Abstract
Cloud computing is a rising paradigm used to store and compute the statistics remotely in the cloud. As the data on the server is shared with many users, providing the security has become a vital issue. To encrypt the information securely, various cryptographic algorithms are used. Attribute-based encryption (ABE) is exploited for providing safety as well as fine-grained access control. Access control (AC) is presented before the information is outsourced into the cloud. In this study, based on the security requirement, various attribute-based encryption schemes are exposed. In order to encrypt the documents/information more efficiently, distinct encipher projects are presented in a future enhancement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ray I (2014) Trust-based access control for secure cloud computing. In: Han K, Choi BY, Song S (eds) High performance cloud control and applications. Springer, New York
Ma J, Li X, Zhang J, Miao Y (2017) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans IT Serv Bol 99
Shamir A (1985) Identity-based crypto systems and signature schemes. In: Advances in cryptology. Springer, pp 47–53
Waters B, Sahai A (2005)“Fuzzy Identity-based encryption. In: Proceedings of progress in cryptology, Euro Crypt, pp 457–473
Herranz J, Attrapadung N, Panafieu De E, Libert, B (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theor Comput Sci 15–38
Moon S, Park Y, Rifki S (2015) A fully secure ciphertext policy attribute-based encryption with a tree-based access structure. J Inf Sci Eng
Liu Q, Wu J, Wang G (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: As part of the 17th ACM. ACM, pp 735–737
Pandey O, Waters B, Goyal V, Sahai A (2006) Attribute based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM conference on computer and communications
Bettencourt J, Water B, Sahai A (2007) Ciphertext-policy attribute-based encryption. IEEE symposium on security and privacy (SP '07), pp 321–334
Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. In IEEE Syst J 12(2):1767–1777
Qin B, Wu Q, Deng H, Liu J, Zhang L (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384
Wang G, Wu J, Guo M (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5)
Zhou J, Wang S, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans 6(11)
Zhang B, Jia X, Yang K (2013) Effective data access control for multiauthority cloud storage system. In: Proceedings of IEEE information communication
Chase M (2007) Multi-authority attribute based encryption. In: Vadhan SP (eds) Theory of cryptography. TCC 2007. Lecture notes in computer science, vol 4392. Springer, Berlin, Heidelberg Â
Coyne E, Sandhu R (1996) Role-based access control model. IEEE Comput 29(2):38–47
Ferraiolo D, Vincent H, Sandlin K, Schnitzer A, Miller R (2014) Guide to attribute based access control (ABAC) definition and considerations. Special Publication in NIST
Sandhia GK, Bhaskar GK (2016) Secure data sharing using attribute based encryption in cloud computing. J Chem Pharm Sci 9(4)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ravinder Reddy, B., Anil Kumar, A. (2020). Survey on Access Control Mechanisms in Cloud Environments. In: Chillarige, R., Distefano, S., Rawat, S. (eds) Advances in Computational Intelligence and Informatics. ICACII 2019. Lecture Notes in Networks and Systems, vol 119. Springer, Singapore. https://doi.org/10.1007/978-981-15-3338-9_18
Download citation
DOI: https://doi.org/10.1007/978-981-15-3338-9_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3337-2
Online ISBN: 978-981-15-3338-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)