Attribute based encryption in cloud computing: A survey, gap analysis, and future directions

被引:54
|
作者
Kumar, Praveen P. [1 ]
Kumar, Syam P. [2 ]
Alphonse, P. J. A. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Hyderabad, Andhra Pradesh, India
关键词
Cloud computing; Attribute based encryption; Key policy; Ciphertext policy; Fine-grained access control; Revocation mechanism; DATA ACCESS-CONTROL; PROXY RE-ENCRYPTION; BIG DATA; EFFICIENT; SECURE; STORAGE; REVOCATION; DEVICES;
D O I
10.1016/j.jnca.2018.02.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing facilitates to store and access the data remotely over the internet. However, storing the data in the untrusted cloud server leads the privacy and access control issues in the cloud. The traditional encryption schemes such as symmetric and asymmetric schemes are not suitable to provide the access control due to lack of flexibility and fine-grained access control. One of the prominent cryptographic technique to provide privacy and fine-grained access control in cloud computing is Attribute Based Encryption. In this paper, we comprehensively survey the various existing key policy and ciphertext policy attribute based encryption schemes based on access structure, and multi-authority schemes. Moreover, this review explores more on ciphertext policy attribute based encryption in different aspects such as hidden policy, proxy re-encryption, revocation mechanism, and hierarchical attribute based encryption. Further, this paper compares different ABE schemes based on the features, security, and efficiency. This paper also identifies the suitability of attribute based encryption for practical applications. Finally, this paper analyze the different ABE schemes to find out the research gap and challenges that needs to be investigated further on the Attribute Based Encryption.
引用
收藏
页码:37 / 52
页数:16
相关论文
共 50 条
  • [21] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [22] Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
    Zhang, Yinghui
    Zheng, Dong
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 807 - 814
  • [23] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [24] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [25] Cloud computing: Challenges and future directions
    Choo, Kim-Kwang
    TRENDS AND ISSUES IN CRIME AND CRIMINAL JUSTICE, 2010, (400):
  • [26] A survey on attribute-based encryption schemes of access control in cloud environments
    Hwang, M.-S. (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [27] Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing
    Aravinth, S. S.
    Ramkumar, M.
    Rajkumar, B.
    Anitha, M.
    Elangodi, S.
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 110 - 113
  • [28] Survey of Post-Quantum Lattice-Based Ciphertext-Policy Attribute-Based Encryption Schemes for Cloud Storage: Taxonomy, Open Issues, and Future Directions
    Sravya, Gudipati
    Kumar, Pasupuleti Syam
    Padmavathy, R.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4540 - 4557
  • [29] Optimization of live virtual machine migration in cloud computing: A survey and future directions
    Noshy, Mostafa
    Ibrahim, Abdelhameed
    Ali, Hesham Arafat
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 110 : 1 - 10
  • [30] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19