A Survey on Applications of Attribute Based Encryption in Various Networks
Keywords:
Adhoc Networks, Cryptographical ApproachAbstract
We collect various informations by using several sources and use different types of networks to share the gathered informations, the cloud networks is used to share the information to the larger audience over an internet, the delay tolerant networks is used to share the information over the adhoc networks, the fog computing network is used to share the information to the devices residing at the edge of network. The security and privacy issues of those networks are the great concerns among the researchers. The Attribute Based Encryption has been the most promising cryptographical approach for the decades to secure the data in transit and storage in the above mentioned networks. In this paper we survey the applications of attribute based encryption and their security requirements and performance measurement evaluation methods in the above mentioned networks.
References
- K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Comput., vol. 16, no. 1, pp. 69–73, Jan. 2012.
- V. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–151, Jan. 2016.
- A. Kate, G. M. Zaverucha, and U. Hengartner, “Anonymity and security in delay tolerant networks,” in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007, pp. 504–513.
- S. Yi, Z. Qin, and Q. Li, “Security and Privacy Issues of Fog Computing: A Survey,” in
- Wireless Algorithms, Systems, and Applications, 2015, pp. 685–695.
- Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wirel. Netw., vol. 20, no. 8, pp. 2481–2501, Nov. 2014.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based Encryption for Fine-grained Access Control of Encrypted Data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, NY, USA, 2006, pp. 89–98.
- T. S. Fun and A. Samsudin, “Attribute Based Encryption—A Data Centric Approach for Securing Internet of Things (IoT),” Adv. Sci. Lett., vol. 23, no. 5, pp. 4219–4223, May 2017.
- Z. Qiao, S. Liang, S. Davis, and H. Jiang, “Survey of attribute based encryption,” in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on, 2014, pp. 1–6.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” in
- 2007 IEEE Symposium on Security and Privacy (SP ’07), 2007, pp. 321–334.
- R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-based Encryption with Non-monotonic Access Structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, NY, USA, 2007, pp. 195–203.
- S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, “A framework and compact constructions for non-monotonic attribute-based encryption,” in International Workshop on Public Key Cryptography, 2014, pp. 275–292.
- M. A. Benamara and H. Li, “Secure of Personal Health Records Shared in Cloud Computing Using Cipher-text Attribute Based Encryption,” Int J Secur Netw, vol. 10, no. 3, pp. 183–190, Sep. 2015.
- “GRIN - Securing personal health records in the cloud by using attribute based encryption. A review.” [Online]. Available: http://www.grin.com/en/e- book/315416/securing-personal-health-records-in-the-cloud-by-using-attribute-based.
- M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.
- K. Fan, N. Huang, Y. Wang, H. Li, and Y. Yang, “Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption,” in Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on, 2015, pp. 111–114.
- L. Gao, S. Yu, T. H. Luan, and W. Zhou, Delay Tolerant Networks. Cham: Springer International Publishing, 2015.
- S. Roy and M. Chuah, Secure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption (CP-ABE) System for the DTNs. .
- A. Sudarsono and T. Nakanishi, “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption,” J. Inf. Process., vol. 25, pp. 234–243, 2017.
- H. Kwon, D. Kim, C. Hahn, and J. Hur, “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimed. Tools Appl., pp. 1–15, Jan. 2016.
- I. Stojmenovic, S. Wen, X. Huang, and H. Luan, “An overview of Fog computing and its security issues,” Concurr. Comput. Pract. Exp., vol. 28, no. 10, pp. 2991–3005, Jul. 2016.
- S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing: Concepts, Applications and Issues,” in Proceedings of the 2015 Workshop on Mobile Big Data, New York, NY, USA, 2015, pp. 37–42.
- A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, “An Attribute-Based Encryption Scheme to Secure Fog Communications,” IEEE Access, vol. 5, pp. 9131–9138, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.