A Survey on Attribute Based Encryption Techniques
Keywords:
Access control, Attribute Based Encryption, Key policy, ciphertext policyAbstract
Cloud computing is a currently emerged computing paradigm . The data stored and transferred in cloud are enormous and valuable. Privacy and security becomes the significant factors in protecting the data. Fine grained ,scalable access control should be maintained in the cloud.Many schemes have been proposed and implemented for access control and security. In this paper we are going to explore various schemes for Attribute Based Encryption (ABE) and its various types.
References
- A.Sahai, B.Waters, Fuzzy identity- based encryption , in : Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques,EUROCRYPT’05, Springer-Verlag, Berlin, Heidelberg, 2005, pp. 457- 473.
- V.Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute based encryption for fine grained access control of encrypted data, in Proc. ACM conf. Computer and communication , 2006.
- J. Bethencourt, A. Sahai, and B. Waters ,Ciphertext policy attribute based encryption , in Proceedings IEEE Symposium Security and Privacy , 2007.
- S. Rifki, Y. Park and S.Moon, A fully secure cipher text policy attribute based encryption with a tree based access structure , Journal of Information Science and Engineering, vol 31, pp. 247- 265, 2015.
- R. Bobba, H. Khuranaand, and M.Prabhakaran, Attribute sets: A Practically motivated enhanced to attribute based encryption, in proc. Esorics, Saint Malo, France , 2009.
- G. Wang, Q. Liu, and J. Wu, Hierarchical attribute based encryption for fine grained access control in cloud storage services, in Proc. ACM Conf. Computer and Communication Security, 2010.
- Z.Wan , J. Liu, and H. Deng, Hasbe: A Hierarchical attribute based solution for flexible and scalable access control in cloud computing , IEEE Transaction on Information Forensics and security, vol. 7, no. 2, pp. 743-754, 2012.
- D. Hephzi Rachel and S. Prathiba, An enhanced Hasbe for cloud computing environment, International Journal of computer science and mobile computing, vol. 2, pp. 396-401, 2013.
- Jing Wang, Chuanhe Huang, Neal N Xiong, Jinhai Wang, Blocked linear secret sharing for scalable attribute based encryption in manageable cloud storage system, Information sciences, vol. 424, pp. 1-26, 2018
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST
This work is licensed under a Creative Commons Attribution 4.0 International License.