Published April 5, 2019 | Version v1
Journal article Open

A SURVEY ON ATTRIBUTE-BASED ACCESS CONTROL MECHANISMS IN CLOUD ENVIRONMENT

  • 1. *1M.Tech Scholar, Computer Networks and Security, Government Engineering College Wayanad, Kerala, India 2Assistant Professor, Computer Science Engineering, Government Engineering College Wayanad, Kerala, India

Description

Cloud computing is a top emerging technology in the IT industry. It is a computing mode, which provides users with services, applications, storage and so on. Due to the internet based storage of cloud computing there exist a lot of security risks for the outsourced data. Several techniques including attribute based encryption (ABE) is introduced to provide security to the outsourced data. Most of the outsourced data in cloud suffer from large complexity in implementing access policies. In Attribute-based Encryption (ABE)[4] scheme, attributes has a very important role where a set of values are treated as user identity. Encryption and decryption is done using these set of values. ABE scheme is further extended to key-policy attribute based encryption (KP-ABE)[6] and ciphertext-policy attribute based encryption (CP-ABE)[2]. Other schemes are hierarchical attribute-based encryption (HABE)[3] scheme and the hierarchical attribute-set-based encryption(HASBE)[1] scheme. In this paper we conduct a survey on various attribute based access control techniques which provides security for the data in cloud computing.

Files

Files (329.7 kB)

Name Size Download all
md5:6d4c51bc32911850bc7a27f1c6039b1f
329.7 kB Download