A Survey on Secure User Data Transaction using Attribute - Based Encryption Scheme over Cloud Data
Keywords:
Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search, Mobile Cloud Storage.Abstract
Cloud computing is an innovation which utilizes the Internet to store, oversee, and register the information, as opposed to a nearby server or a PC. Clients can access the cloud condition wherever they need on compensation for each utilization way. Transferring of delicate information on un-believed servers in the cloud is a testing assignment. Established encryption procedures are utilized when the re-appropriating of information in the cloud to give access control and secrecy. Access control instruments are not doable in the cloud as a result of the absence of adaptability, versatility, and fine-grained access control. As an option, So, Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and adaptability. Attribute-based encryption is an open key cryptographic strategy in which the private key and figure content are based on the attributes. ABE involves IBE, KP-ABE, and CP-ABE. In Identity-Based Encryption (IBE) the mystery key and the attributes are based on the character of the client. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE) a mystery key is gotten from the arrangement of attributes and the access strategy is defined over the universe of attributes inside the framework. In Key Policy – Attribute-Based Encryption (KP – ABE) the figure content is related to the arrangement of attributes and the mystery key is based on the access structure. This paper is a study of all ABE strategies and specialty an evaluation table about ABE keys job in cloud condition.
References
- Muhammad Yasir Shabir, Asif Iqbal, Zahid Mahmood and Ataullah Ghafoor, Analysis of Classical Encryption Techniques in Cloud Computing, IEEE Tsinghua Science & Technology, Vol.21, February 2016.
- A.Sahai and B.Waters, Fuzzy identity based encryption, in Proc. Advances in Cryptology – Eurocrypt, 2005, pp.457-473.
- Adi Shamir. Identity-based cryptosystems and signature schemes, in Proc. of CRYPTO 84 on Advances in cryptology, pages 47–53. SpringerVerlag New York, Inc., 1985.
- V.Goyal, O.Pandey, A.Sahai and B.Waters, Attribute based encryption for fine grained access control of encrypted data, in proc. ACM conf. computer and communications, 2006.
- J.Bethencourt, A.Sahai, and B.Waters, Ciphertext policy attribute based encryption, in proc. IEEE symposium security and privacy, 2007.
- K.Meena,S.Vinodhini, T.Pallavi & R.Vasugi,” Surveillance Based Gcm Home Security System Using Object Motion Detection”,International Innovative Research Journal of Engineering and Technology,pp.44-47,2016.
- S.Rifki, Y.Park, and S.Moon, A fully secure ciphertext policy attribute based encryption with a tree-based access structure, Journal of Information Science and Engineering, Vo.31, pp.247-265,2015.
- G.Wang, Q.Liu and J.Wu, Hierarchical attribute based encryption for fine grained access control in cloud storage services, in Proc. ACM conf. computer and communication security, 2010.
- K.Yang, X.Jia, K.Ren and B.Zhang, Dac-Macs: Effective data access control for multiauthority cloud storage systems, in Proc. Of IEEE Infocom, 2013.
- Shulan Wang, Junwei Zhou, Joseph K.Liu, Jianping Yu, Jianyong Chen and Weixin Xie, An efficient file hierarchy attribute based encryption scheme in cloud computing, IEEE Transactions on information forensics and security, Vol. 11, No.6, June 2016.
- Ximeng Liu, Jiafeng Ma, Jinbo Xiong, Qi Li, Jun Ma, Ciphertext – policy weighted attribute based encryption for fine grained access control, International conference on Intelligent networkings and collaborative systems, 2013.
- Shulan Wang, Kaitai Liang, Joseph K.Liu, Jianyong Chen, Jianping Yu, Weixin Xie, Attribute based data sharing scheme revisited in cloud computing, IEEE Transactions on information forensics and security, Vol.11, No.8, August 2016.
- G.K.Sandhia, G.K.Bhaskar, secure data sharing using attribute based encryption in cloud computing, Journal of Chemical & Pharmaceutical Sciences, Vol.9, December 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.