Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-qu...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5366 https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6370 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-63702020-11-19T06:56:40Z Attribute-based encryption for cloud computing access control: A survey ZHANG, Yinghui DENG, Robert H. XU, Shengmin SUN, Jianfei LI, Qi ZHENG, Dong Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out. 2020-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5366 info:doi/10.1145/3398036 https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Attribute-based encryption cloud computing access control survey Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Attribute-based encryption cloud computing access control survey Information Security |
spellingShingle |
Attribute-based encryption cloud computing access control survey Information Security ZHANG, Yinghui DENG, Robert H. XU, Shengmin SUN, Jianfei LI, Qi ZHENG, Dong Attribute-based encryption for cloud computing access control: A survey |
description |
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out. |
format |
text |
author |
ZHANG, Yinghui DENG, Robert H. XU, Shengmin SUN, Jianfei LI, Qi ZHENG, Dong |
author_facet |
ZHANG, Yinghui DENG, Robert H. XU, Shengmin SUN, Jianfei LI, Qi ZHENG, Dong |
author_sort |
ZHANG, Yinghui |
title |
Attribute-based encryption for cloud computing access control: A survey |
title_short |
Attribute-based encryption for cloud computing access control: A survey |
title_full |
Attribute-based encryption for cloud computing access control: A survey |
title_fullStr |
Attribute-based encryption for cloud computing access control: A survey |
title_full_unstemmed |
Attribute-based encryption for cloud computing access control: A survey |
title_sort |
attribute-based encryption for cloud computing access control: a survey |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/5366 https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf |
_version_ |
1770575434578132992 |