Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2013 by IJCTT Journal|
|Volume-4 Issue-3 |
|Year of Publication : 2013|
|Authors : Mr. Anup R. Nimje , Prof. V. T. Gaikwad ,Prof. H. N. Datir|
Mr. Anup R. Nimje , Prof. V. T. Gaikwad ,Prof. H. N. Datir "Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview"International Journal of Computer Trends and Technology (IJCTT),V4(3):419-423 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Cloud computing is going to be very famous technology in IT enterprises. For an enterprise, the data stored is huge and it is very precious. All tasks are performed through networks. Hence, it becomes very important to have the secured use of data. In cloud computing, the most important concerns of security are data security and privacy. And also flexible and scalable, fine grained access control must be maintained in the cloud systems. For access control, being one of the classic research topics, many schemes have been proposed and implemented. There are policy based schemes have been proposed. In this paper, we are going to explore various schemes for encryption that consist of Attribute based encryption (ABE) and its types KP-ABE, CP-ABE. Further discussion consists of improvement in CP-ABE to CP-ASBE and to HASBE. A comparison table has been included for comparative study of these techniques.
 A.Sahai and B. Waters. “Fuzzy Identity-Based Encryption.” In Proc. of EUROCRYPT’05, Aarhus,Denmark, 2005.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data”. In Proc. of CCS’06, Alexandria, Virginia, USA, 2006.
 R.Ostrovsky, A. Sahai, and B. Waters. “Attribute-based encryption
 Zhibin Zhou, Dijiang Huang” On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption”
Keywords—Access control, Attribute based encryption, Key policy, ciphertext policy, hierarchical-ASBE.