High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Analysis of Attribute Based Encryption Techniques in Cloud Computing Environment

Author(s):

Sanga Pavankalyan , KL UNIVERSITY; S Pavankalyan, KL UNIVERSITY; Ch. Swathi Sri, KL UNIVERSITY; P. Balaji Reddy, KL UNIVERSITY

Keywords:

Scalability, Flexibility, Access Control and Trusted Authority

Abstract

In cloud computing, mobile devices can store personal data from anywhere at any time. The data security and privacy are the major concerns for the cloud. The data transfer should be flexible, scalable, and access control must be maintained in the cloud system. Substantial studies have been conducted to improve the cloud security. There are several existing works for access control, computation overhead and efficiency of the methods. This study is a complete analysis of these methods on various schemes for (ABE) attribute encryption technique. These methods are studied and analyzed for their limitations that consist of Attribute Based Encryption (ABE), Key Policy Attribute Based Encryption (KP-ABE), Cipher text Policy Attribute based encryption (CP-ABE), Cipher text Policy Attribute-Set based Encryption (CP-ASBE), Multiple authority Attribute based encryption (MA-ABE), Batch Attribute Based Encryption (BABE), Hybrid identity-based encryption (HIBE), Hierarchical Attribute Based Encryption (HABE), Hierarchical Attribute Set Based Encryption (HASBE). To achieve scalability, and access control in cloud computing HASBE was implemented. By applying a delegation algorithm to ASBE, the HASBE model integrates a hierarchical structure to device users. HASBE allows compound attributes and also achieves effective user revocation due to multiple attribute values. So, HASBE is the most efficient algorithm among the compared algorithms.

Other Details

Paper ID: IJSRDV7I90294
Published in: Volume : 7, Issue : 9
Publication Date: 01/12/2019
Page(s): 333-339

Article Preview

Download Article