Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The use of cloud computing has increased exponentially in data resources storage over the past few years. Cloud storage reduces the overall costs of server maintenance, whereby companies only pay for the resources they actually use in the cloud storage. Despite this, security concerns in cloud computing must be a top priority. One of the common encryption methods in cloud security is Attribute Based Encryption (ABE). ABE contains two types, namely, Ciphertext Policy-Attribute Based Encryption (CP-ABE) and Key Policy- Attribute based Encryption (KP-ABE). CP-ABE is better than KP-ABE, especially in reduplication issues and fine-grained access. However, issues in CP_ABE need further improvement. Improvement for the CP-ABE scheme has been growing rapidly since 2010 to date, and five main issues need improvement. This paper reviews the proposed CP-ABE schemes during the past three years.  These schemes focus on solving the five issues identified inherent in the CP-ABE scheme.

     


  • Keywords


    ABE Scheme, CP-ABE Scheme, CP-ABE Problems, Cloud Computing security.

  • References


      [1] Liew, S.-C., S.-W. Liew, and J.M. Zain, Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. Journal of digital imaging, (2013). 26(2): p. 316-325.

      [2] Zain, J.M., Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. arXiv preprint arXiv:1101.5188, (2011.

      [3] Chen, N. and M. Gerla. Dynamic attributes design in attribute based encryption. in Annual Conference of ITA (ACITA). University of Maryland:(2009).

      [4] Doshi, N. and D. Jinwala, Updating attribute in CP-ABE: A New Approach. IACR Cryptology ePrint Archive, (2012: p. 496.

      [5] Sahai, A. and B. Waters. Fuzzy identity-based encryption. in Annual International Conference on the Theory and Applications of Cryptographic Techniques.(2005) Springer.

      [6] Jiang, Y., et al. Ciphertext-policy attribute based encryption supporting access policy update. in International Conference on Provable Security.(2016) Springer.

      [7] Vaanchig, N., W. Chen, and Z. Qin. Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System. in International Conference on Advanced Cloud and Big Data (CBD).(2016) IEEE.

      [8] Yuan, W., Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption. IACR Cryptology ePrint Archive, (2016: p. 457.

      [9] Odelu, V., et al., Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer Standards & Interfaces, (2016.

      [10] Zhou, Z., D. Huang, and Z. Wang, Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Transactions on Computers, (2015). 64(1): p. 126-138.

      [11] Li, L., et al., A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram. IEEE Access, (2017). 5: p. 1137-1145.

      [12] Malluhi, Q.M., A. Shikfa, and V.C. Trinh. A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. in Asia Conference on Computer and Communications Security.(2017) ACM.

      [13] Tamizharasi, G., B. Balamurugan, and R. Manjula. Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing. in Proceedings of the International Conference on Informatics and Analytics.(2016) ACM.

      [14] Xu, J., et al., Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Transactions on Parallel and Distributed Systems, (2016). 27(1): p. 119-129.

      [15] Li, L., et al. P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. in 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).(2016) IEEE.

      [16] Tamizharasi, G., B. Balamurugan, and H.A. Gaffar. Privacy preserving ciphertext policy attribute based encryption scheme with efficient and constant ciphertextsize. in International Conference on Inventive Computation Technologies (ICICT).(2016) IEEE.

      [17] Shoukun, W., W. Kaigui, and W. Changze. Attribute-based solution with time restriction delegate for flexible and scalable access control in cloud storage. in Proceedings of the 9th International Conference on Utility and Cloud Computing.(2016) ACM.

      [18] Phuong, T.V.X., G. Yang, and W. Susilo, Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, (2016). 11(1): p. 35-45.

      [19] Vaduganathan, D. and S. Ramasami, Attribute Based Encryption with Attribute Hiding in Cloud Storage. International Journal for Trends In Engineering & Technology, (2015). 3(3).

      [20] Yadav, U.C. Ciphertext-policy attribute-based encryption with hiding access structure. in IEEE International on Advance Computing Conference (IACC).(2015) IEEE.

      [21] Yadav, U.C. and S.T. Ali. Ciphertext policy-hiding attribute-based encryption. in International Conference on Advances in Computing, Communications and Informatics (ICACCI).(2015) IEEE.

      [22] Jin, C., X. Feng, and Q. Shen. Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size. in Proceedings of the 6th International Conference on Communication and Network Security.(2016) ACM.

      [23] Li, J., Y. Shi, and Y. Zhang, Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage. International Journal of Communication Systems, (2015.

      [24] Huang, W.-B., W.-T. Su, and C.-S. Liang. A threshold-based key generation approach for ciphertext-policy attribute-based encryption. in Seventh International Conference on Ubiquitous and Future Networks (ICUFN).(2015) IEEE.

      [25] Rouselakis, Y. and B. Waters. Efficient statically-secure large-universe multi-authority attribute-based encryption. in International Conference on Financial Cryptography and Data Security.(2015) Springer.

      [26] Gorasia, N., et al., Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption. Procedia Computer Science, (2016). 79: p. 632-639.

      [27] Wei, J., W. Liu, and X. Hu, Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage. IEEE Systems Journal, (2016.

      [28] Rahman, M.S., A. Basu, and S. Kiyomoto. Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. in Trustcom/BigDataSE/I SPA.(2016) IEEE.

      [29] Jiang, Y., et al., Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Generation Computer Systems, (2017.

      [30] Rahman, M.S., A. Basu, and S. Kiyomoto. Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. in Trustcom/BigDataSE/I SPA, 2016 IEEE.(2016) IEEE.


 

View

Download

Article ID: 11215
 
DOI: 10.14419/ijet.v7i2.15.11215




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.