Study and Scope of Signcryption for Cloud Data Access Control

  • Somen DebnathEmail author
  • Morrel V. L. Nunsanga
  • Bubu Bhuyan
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 41)


As cloud storage service provides convenience, high computation and a capable service from local to remote server through the internet; it attracts the user to outsource data from remotecloud server. Storing and outsourcing of sensitive data directly to multi-tenant cloud is unsafe and it also raises the privacy and security issues. Ciphertext Policy-Attribute Based Encryption (CP-ABE) with attribute based signature (ABS) provides confidentiality and anonymous authentication for such environment and called Attribute Based Syncryption(ABSC). This technique can acquire security and privacy together, which might be more suitable for cloud data outsourcing. This paper delivers a widespread survey on attribute-based signcryption schemes to finding out the suitability and requirements for access control of outsourced cloud data and identify the research gap. Moreover, we compare the existing scheme’s functionality and characteristic to analyses efficiency and performance of recent attribute-based signcryption to fulfill outsourcing properties.


Access control Data outsourcing Security Privacy Attribute-based signcryption 


  1. 1.
    Chen, C., Chen, J., Lim, H.W., Zhang, Z., Feng, D.: Combined public-key schemes: the case of ABE and ABS. In: International Conference on Provable Security, pp. 53–69. Springer (2012)Google Scholar
  2. 2.
    Chen, D.: Data security and privacy protection issues in cloud computing (973), 647–651 (2012)Google Scholar
  3. 3.
    Emura, K., Miyaji, A., Rahman, M.S.: Dynamic attribute-based signcryption without random oracles. Int. J. Appl. Cryptogr. 2(3), 199–211 (2012)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Gagné, M., Narayan, S., Safavi-Naini, R.: Threshold attribute-based signcryption. In: International Conference on Security and Cryptography for Networks, pp. 154–171. Springer (2010)Google Scholar
  5. 5.
    Hong, H., Sun, Z.: An efficient and secure attribute based signcryption scheme with lsss access structure. SpringerPlus 5(1), 644 (2016)CrossRefGoogle Scholar
  6. 6.
    Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 568–588. Springer (2011)Google Scholar
  7. 7.
    Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 52, 67–76 (2015)CrossRefGoogle Scholar
  8. 8.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures. Springer, Berlin, Heidelberg, 6558 LNCS:376–392 (2011)CrossRefGoogle Scholar
  9. 9.
    Pandit, T., Pandey, S.K., Barua, R.: Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack. In: International Conference on Provable Security, pp. 274–290. Springer (2014)Google Scholar
  10. 10.
    Rao, Y.S.: A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)CrossRefGoogle Scholar
  11. 11.
    Ruj, S., Stojmenovic, M.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib. Syst. 25(2), 384–394 (2014)CrossRefGoogle Scholar
  12. 12.
    Wang, C., Huang, J.: Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism. In: 2011 Seventh International Conference on Computational Intelligence and Security (CIS), pp. 905–909. IEEE (2011)Google Scholar
  13. 13.
    Wei, J., Xuexian, H., Liu, W.: Traceable attribute-based signcryption. Secur. Commun. Netw. 7(12), 2302–2317 (2014)CrossRefGoogle Scholar
  14. 14.
    Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)CrossRefGoogle Scholar
  15. 15.
    Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In: Annual International Cryptology Conference, pp. 165–179. Springer (1997)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Somen Debnath
    • 1
    Email author
  • Morrel V. L. Nunsanga
    • 1
  • Bubu Bhuyan
    • 2
  1. 1.Department of Information TechnologyMizoram UniversityAizawlIndia
  2. 2.Department of Information TechnologyNorth Eastrn Hill UniversityShillongIndia

Personalised recommendations