Attribute Based Cryptographically secure (ABCs) Encryption In Cloud Computing: Analysis and Comparative Study

نویسندگان

  • Rahul Vora
  • Priyanka Raval
  • Kunjal Garala
چکیده

In today’s digital world Cloud computing is a revolution knowledge for stream of computing as a utility. That is providing platform and services for enormous-scale of data storage and data manage. Big Data on cloud environment analyze, storage, manage, visualization, security are some challenges that requires more timing and large computation infrastructure processing. Security in terms of data Protection is one of the challenges that overcome use of cryptographic framework through access control mechanism. In this paper we discussed, compared and analyzed of Attribute Based Cryptographically secure (ABCs) Encryption algorithm. Keywords-Cloud Computing; Literature Survey; Comparative study; Cryptographic; ABE I. OUTLINE Cloud or distributed Computing is an innovation. It is not invention or discovery that is new building of old elements producing a new collaboration. It is the provision of computing facilities over the Internet that permit to use software and hardware that are manage at remote locations by third parties. Cloud service resources mainly lying on two aspects that (a) “Access anywhere and anytime” and (b) “Pay-as-you-go. Recently Cloud Computing has become one of the popular techniques used by both industry and educational institutions in order to provide flexible way to store and access the data files. Cloud Computing can be defined as “structural model that defines computing services where resources as well as data are retrieved from cloud service provider via Internet through some well-formed web-based tools and application.” The further of this paper is structured as: Section II presents Contextual of ABE. Section III delivers Literature Survey. Section IV presents construction of ABE scheme and cp-abe toolkit and Section V shows the conclusion and future work. II. CONTEXTUAL OF ABE The term encryption mentions to converting the original data into human illegible form and reverse is known as decryption. The data encrypting only the authorized person can decode to achieve confidentiality. The attribute based cryptographically secure encryption is verified algorithm for cloud computing environment. In ABE scheme, attribute plays significant role. It generally includes encrypting the attributes neither encrypting the entire data. Attributes have been exploited to generate a public key for encryption data and have been used as an access policy to control users’ access [1]. Based on the access policy, subsequent researches can be roughly categorized as either key-policy or ciphertext-policy. The fig 1 represents the taxonomy of different types of ABE. Figure 1. Taxonomy of ABE International Journal of Advance Research in Engineering, Science & Technology (IJAREST) (Special Issue for ITECE 2016), e-ISSN: 2393-9877, print-ISSN: 2394-2444 All Rights Reserved, @IJAREST-2016 2 The first KP-ABE scheme that allows any monotone access structures was proposed by Goyal et al. [2], and the first CP-ABE scheme was presented by Bethencourt et al. [3]. After that, several antiquity of ABE schemes were proposed as shown in figure 2. Figure 2. Antiquity of ABE KP-ABE: Key-Policy Attribute Based Encryption CP-ABE: Ciphertext-Policy Attribute Based Encryption FIBE : Fuzzy Identity Based Encryption PRE : Proxy Re-Encryption CL : Constant –Length The cryptographic secure access control ensures that ABE technique is widely used in the Cloud Computing. Two main ABE schemes exist in the literature, namely: The Key Policy Attribute Based Encryption (KP-ABE) scheme and the Cipher-text Policy Attribute Based Encryption (CP-ABE) scheme as shown below: 2.1 KP-ABE The Key-Policy Attribute Based Encryption (KP-ABE) is an ABE scheme where the access structure is embedded in the users' private keys, while the cipher-texts are labeled with attributes [4]. A user is able to decrypt a cipher-text if the latter attributes satisfy the access structure of the key [4]. Figure 3 shows the scheme of KP-ABE. 2.2 CP-ABE The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) differs from KP-ABE in that the keys are used to describe the users' attributes and the policy defining who is able to decrypt data is embedded in the ciphertext [4]. Figure 4 shows the scheme of CP-ABE. International Journal of Advance Research in Engineering, Science & Technology (IJAREST) (Special Issue for ITECE 2016), e-ISSN: 2393-9877, print-ISSN: 2394-2444 All Rights Reserved, @IJAREST-2016 3 Figure 3. Scheme of KPABE [4] Figure 4. Scheme of CP-ABE [4] III. LITERATURE SURVEY Balamurugan et al. [6] discussed revenue of cloud computing as well as importance of encryption method in cloud critical application or server. Also described features of Attribute Based Encryption (ABE) such as delivers flexible access control with the help of different key management approaches, low-cost, easy and secure from others encryption techniques. Also described classification of cloud based High, Medium and low critical applications through different attributes such as timeliness, accuracy, security, privacy, etc. Also showed critical application chart that based on risk. They proposed simplified based ABE algorithm with the help of digital signature, private key, public key, hash function mapping, access structures and secret key functionalities. Also in that proposed algorithm 3 level security with dual authentication and secret keyprivate key matching concepts using hash function was there so quite difficult to hack it, so, if all 3 level was successfully executed then and then decrypt the original data and secure for user as well as CSP point of view. Tebibel et al. [4] proposed to improve confidentiality of outsourced data and when search was performed over encrypted data, emphasizing access control on search result with the help of ACAS ( Access Control Aware Search) principle for personalized or multi user accessing data. Due to limits as Extra filer authority on the user side, trust mechanisms as well as maintenance and highly searching time were found in Kaci et al. (2014) proposed method, they proposed xSE-ACAS for reducing time, parallelization, multi keyword search and showed the advantages behind the used of two access control techniques performance. xSE-ABE model designed for ensuring access control on the result of searchable encryption to integrate SSE with ABE (CP-ABE) access policy. xSE-ACAS model designed for securing data outsourced to the cloud that known to be “honest-but-curious”. Because search services behaves honestly but catch some confidential information of users. Also, that consider as multi keywords search and sequential search. Horvath et al. [7] made ABE more effective for access control to storing data in the cloud and focused on access rights, key management, user revocation and different authorities. System was made feasible by removing or computational overhead from CSP or distributed over large number of users. To avoiding re-encryption of all cipher texts that access structure contain subset of attributes of the revoked user, proposed scheme that adds ID based user revocation feature to distributed CP-ABE for security and efficiency. Here we study the no of research paper and then make the Literature survey table and comparative study table for the different techniques in ABE. International Journal of Advance Research in Engineering, Science & Technology (IJAREST) (Special Issue for ITECE 2016), e-ISSN: 2393-9877, print-ISSN: 2394-2444 All Rights Reserved, @IJAREST-2016 4 Ref no Paper Title Description & Methods Input Parameters Observed Technique [4] Parallel search over encrypted data under ABE on the Cloud To improve confidentiality of outsourced data and proposed xSEACAS for multi keyword searching and xSE-ABE model symmetric key K, Build Index I “honest-but-curious” –search services [5] Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing To proposed novel access control policy based on CP-ABE to achieve fine-grandees and effectively implemented operation of user revocation PK, MK, M, SSK, New file creation, New User Grant, User Revocation AND, Or, Not, Threshold, Preventing Collusion, Data Confidentiality [6] Enhanced Attribute Based Encryption for Cloud Computing. To proposed simplified based ABE algorithm with the help of digital signature, private key, public key, hash function mapping, access structures and secret key functionalities. PK, SK, Hash function H(x), Digital Signature Dual Authentication [7] Attribute-Based Encryption Optimized for Cloud Computing More effective for access control to storing data in the cloud & focused on access rights, key management, user revocation and different authorities. Linear Secret Sharing Schemes (LSSS), Global Setup(λ), Central Authority Setup(GP) prevent collusion attacks, identitybased user revocation in multiauth. CP-ABE [8] A Novel approach for searchable CP-ABE with hidden Ciphertext-policy To Proposed to new searchable CP-ABE scheme that allows the authorized user to check whether the ciphertext contains specific set of keywords or not Test multiple keywords searching and collusion resistant Discrete Logarithm Problem a ∈ Zp, DBDH assumption, Access structure, GenToken(MSK,K), Encrypt_KS(MPK, CT, KW): AND gate with negative attributes and

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems

Attribute-based encryption is a form of encryption which offers the capacity to encrypt data such that it is only accessible to individuals holding a satisfactory configuration of attributes. As cloud and distributed computing become more pervasive in both private and public spheres, attribute-based encryption holds potential to address the issue of achieving secure authentication, authorizatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016