Skip to main content

Survey of Attribute-Based Encryption in Cloud Environment

  • Conference paper
  • First Online:
Cognitive Cities (IC3 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1227))

Included in the following conference series:

  • 1517 Accesses

Abstract

Cloud computing develop quickly, which has powerful computing ability and allows authorized users to store and transmit data on cloud servers. Therefore, the security of applications in the cloud environment becomes an inevitable challenge. Therefore, many scholars at home and abroad have studied how to improve the security in cloud environment. The emergence of attribute-based encryption (ABE) has made it a better choice to improve cloud security. Subsequently, since ciphertext attribute-based encryption (CP-ABE) is more suitable for cloud storage than key attribute-based encryption (KP-ABE). Therefore, in view of the efficiency and security of CP-ABE, the CP-ABE’s access structure and revocation mechanism are studied in depth. Finally, we summarizes the weaknesses of the existing ABE schemes and points out the future research directions. So the paper provides a reference for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vernik, G., et al.: Data on-boarding in federated storage clouds. In: 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, pp. 244–251 (2013). https://doi.org/10.1109/cloud.2013.54

  2. Feng, D.G., Zhang, M., Zhang, Y., et al.: Cloud computing security research. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  3. Zhang, P.F.: Research on data security in cloud storage. Sci. Guide (6) (2016)

    Google Scholar 

  4. An Overview of Public Key Infrastructures (PKI). Techotopia. Accessed 26 March 2015

    Google Scholar 

  5. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_40

    Chapter  Google Scholar 

  6. Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_3

    Chapter  Google Scholar 

  7. Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005). https://doi.org/10.1007/11535218_16

    Chapter  Google Scholar 

  8. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  9. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  10. Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.): Network and System Security. LNCS, vol. 8792. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11698-3

    Book  Google Scholar 

  11. Xu, J.J., Hong, H.H., Lin, G.F., Sun, Z.X.: A new inter-domain information sharing smart system based on ABSES in SDN. IEEE Access 6, 12790–12799 (2018). https://doi.org/10.1109/ACCESS.2017.2788443

    Article  Google Scholar 

  12. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  13. Barolli, L., Zhang, M., Wang, X.A. (eds.): Advances in Internetworking, Data & Web Technologies. Lecture Notes on Data Engineering and Communications Technologies. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-59463-7

    Book  Google Scholar 

  14. Hammersley, J.M.: The zeros of a random polynomial. In: Proceedings of the Third Berkeley Symposium on Mathematical Statistics and Probability. Contributions to Probability Theory, vol. 2, pp. 89–111. University of California Press, Berkeley (1956)

    Google Scholar 

  15. Yaseen, Q., Jararweh, Y., Al-Ayyoub, M., AlDwairi, M.: Collusion attacks in Internet of Things: detection and mitigation using a fog based model. In: 2017 IEEE Sensors Applications Symposium (SAS), Glassboro, NJ, pp. 1–5 (2017)

    Google Scholar 

  16. Han, F., Qin, J., Zhao, H.W., Hu, J.K.: A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30, 107–115 (2013)

    Article  Google Scholar 

  17. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  18. Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM (2010)

    Google Scholar 

  19. Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 311–329. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-05284-2_18

    Chapter  Google Scholar 

  20. Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 8(5), 481–490 (1997)

    Article  Google Scholar 

  21. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)

    Google Scholar 

  22. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68914-0_7

    Chapter  Google Scholar 

  23. Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_2

    Chapter  Google Scholar 

  24. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)

    Google Scholar 

  25. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47

    Chapter  Google Scholar 

  26. Liang, X., Cao, Z., Lin, H., et al.: Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 343–352. ACM (2009)

    Google Scholar 

  27. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  28. Beimel, A.: Secure schemes for secret sharing and key distribution. Technion-Israel Institute of Technology, Faculty of Computer Science (1996)

    Google Scholar 

  29. Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_13

    Chapter  Google Scholar 

  30. Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)

    Article  Google Scholar 

  31. Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Mediated ciphertext-policy attribute-based encryption and its application. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 309–323. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10838-9_23

    Chapter  Google Scholar 

  32. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. ACM (2007)

    Google Scholar 

  33. Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03298-1_16

    Chapter  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lu, Y., Wang, Y., Dai, X., Li, J., Li, J., Chen, M. (2020). Survey of Attribute-Based Encryption in Cloud Environment. In: Shen, J., Chang, YC., Su, YS., Ogata, H. (eds) Cognitive Cities. IC3 2019. Communications in Computer and Information Science, vol 1227. Springer, Singapore. https://doi.org/10.1007/978-981-15-6113-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6113-9_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6112-2

  • Online ISBN: 978-981-15-6113-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics