CFP last date
20 May 2024
Reseach Article

A Review of Attribute based Encryption Technique for Security in Cloud Computing

by Etti Mathur, Manish Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 3
Year of Publication: 2017
Authors: Etti Mathur, Manish Sharma
10.5120/ijca2017912895

Etti Mathur, Manish Sharma . A Review of Attribute based Encryption Technique for Security in Cloud Computing. International Journal of Computer Applications. 159, 3 ( Feb 2017), 43-45. DOI=10.5120/ijca2017912895

@article{ 10.5120/ijca2017912895,
author = { Etti Mathur, Manish Sharma },
title = { A Review of Attribute based Encryption Technique for Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 3 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number3/26985-2017912895/ },
doi = { 10.5120/ijca2017912895 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:48.081858+05:30
%A Etti Mathur
%A Manish Sharma
%T A Review of Attribute based Encryption Technique for Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 3
%P 43-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a talented model which based on cloud services and cloud providers. Cloud computing allows user to slightly store their data in server side. Cloud computing provides services which provides services on demand and anywhere. In data storage data security and privacy are the critical issues which provide data confidentiality and access control. Attribute based encryption is a prominent technique to which provides security and privacy in cloud computing environment. Data is encrypted and managed by data owner which eliminates data replication in cloud environment. In ABE there are many properties for encryption data which generates public key and used to control access to the user. In this survey we used access structures which are monotonic and non-monotonic etc.ABE techniques are analyzed for the cloud computing environment. In this paper we review the various scheme for encryption and finally we made a comparison by taking some criteria in the respect of cloud computing.

References
  1. Dr. Ananthi Sheshasaayee, and K. Geetha B. Waters, “An Efficient Presentation of Attribute Based Encryption Design in Cloud Data”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
  2. Minu George, Dr. C.Suresh Gnanadhas, Saranya.K, “A Survey on Attribute Based Encryption Scheme in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013.
  3. Mr. Anup R. Nimje, Prof. V. T. Gaikwad ,Prof. H. N. Datir, “Attribute-Based Encryption Techniques in Cloud Computing Security: An Overview”, International Journal of Computer Trends and Technology- volume4 ,Issue3- 2013.
  4. Surya Prabha.U.S, Marikkannu.P, Arul Vineeth.A.D , “Cipher text Policy Attribute Set Based Encryption with One-Fold Data Access in Cloud,” International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-4 Number-1 Issue-14 March-2014
  5. Saravana Kumar Na,Rajya Lakshmi G.Vb ,Balamurugan Ba , “Enhanced Attribute Based Encryption for Cloud Computing,” International Conference on Information and Communication Technologies (ICICT 2014)
  6. M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and Athena Vakali, Cloud computing: Distributed internet computing for it and scienti¯c research," IEEE Internet Computing, vol. 13, pp. 10 {13, 2009.
  7. Jin Sun, Yupu Hu, Leyou Zhang,” A Key-policy Attribute-Based Broadcast Encryption,” The International Arab Journal of Information Technology, vol.10, No.5, September 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Attribute based encryption Security Key policy cipher text policy hierarchical-ASBE.