TY - GEN
T1 - A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
AU - Thangavel, M.
AU - Varalakshmi, P.
AU - Abinaya, C.
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2018/8/20
Y1 - 2018/8/20
N2 - In the digital era, Cloud data outsourcing attracts lots of attention for data storage, retrieval, and sharing. To ensure data security, Attribute-based Encryption has been suggested by various researchers. According to the researchers, ABE (Attribute-based Encryption) is the most assuring method for granting cloud data owners and users to access data in a convenient manner. A set of attributes becomes an identifier for the user or owner to access data. It also successfully assimilates encryption and access control for sharing secret data among groups. Non-efficiency and non-existence of the attribute revocation mechanism is the open problem in an Attribute-Based Encryption Scheme. The two classes of Attribute based Encryption mechanism, such as CP-ABE (Ciphertext-Policy Attribute-based Encryption) and KP-ABE (Key Policy Attribute-based Encryption) concepts are utilized to solve various data sharing security issues in a cloud environment. In this paper, researchers suggested techniques based on Attribute based Encryption for secure data sharing in Cloud has been studied and compared with appropriate performance metrics.
AB - In the digital era, Cloud data outsourcing attracts lots of attention for data storage, retrieval, and sharing. To ensure data security, Attribute-based Encryption has been suggested by various researchers. According to the researchers, ABE (Attribute-based Encryption) is the most assuring method for granting cloud data owners and users to access data in a convenient manner. A set of attributes becomes an identifier for the user or owner to access data. It also successfully assimilates encryption and access control for sharing secret data among groups. Non-efficiency and non-existence of the attribute revocation mechanism is the open problem in an Attribute-Based Encryption Scheme. The two classes of Attribute based Encryption mechanism, such as CP-ABE (Ciphertext-Policy Attribute-based Encryption) and KP-ABE (Key Policy Attribute-based Encryption) concepts are utilized to solve various data sharing security issues in a cloud environment. In this paper, researchers suggested techniques based on Attribute based Encryption for secure data sharing in Cloud has been studied and compared with appropriate performance metrics.
KW - Access Control
KW - Attribute-Based encryption
KW - Cloud
KW - Data Outsourcing
KW - Data Retrieval
KW - Data sharing
KW - Data Storage
UR - http://www.scopus.com/inward/record.url?scp=85053421562&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85053421562&partnerID=8YFLogxK
U2 - 10.1109/ICoAC.2017.8441420
DO - 10.1109/ICoAC.2017.8441420
M3 - Conference contribution
AN - SCOPUS:85053421562
SN - 9781538643495
T3 - 2017 9th International Conference on Advanced Computing, ICoAC 2017
SP - 261
EP - 266
BT - 2017 9th International Conference on Advanced Computing, ICoAC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Conference on Advanced Computing, ICoAC 2017
Y2 - 14 December 2017 through 16 December 2017
ER -