Attribute-based encryption for cloud computing access control: A survey

Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-qu...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Yinghui, DENG, Robert H., XU, Shengmin, SUN, Jianfei, LI, Qi, ZHENG, Dong
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5366
https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6370
record_format dspace
spelling sg-smu-ink.sis_research-63702020-11-19T06:56:40Z Attribute-based encryption for cloud computing access control: A survey ZHANG, Yinghui DENG, Robert H. XU, Shengmin SUN, Jianfei LI, Qi ZHENG, Dong Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out. 2020-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5366 info:doi/10.1145/3398036 https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Attribute-based encryption cloud computing access control survey Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Attribute-based encryption
cloud computing
access control
survey
Information Security
spellingShingle Attribute-based encryption
cloud computing
access control
survey
Information Security
ZHANG, Yinghui
DENG, Robert H.
XU, Shengmin
SUN, Jianfei
LI, Qi
ZHENG, Dong
Attribute-based encryption for cloud computing access control: A survey
description Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out.
format text
author ZHANG, Yinghui
DENG, Robert H.
XU, Shengmin
SUN, Jianfei
LI, Qi
ZHENG, Dong
author_facet ZHANG, Yinghui
DENG, Robert H.
XU, Shengmin
SUN, Jianfei
LI, Qi
ZHENG, Dong
author_sort ZHANG, Yinghui
title Attribute-based encryption for cloud computing access control: A survey
title_short Attribute-based encryption for cloud computing access control: A survey
title_full Attribute-based encryption for cloud computing access control: A survey
title_fullStr Attribute-based encryption for cloud computing access control: A survey
title_full_unstemmed Attribute-based encryption for cloud computing access control: A survey
title_sort attribute-based encryption for cloud computing access control: a survey
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/5366
https://ink.library.smu.edu.sg/context/sis_research/article/6370/viewcontent/Attribute_based_encryption_cloud_computing_ac_av.pdf
_version_ 1770575434578132992