Fine grained Access Control using Attribute-Based Encryption (ABE) Technique in Cloud Computing

Authors(2) :-N. Prudvi Kumar Reddy, Dr. E. Kesavulu Reddy

With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. It adopts CP-ABE, an access control technology used in normal cloud environment, but changes the structure of access control tree to make it suitable for mobile cloud environments. LDSS moves a large portion of the computational intensive access control tree transformation in CP-ABE from mobile devices to external proxy servers. Furthermore, to reduce the user revocation cost, it introduces attribute description fields to implement lazy-revocation, which is a thorny issue in program based CP-ABE systems. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption (ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.

Authors and Affiliations

N. Prudvi Kumar Reddy
PG Scholar, Department of Computer Science S.V.University, Tirupati, Andhra Pradesh, India
Dr. E. Kesavulu Reddy
PG Scholar, Department of Computer Science S.V.University, Tirupati, Andhra Pradesh, India

Attribute-Based Encryption, Cloud Computing, Fine-Grained Access

  1. Hamblen J O, van Bekkum G M E.An embedded systems laboratory to support rapid prototyping of robotics and the Internet of Things.IEEE Trans Edu, 2013, 56: 121–128
  2. Ning H, Hu S.Technology classification, industry, and education for future Internet of Things.Int J Commun Syst, 2012, 25: 1230–1241
  3. He M.The evolution and future trends of technology and information sciences.In: Proceedings of WASE International Conference on Information Engineering (ICIE 2009), Taiyuan, 2009.11–15
  4. Zhou T C, Lyu M R T, King I, et al.Learning to suggest questions in social media.Knowl Inf Syst, 2014: 1–28
  5. Ning H, He W, Hu S, et al.Space-time registration for physical-cyber world mapping in Internet of Things.In: Proceedings of IEEE 12th International Conference on Computer and Information Technology (CIT2012), Chengdu, 2012.307–310
  6. Balasubramaniam S, Kangasharju J.Realizing the Internet of Nano Things: challenges, solutions, and applications.Computer, 2013, 46: 62–68 25 Akyildiz I F, Jornet J M.The Internet of Nano-Things.IEEE Wirel Commun, 2010, 17: 58–63
  7. Dowling P J, Miburn G J.Quantum technology: the second quantum revolution.Phil Trans Roy Soc A-Math Phy, 2003, 361: 1655–1674
  8. D.R.Kuhn, E.J.Coyne, and T.R.Weil, "Adding Attributes to Role- Based Access Control," IEEE Computer, vol.43, no.6, pp.79-81, June 2010.
  9. M.Li, S.Yu, K.Ren, and W.Lou, "Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings," Proc.Sixth Int’l ICST Conf.Security and Privacy in Comm.Networks (SecureComm),pp.89- 106, 2010.
  10. S.Yu, C.Wang, K.Ren, and W.Lou, "Attribute Based Data Sharing with Attribute Revocation," Proc.ACM Symp.Information, Computer and Comm.Security (ASIACCS), pp.261-270, 2010.
  11. G.Wang, Q.Liu, and J.Wu, "Hierarchical AttributeBased Encryption for Fine-Grained Access Control in Cloud Storage Services," Proc.17th ACM Conf.Computer and Comm.Security (CCS), pp.735-737, 2010.
  12. F.Zhao, T.Nishide, and K.Sakurai, "Realizing FineGrained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems," Proc.Seventh Int’l Conf.Information Security Practice and Experience (ISPEC), pp.83-97, 2011.
  13. A.Sahai and B.Waters, "Fuzzy Identity-Based Encryption," Proc.Ann.Int’l Conf.Advances in Cryptology (EUROCRYPT), pp.457-473, 2005.
  14. M.Chase, "Multi-Authority Attribute Based Encryption," Proc.Fourth Conf.Theory of cryptography (TCC), pp.515-534, 2007.
  15. S.Ruj, M.Stojmenovic, and A.Nayak, "Privacy Preserving Access Control with Authentication for Securing Data in Clouds," Proc.IEEE/ACM Int’l Symp.Cluster, Cloud and Grid Computing, pp.556- 563, 2012.
  16. S.Ruj, M.Stojmenovic, and A.Nayak, "Privacy Preserving Access Control with Authentication for Securing Data in Clouds," Proc.IEEE/ACM Int’l Symp.Cluster, Cloud and Grid Computing, pp.556- 563, 2012.
  17. C.Wang, Q.Wang, K.Ren, N.Cao, and W.Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Trans.Services Computing, vol.5, no.2, pp.220-232, Apr.- June 2012.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1199-1202
Manuscript Number : CSEIT1833583
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

N. Prudvi Kumar Reddy, Dr. E. Kesavulu Reddy, "Fine grained Access Control using Attribute-Based Encryption (ABE) Technique in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1199-1202, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview