Research Article | Open Access | Download PDF
Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P143 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P143
Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview
Mr. Anup R. Nimje , Prof. V. T. Gaikwad ,Prof. H. N. Datir
Citation :
Mr. Anup R. Nimje , Prof. V. T. Gaikwad ,Prof. H. N. Datir, "Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 419-423, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P143
Abstract
Cloud computing is going to be very famous technology in IT enterprises. For an enterprise, the data stored is huge and it is very precious. All tasks are performed through networks. Hence, it becomes very important to have the secured use of data. In cloud computing, the most important concerns of security are data security and privacy. And also flexible and scalable, fine grained access control must be maintained in the cloud systems. For access control, being one of the classic research topics, many schemes have been proposed and implemented. There are policy based schemes have been proposed. In this paper, we are going to explore various schemes for encryption that consist of Attribute based encryption (ABE) and its types KP-ABE, CP-ABE. Further discussion consists of improvement in CP-ABE to CP-ASBE and to HASBE. A comparison table has been included for comparative study of these techniques.
Keywords
Access control, Attribute based encryption, Key policy, ciphertext policy, hierarchical-ASBE.
References
[1] D.Boneh and M. Franklin. “Identity-Based Encryption from the Weil Pairing.” In Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.
[2] J.Bethencourt, A. Sahai, and B. Waters. “Ciphertext-Policy AttributeBased Encryption.” In Proc. of SP’07, Washington, DC, USA, 2007.
[3] A.Sahai and B. Waters. “Fuzzy Identity-Based Encryption.” In Proc. of EUROCRYPT’05, Aarhus,Denmark, 2005.
[4] V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data”. In Proc. of CCS’06, Alexandria, Virginia, USA, 2006.
[5] R.Ostrovsky, A. Sahai, and B. Waters. “Attribute-based encryption with non-monotonic access structures”. In Proc. of CCS’06, New York, NY, 2007.
[6] Zhibin Zhou, Dijiang Huang” On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption”
[7] Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran, “AttributeSets: A Practically Motivated Enhancement to Attribute-Based Encryption”, July 27, 2009
[8] J. Bethencourt, A. Sahai and B. Waters, “Ciphertext-policy attribute based encryption,” IEEE Symp. Security and Privacy, Oakland, CA, 2007.
[9] G.Wang, Q. Liu, and J.Wu, “Hierachical attibute-based encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010.
[10] Zhiguo Wan, Jun’e Liu, and Robert H. Deng, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing” IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012