A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud

被引:2
作者
Thushara, G. A. [1 ]
Bhanu, S. Mary Saira [1 ]
机构
[1] Natl Inst Technol, Dept CSE, Tiruchirappalli 620015, India
来源
2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC) | 2021年
关键词
Cloud Computing; Secure Data Sharing; ABE; KP-ABE; CP-ABE; EFFICIENT;
D O I
10.1109/ICSCC51209.2021.9528198
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing facilitates the access of applications and data from any location by using any device with an internet connection. It enables multiple applications and users to access the same data resources. Cloud based information sharing is a technique that allows researchers to communicate and collaborate, that leads to major new developments in the field. It also enables users to access data over the cloud easily and conveniently. Privacy, authenticity and confidentiality are the three main challenges while sharing data in cloud. There are many methods which support secure data sharing in cloud environment such as Attribute Based Encryption(ABE), Role Based Encryption, Hierarchical Based Encryption, and Identity Based Encryption. ABE provides secure access control mechanisms for integrity. It is classified as Key Policy Attribute Based Encryption(KP-ABE) and Ciphertext Policy Attribute Based Encryption(CP-ABE) based on access policy integration. In KP-ABE, access structure is incorporated with user's private key, and data are encrypted over a defined attributes. Moreover, in CP-ABE, access structure is embedded with ciphertext. This paper reviews CP-ABE methods that have been developed so far for achieving secured data sharing in cloud environment.
引用
收藏
页码:170 / 177
页数:8
相关论文
共 30 条
[11]  
Lewko, 2011, LECT NOTES COMPUTER, V6632
[12]  
Li J., 2011, P 6 ACM S INF COMP C, P386
[13]   User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J].
Li, Jiguo ;
Yao, Wei ;
Han, Jinguang ;
Zhang, Yichen ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1767-1777
[14]   Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing [J].
Li, Jiguo ;
Chen, Ningyu ;
Zhang, Yichen .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :983-993
[15]   A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram [J].
Li, Long ;
Gu, Tianlong ;
Chang, Liang ;
Xu, Zhoubo ;
Liu, Yining ;
Qian, Junyan .
IEEE ACCESS, 2017, 5 :1137-1145
[16]   A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing [J].
Lin, Guofeng ;
Hong, Hanshu ;
Sun, Zhixin .
IEEE ACCESS, 2017, 5 :9464-9475
[17]   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud [J].
Liu, Xuefeng ;
Zhang, Yuqing ;
Wang, Boyang ;
Yan, Jingbo .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1182-1191
[18]  
Liu Z, 2011, LECT NOTES COMPUT SC, V6879, P278, DOI 10.1007/978-3-642-23822-2_16
[19]   ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION [J].
Mueller, Sascha ;
Katzenbeisser, Stefan ;
Eckert, Claudia .
BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) :803-819
[20]   Attribute-Based Encryption with Non-Monotonic Access Structures [J].
Ostrovsky, Rafail ;
Sahai, Amit ;
Waters, Brent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :195-+