment such as Attribute Based Encryption(ABE), Role Based Encryption, Hierarchical Based Encryption, and Identity Based Encryption. ABE provides secure access control mechanisms for integrity. It is classified as Key Policy Attribute Based Encryption(KP-ABE) and Ciphertext Policy Attribute Based Encryption(CP-ABE) based on access policy integration. In KP-ABE, access structure is incorporated with user's private key, and data are encrypted over a defined attributes. Moreover, in CP-ABE, access structure is embedded with ciphertext. This paper reviews CP-ABE methods that have been developed so far for achieving secured data sharing in cloud environment.
引用
收藏
页码:170 / 177
页数:8
相关论文
共 30 条
[1]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[4]   Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage [J].
Cheng, Yong ;
Wang, Zhi-ying ;
Ma, Jun ;
Wu, Jiang-jiang ;
Mei, Song-zhu ;
Ren, Jiang-chun .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02) :85-97
[5]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[6]   Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing [J].
Huang, Qinlong ;
Yang, Yixian ;
Yue, Wei ;
He, Yue .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) :1607-1618
[7]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282
[8]   Removing escrow from ciphertext policy attribute-based encryption [J].
Hur, Junbeom ;
Koo, Dongyoung ;
Hwang, Seong Oun ;
Kang, Kyungtae .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) :1310-1317
[9]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[10]   Owner Specified Excessive Access Control for Attribute Based Encryption [J].
Khan, Fawad ;
Li, Hui ;
Zhang, Liangxuan .
IEEE ACCESS, 2016, 4 :8967-8976