A Review on Attribute Based Encryption Techniques of Access Control in Cloud Computing
Published: 2018
Author(s) Name: Shobha Chawla |
Author(s) Affiliation: Assist. Prof., Dept. of Comp. Scie., K.L. Mehta Dayanand College for Women, Haryana, India.
Locked
Subscribed
Available for All
Abstract
Cloud computing has emerged as a marked change in the field of Information Technology. Services like on-demand and pay-as-you-go has caused the migration of government as well as industries IT infrastructures to cloud. As data and business logic is stored at remote cloud server, the security concerns related to cloud environment is different from conventional computing. In cloud computing, security of data is managed by CSPs and the data owner has no control over the security policy of his own data. The security and privacy are two significant factors that restrain the user from switching to untrusted cloud environment. Though switching to cloud cut IT costs enormously but secure data sharing always remain concern for data owners. Thus, these two areas need more focus for making secure data sharing in cloud computing environment. In this paper we have reviewed and compared various schemes for attribute based encryption in respect of cloud computing.
Keywords: Access control, Attribute based encryption, Cloud computing, CP-ABE, CP-ASBE, HASBE, KP-ABE.
View PDF