Abstract
Cloud computing develop quickly, which has powerful computing ability and allows authorized users to store and transmit data on cloud servers. Therefore, the security of applications in the cloud environment becomes an inevitable challenge. Therefore, many scholars at home and abroad have studied how to improve the security in cloud environment. The emergence of attribute-based encryption (ABE) has made it a better choice to improve cloud security. Subsequently, since ciphertext attribute-based encryption (CP-ABE) is more suitable for cloud storage than key attribute-based encryption (KP-ABE). Therefore, in view of the efficiency and security of CP-ABE, the CP-ABE’s access structure and revocation mechanism are studied in depth. Finally, we summarizes the weaknesses of the existing ABE schemes and points out the future research directions. So the paper provides a reference for further research.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vernik, G., et al.: Data on-boarding in federated storage clouds. In: 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, pp. 244–251 (2013). https://doi.org/10.1109/cloud.2013.54
Feng, D.G., Zhang, M., Zhang, Y., et al.: Cloud computing security research. J. Softw. 22(1), 71–83 (2011)
Zhang, P.F.: Research on data security in cloud storage. Sci. Guide (6) (2016)
An Overview of Public Key Infrastructures (PKI). Techotopia. Accessed 26 March 2015
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_40
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_3
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_16
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.): Network and System Security. LNCS, vol. 8792. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11698-3
Xu, J.J., Hong, H.H., Lin, G.F., Sun, Z.X.: A new inter-domain information sharing smart system based on ABSES in SDN. IEEE Access 6, 12790–12799 (2018). https://doi.org/10.1109/ACCESS.2017.2788443
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Barolli, L., Zhang, M., Wang, X.A. (eds.): Advances in Internetworking, Data & Web Technologies. Lecture Notes on Data Engineering and Communications Technologies. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-59463-7
Hammersley, J.M.: The zeros of a random polynomial. In: Proceedings of the Third Berkeley Symposium on Mathematical Statistics and Probability. Contributions to Probability Theory, vol. 2, pp. 89–111. University of California Press, Berkeley (1956)
Yaseen, Q., Jararweh, Y., Al-Ayyoub, M., AlDwairi, M.: Collusion attacks in Internet of Things: detection and mitigation using a fog based model. In: 2017 IEEE Sensors Applications Symposium (SAS), Glassboro, NJ, pp. 1–5 (2017)
Han, F., Qin, J., Zhao, H.W., Hu, J.K.: A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30, 107–115 (2013)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM (2010)
Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 311–329. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-05284-2_18
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 8(5), 481–490 (1997)
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68914-0_7
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_2
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47
Liang, X., Cao, Z., Lin, H., et al.: Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 343–352. ACM (2009)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Beimel, A.: Secure schemes for secret sharing and key distribution. Technion-Israel Institute of Technology, Faculty of Computer Science (1996)
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_13
Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Mediated ciphertext-policy attribute-based encryption and its application. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 309–323. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10838-9_23
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)
Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03298-1_16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lu, Y., Wang, Y., Dai, X., Li, J., Li, J., Chen, M. (2020). Survey of Attribute-Based Encryption in Cloud Environment. In: Shen, J., Chang, YC., Su, YS., Ogata, H. (eds) Cognitive Cities. IC3 2019. Communications in Computer and Information Science, vol 1227. Springer, Singapore. https://doi.org/10.1007/978-981-15-6113-9_43
Download citation
DOI: https://doi.org/10.1007/978-981-15-6113-9_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6112-2
Online ISBN: 978-981-15-6113-9
eBook Packages: Computer ScienceComputer Science (R0)