CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Attribute based Encryption in Cloud Computing – A Review

by B. Firdaus Begam, M. Sasikala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 19
Year of Publication: 2021
Authors: B. Firdaus Begam, M. Sasikala
10.5120/ijca2021921084

B. Firdaus Begam, M. Sasikala . Attribute based Encryption in Cloud Computing – A Review. International Journal of Computer Applications. 174, 19 ( Feb 2021), 36-38. DOI=10.5120/ijca2021921084

@article{ 10.5120/ijca2021921084,
author = { B. Firdaus Begam, M. Sasikala },
title = { Attribute based Encryption in Cloud Computing – A Review },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 19 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number19/31787-2021921084/ },
doi = { 10.5120/ijca2021921084 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:35.012351+05:30
%A B. Firdaus Begam
%A M. Sasikala
%T Attribute based Encryption in Cloud Computing – A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 19
%P 36-38
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Emerge of cloud computing technology over the world has caused a revolution in internet. The virtual usage of platform, infrastructure and software over cloud has provided an environment where the user can store and run the application from anywhere. This has led to think about security over data stored over cloud. In this paper, Attribute Based Keyword Search over encrypted data in cloud are discussed which provides security over searching of data based on keyword.

References
  1. N. Leavitt. 2009. Is cloud computing really ready for prime time?, Computer, 42(1), 15–25.
  2. P. Mell and T. Grance. 2009. The NIST definition of cloud computing, National Institute of Standards and Technology, 53(6).
  3. Ian Foster, Yong Zhao, Ioan Raicu, Shiyong Lu. 2008. Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop.
  4. Furht, B., 2010. Cloud computing fundamentals. In Handbook of cloud computing, Springer, Boston, MA, 3-19.
  5. Anup R. Nimje , V. T. Gaikwad, H. N. Datir. 2013. Attribute-Based Encryption Techniques in Cloud Computing Security: An Overview, International Journal of Computer Trends and Technology – 4(3).
  6. N. Chaudhari, M. Saini, A. Kumar and G. Priya, 2016. A Review on Attribute Based Encryption. 8th International Conference on Computational Intelligence and Communication Networks (CICN). Tehri,380-385.
  7. R.Ostrovsky, A. Sahai, and B. Waters. 2007. Attribute-based encryption with non-monotonic access structures. In Proc. of CCS’06, New York, NY.
  8. J. Bethencourt, A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption, IEEE Symp. Security and Privacy.
  9. Anand, Darpan & Khemchandani, Vineeta & Sharma, Rajendra, 2013. Identity-Based Cryptography Techniques and Applications (A Review). Proceedings - 5th International Conference on Computational Intelligence and Communication Networks, CICN. 343-348.
  10. Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri, Mahmoud Salmasizadeh, 2018, A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage. IEEE Transactions on Cloud Computing. 660 – 671.
  11. Hui Yin, Yinqiao Xiong, et.al., 2019. A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data. Electronics. 8(3).
  12. Kai Zhang , Ximeng Liu, et.al., 2020. A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud. IEEE Access. 8.
  13. C. Zhong, J. Zhang, Y. Xia, and H. Yu. 2010. Construction of a trusted SaaS platform. SOSE 2010. 244-251.
  14. B. R. Kandukuri, P. V. Ramakrishna, and A. Rakshit, 2009. Cloud security issues. SCC 2009. 517-520.
  15. Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. 2010. Security issues for cloud computing. International Journal of Information Security and Privacy (IJISP). 4(2). 36-48.
  16. Kamara, Seny & Lauter, Kristin. 2010. Cryptographic Cloud Storage. Financial Cryptography and Data Security. 136-149.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Cloud Computing Attribute Based Keyword Search.