Volume 51 | Number 2 | Year 2017 | Article Id. IJMTT-V51P514 | DOI : https://doi.org/10.14445/22315373/IJMTT-V51P514
With the rapid development of the distributed computing and internet architectures, there is an exponential demand for data processing and sharing resources in the cloud environment. The third-party provider needs to implement trusted access control and confidentiality for the cloud customers. Also, it is highly recommendable for the large scale applications to support one to many communications to reduce the data encryption and decryption mode. Ensuring the security and access of the cloud data is a major issue, as users often store their sensitive data with the third party authorities, but these TPA may be interested. The access control mechanism ensures that trusted clients are able to access data and unauthorized clients are not able to access data from the remote cloud server. Most of the client’s data stored in the remote cloud server are highly sensitive and need to secure against third party authorities and unauthorized users. In this paper, traditionally, Attribute based encryption and decryption such as CP-ABE, KP-ABE,HPABE, Homomorphic ABE approaches are studied with different security parameters. Also, an analysis of the different attribute based encryption techniques along with limitations and security challenges are discussed.
[1] S. Zhu, Y. Han and Y. Wei, “Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption”, “International Conference on Intelligent Networking and Collaborative Systems”, pp. 257-261, 2015.
[2] G. S. Tamizharasi, B. Balamurugan and R. Manjula, “Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing “, “Proceedings of the International Conference on Informatics and Analytics. ACM”, 2016.
[3] B. Chandrasekaran and R. Balakrishnan, “Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment”, “Proceedings of the International Conference on Informatics and Analytics. ACM”, 2016.
[4] A. Kaci and T. Bouabana-Tebibel, “Access Control Reinforcement over Searchable Encryption “, “IEEE IRI 2014, August 13-15, 2014, San Francisco, California, USA”, pp.130- 137, 2014.
[5] J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage”, “International Journal Of Communication Systems International Joirnal of Communication System,2015.
[6] L. Li, X. Chen and H. Jiang, “P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for Clouds “, “17th IEEE/ACIS International Conference on. IEEE”, pp.1-6, 2016.
[7] S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen and W. Xie, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing”, “IEEE Transactions on Information Forensics and Security 11.6”, pp.1265-1277, 2016.
[8] L. Warren and H. Chi, “Securing EHRs via CPMA Attribute- Based Encryption on Cloud Systems “, “Proceedings of the 2014 ACM Southeast Regional Conference. ACM”, 2014.
[9] F. Xhafa, J. Li, G. Zhao, J. Li, X. Chen and D. S. Wong, “Designing cloud-based electronic health record system with attribute-based encryption”, “Multimedia Tools and Applications 74.10 (2015)”, pp. 3441-3458, 2014.
[10] H. Yan, X. Li and J. Du, “Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing”, “Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing”, pp.329-332, 2014.
[11] Y. Zhang, D. Zheng, Q. Li, J. Li and H. Li, “Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing”, “Security and Communication Networks 9.16 ”, pp. 3688-3702, 2016.
[12] L. Zhenpeng, Z. Xianchao and Z. Shouhua, “Multi authority attribute based encryption with attribute revocation”, “IEEE 17th International Conference on Computational Science and Engineering”, pp. 1872-1876, 2014.
S Kranthi Kumar, Dr. P. V Siva Kumar, M Venkata Krishna Rao, "A Comparative Study of different attribute based encyrption models for cloud data security," International Journal of Mathematics Trends and Technology (IJMTT), vol. 51, no. 2, pp. 113-118, 2017. Crossref, https://doi.org/10.14445/22315373/IJMTT-V51P514