A Survey on Attribute Based Encryption Techniques

Authors

  • S. Shiny  Department of Computer Science, Ponjesly College of Engineering, Tamil Nadu, India
  • Dr. J. Jasper  Department of EEE, Ponjesly College of Engineering, Tamil Nadu, India
  • Dr. M. R. Geetha  Department of ECE, Ponjesly College of Engineering, Tamil Nadu, India

Keywords:

Access control, Attribute Based Encryption, Key policy, ciphertext policy

Abstract

Cloud computing is a currently emerged computing paradigm . The data stored and transferred in cloud are enormous and valuable. Privacy and security becomes the significant factors in protecting the data. Fine grained ,scalable access control should be maintained in the cloud.Many schemes have been proposed and implemented for access control and security. In this paper we are going to explore various schemes for Attribute Based Encryption (ABE) and its various types.

References

  1. A.Sahai, B.Waters, Fuzzy identity- based encryption , in : Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques,EUROCRYPT’05, Springer-Verlag, Berlin, Heidelberg, 2005, pp. 457- 473.
  2. V.Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute based encryption for fine grained access control of encrypted data, in Proc. ACM conf. Computer and communication , 2006.
  3. J. Bethencourt, A. Sahai, and B. Waters ,Ciphertext policy attribute based encryption , in Proceedings IEEE Symposium Security and Privacy , 2007.
  4. S. Rifki, Y. Park and S.Moon, A fully secure cipher text policy attribute based encryption with a tree based access structure , Journal of Information Science and Engineering, vol 31, pp. 247- 265, 2015.
  5. R. Bobba, H. Khuranaand, and M.Prabhakaran, Attribute sets: A Practically motivated enhanced to attribute based encryption, in proc. Esorics, Saint Malo, France , 2009.
  6. G. Wang, Q. Liu, and J. Wu, Hierarchical attribute based encryption for fine grained access control in cloud storage services, in Proc. ACM Conf. Computer and Communication Security, 2010.
  7. Z.Wan , J. Liu, and H. Deng, Hasbe: A Hierarchical attribute based solution for flexible and scalable access control in cloud computing , IEEE Transaction on Information Forensics and security, vol. 7, no. 2, pp. 743-754, 2012.
  8. D. Hephzi Rachel and S. Prathiba, An enhanced Hasbe for cloud computing environment, International Journal of computer science and mobile computing, vol. 2, pp. 396-401, 2013.
  9. Jing Wang, Chuanhe Huang, Neal N Xiong, Jinhai Wang, Blocked linear secret sharing for scalable attribute based encryption in manageable cloud storage system, Information sciences, vol. 424, pp. 1-26, 2018

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
S. Shiny, Dr. J. Jasper, Dr. M. R. Geetha, " A Survey on Attribute Based Encryption Techniques, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.41-44, March-April-2021.