Attribute-based Encryption for Cloud Computing Access Control: A Survey

被引:118
作者
Zhang, Yinghui [1 ,2 ]
Deng, Robert H. [2 ]
Xu, Shengmin [2 ]
Sun, Jianfei [2 ]
Li, Qi [3 ]
Zheng, Dong [4 ,5 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Singapore Management Univ, Singapore 178902, Singapore
[3] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[4] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金; 新加坡国家研究基金会; 国家重点研发计划;
关键词
Attribute-based encryption; cloud computing; access control; survey; CONSTANT-SIZE CIPHERTEXTS; PROXY RE-ENCRYPTION; MULTI-AUTHORITY; PRIVACY PROTECTION; CP-ABE; SECURE; EFFICIENT; DECRYPTION; REVOCATION; BROADCAST;
D O I
10.1145/3398036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out.
引用
收藏
页数:41
相关论文
共 119 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]  
[Anonymous], 1994, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/3-540-48329-2
[3]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]  
[Anonymous], 2013, P 8 ACM S INF COMP C
[5]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[10]   Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions [J].
Boyen, Xavier ;
Li, Qinyi .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :267-284