Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Review on Attribute Based Encryption Techniques of Access Control in Cloud Computing


Affiliations
1 Department of Computer Science, K.L. Mehta Dayanand College for Women, Faridabad, Haryana, India
     

   Subscribe/Renew Journal


Cloud computing has emerged as a marked change in the field of Information Technology. Services like “on-demand” and “pay-as-you-go” has caused the migration of government as well as industries IT infrastructures to cloud. As data and business logic is stored at remote cloud server, the security concerns related to cloud environment is different from conventional computing. In cloud computing, security of data is managed by CSPs and the data owner has no control over the security policy of his own data. The security and privacy are two significant factors that restrain the user from switching to untrusted cloud environment. Though switching to cloud cut IT costs enormously but secure data sharing always remain concern for data owners. Thus, these two areas need more focus for making secure data sharing in cloud computing environment. In this paper we have reviewed and compared various schemes for attribute based encryption in respect of cloud computing.

Keywords

Access Control, Attribute Based Encryption, Cloud Computing, CP-ABE, CP-ASBE, HASBE, KP-ABE.
Subscription Login to verify subscription
User
Notifications
Font Size



  • A Review on Attribute Based Encryption Techniques of Access Control in Cloud Computing

Abstract Views: 460  |  PDF Views: 0

Authors

Shobha Chawla
Department of Computer Science, K.L. Mehta Dayanand College for Women, Faridabad, Haryana, India

Abstract


Cloud computing has emerged as a marked change in the field of Information Technology. Services like “on-demand” and “pay-as-you-go” has caused the migration of government as well as industries IT infrastructures to cloud. As data and business logic is stored at remote cloud server, the security concerns related to cloud environment is different from conventional computing. In cloud computing, security of data is managed by CSPs and the data owner has no control over the security policy of his own data. The security and privacy are two significant factors that restrain the user from switching to untrusted cloud environment. Though switching to cloud cut IT costs enormously but secure data sharing always remain concern for data owners. Thus, these two areas need more focus for making secure data sharing in cloud computing environment. In this paper we have reviewed and compared various schemes for attribute based encryption in respect of cloud computing.

Keywords


Access Control, Attribute Based Encryption, Cloud Computing, CP-ABE, CP-ASBE, HASBE, KP-ABE.

References