A SURVEY ON ATTRIBUTE-BASED ACCESS CONTROL MECHANISMS IN CLOUD ENVIRONMENT
Creators
- 1. *1M.Tech Scholar, Computer Networks and Security, Government Engineering College Wayanad, Kerala, India 2Assistant Professor, Computer Science Engineering, Government Engineering College Wayanad, Kerala, India
Description
Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provides users with services, applications, storage and so on. Due to the internet based storage of cloud computing there exist a lot of security risks for the outsourced data. Several techniques including attribute based encryption (ABE) is introduced to provide security to the outsourced data. Most of the outsourced data in cloud suffer from large complexity in implementing access policies. In Attribute-based Encryption (ABE)[4] scheme, attributes has a very important role where a set of values are treated as user identity. Encryption and decryption is done using these set of values. ABE scheme is further extended to key-policy attribute based encryption (KP-ABE)[6] and ciphertext-policy attribute based encryption (CP-ABE)[2]. Other schemes are hierarchical attribute-based encryption (HABE)[3] scheme and the hierarchical attribute-set-based encryption(HASBE)[1] scheme. In this paper we conduct a survey on various attribute based access control techniques which provides security for the data in cloud computing.
Files
Files
(329.7 kB)
Name | Size | Download all |
---|---|---|
md5:6d4c51bc32911850bc7a27f1c6039b1f
|
329.7 kB | Download |