Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

被引:54
|
作者
Kumar, Praveen P. [1 ]
Kumar, Syam P. [2 ]
Alphonse, P. J. A. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Hyderabad, Andhra Pradesh, India
关键词
Cloud computing; Attribute based encryption; Key policy; Ciphertext policy; Fine-grained access control; Revocation mechanism; DATA ACCESS-CONTROL; PROXY RE-ENCRYPTION; BIG DATA; EFFICIENT; SECURE; STORAGE; REVOCATION; DEVICES;
D O I
10.1016/j.jnca.2018.02.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing facilitates to store and access the data remotely over the internet. However, storing the data in the untrusted cloud server leads the privacy and access control issues in the cloud. The traditional encryption schemes such as symmetric and asymmetric schemes are not suitable to provide the access control due to lack of flexibility and fine-grained access control. One of the prominent cryptographic technique to provide privacy and fine-grained access control in cloud computing is Attribute Based Encryption. In this paper, we comprehensively survey the various existing key policy and ciphertext policy attribute based encryption schemes based on access structure, and multi-authority schemes. Moreover, this review explores more on ciphertext policy attribute based encryption in different aspects such as hidden policy, proxy re-encryption, revocation mechanism, and hierarchical attribute based encryption. Further, this paper compares different ABE schemes based on the features, security, and efficiency. This paper also identifies the suitability of attribute based encryption for practical applications. Finally, this paper analyze the different ABE schemes to find out the research gap and challenges that needs to be investigated further on the Attribute Based Encryption.
引用
收藏
页码:37 / 52
页数:16
相关论文
共 50 条
  • [1] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [2] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [3] Enhanced Attribute Based Encryption for Cloud Computing
    Kumar, Saravana N.
    Lakshmi, Rajya G., V
    Balamurugan, B.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 689 - 696
  • [4] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [5] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [6] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [7] Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing
    Vahidhunnisha, J.
    Ramasamy, S.
    Balasubramaniam, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (12): : 51 - 55
  • [8] Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
    Gunjal, Yogita S.
    Gunjal, Mahesh S.
    Tambe, Avinash R.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 187 - 190
  • [9] Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions
    Edemacu, Kennedy
    Park, Hung Kook
    Jang, Beakcheol
    Kim, Jong Wook
    IEEE ACCESS, 2019, 7 : 89614 - 89636
  • [10] Mobile Cloud Computing: A Survey, State of Art and Future Directions
    Rahimi, M. Reza
    Ren, Jian
    Liu, Chi Harold
    Vasilakos, Athanasios V.
    Venkatasubramanian, Nalini
    MOBILE NETWORKS & APPLICATIONS, 2014, 19 (02): : 133 - 143