Journal Home > Volume 21 , Issue 1

Cloud computing has become a significant computing model in the IT industry. In this emerging model, computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption (ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.


menu
Abstract
Full text
Outline
About this article

Analysis of Classical Encryption Techniques in Cloud Computing

Show Author's information Muhammad Yasir ShabirAsif IqbalZahid Mahmood( )AtaUllah Ghafoor
Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan.
School of Computer & Communication Engineering, University of Science and Technology, Beijing 100083, China.
Department of Computer Science, National University of Modern Languages, Islamabad 44000, Pakistan.

Abstract

Cloud computing has become a significant computing model in the IT industry. In this emerging model, computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption (ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.

Keywords: cloud computing, access control, fine-grained access, weighted attribute

References(34)

[1]
Krogstie J., Model-Based Development and Evolution of Information Systems: A Quality Approach. Springer, 2012.
DOI
[2]
Wan Z., Liu J. E., and Deng R. H., A hierarchical attribute-based solution for flexible and scalable access control, IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754, 2012.
[3]
Balamurugan B. and Venkata Krishna P., Extensive survey on usage of attribute based encryption in cloud, Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, pp. 263–272, 2014.
[4]
Li M., Yu S., Zheng Y., Ren K., and Lou W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013.
[5]
Purushothama B. R. and Amberker B. B., Access control mechanisms for outsourced data in cloud, in Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on. IEEE, 2012.
DOI
[6]
Vijayalakshmi A. and Arunapriya R., Authentication of data storage using decentralized access control in clouds, Journal of Global Research in Computer Science, vol. 5, no. 9, pp. 1–4, 2014.
[7]
Punithasurya K. and Priya J., Analysis of different access control mechanism in cloud, International Journal of Applied Information Systems, vol. 4, 2012. .
[8]
Shamir A., Identity-based cryptosystems and signature schemes, in Advances in Cryptology, Blakley G. R. and Chaum D., eds. Springer Berlin Heidelberg, 1985.
[9]
Ning H. and Liu H., Cyber-physical-social-thinking space based science and technology framework for the Internet of Things, SCIENCE CHINA Information Sciences, vol. 58, no. 3, pp. 1–19, 2015.
[10]
Li K., Hu T. X., and Fen L. J., Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability, SCIENCE CHINA Information Sciences, vol. 57, no. 11, pp. 1–14, 2014.
[11]
Ghafoor A., Sher M., Imran M., and Saleem K., A lightweight key freshness scheme for wireless sensor networks, in 12th International Conference on Information Technology - New Generations, 2015.
DOI
[12]
Lee C. C., Chung P., and Hwang M. S., A survey on attribute-based encryption schemes of access control in cloud environments, International Journal of Network Security, vol. 15, no. 4, pp. 231–240, 2013.
[13]
Garg S., Gentry C., and Halevi S., Candidate multilinear maps from ideal lattices, in Eurocrypt, 2013.
DOI
[14]
Garg S., Gentry C., Halevi S., Sahai A., and Waters B., Attribute-based encryption for circuits from multilinear maps, Lecture Notes in Computer Science, vol. 8043, pp. 479–499, 2013.
[15]
Sahai A. and Waters B., Fuzzy identity based encryption, in Proc. Advances in Cryptology-Eurocrypt, 2005, pp. 457–473.
DOI
[16]
Singh P. and Singh S., Cross bread role based access control for extended security at Azure in cloud computing, International Journal of Application or Innovation in Engineering and Management, vol. 2, no. 2, pp. 205–208, 2013.
[17]
Goyal V., Pandey O., Sahai A., and Waters B., Attribute based encryption for fine-grained access control of encrypted data, in Proc. ACM Conf. Computer and Communications, 2006.
DOI
[18]
Et-Al C. Vinoth, Secure data storage in cloud by using asymmetric key management based encryption, in Ijsrset, 2015.
[19]
Gaikwad R., Dakhane D. M., and Pardhi R. L., Implementation and analysis of network security using Hasbe, International Journal of Emerging Trends & Technology in Computer Science, vol. 3, vol. 2, pp. 170–174, 2014.
[20]
Bethencourt J., Sahai A., and Waters B., Cipher text-policy attribute based encryption, in Proceeding IEEE Symposium Security and Privacy, 2007.
DOI
[21]
Rifki S., Park Y., and Moon S., A fully secure cipher text-policy attribute-based encryption with a tree-based access structure, Journal of Information Science and Engineering, vol. 31, pp. 247–265, 2015.
[22]
Bobba R., Khuranaand H., and Prabhakaran M., Attribute-sets: A practically motivated enhanced to attribute-based encryption, in Proc. Esorics, Saint Malo, France, 2009.
[23]
Poornima B. and Rajendran T., Improving cloud security by enhanced Hasbe using hybrid encryption scheme, in 2014 World Congress on Computing and Communication Technologies, 2013.
DOI
[24]
Wang G., Liu Q., and Wu J., Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, in Proc. ACM Conf. Computer and Communication Security, 2010.
DOI
[25]
Wan Z., Liu J., and Deng H., Hasbe: A hierarchical attribute based solution for flexible and scalable access control in cloud computing, IEEE Transaction on Information Forensics and Security, vol. 7, no. 2, pp. 743–754, 2012.
[26]
Gaikwad R. L., Dakhane D. M., and Pardhi R. L., Implementation of network security model in cloud computing using encryption technique, International Journal of Recent Advances in Engineering & Technology, vol. 1, no. 2, pp. 51–56, 2013
[27]
Rachel D. Hephzi and Prathiba S., An enhanced Hasbe for cloud computing environment, International Journal of Computer Science and Mobile Computing, vol. 2, no. 4, pp. 396–401, 2013.
[28]
Aravinth S. S. and Ramkumar M., Empowered service delegation with attribute encryption for distributed cloud computing, in Current Trends in Engineering and Technology (ICCTET), 2013 International Conference on, Coimbatore, India, 2013.
DOI
[29]
Krishna N. and Bhavani L., Hasbe: A hierarchical attribute set based encryption for flexible, scalable and fine grained access control in cloud computing, International Journal of Computer & Organization Trends, vol. 3, no. 9, pp. 294–301, 2013.
[30]
Liu X., Zhu H., Ma J., Xiong J., Li Q., and Jun M., Cipher text-policy weighted attribute based encryption for fine-grained access control, in 2013 5th International Conference On Intelligent Networking And Collaborative Systems, 2013.
DOI
[31]
Liu X., Zhu H., Ma J., and Ma S., Key-policy weighted attribute based encryption for fine-grained access control, in Icc14-W5: Workshop on Secure Networking and Forensic Computing, 2014.
DOI
[32]
Yang K., Jia X., Ren K., and Zhang B., Dac-Macs: Effective data access control for multi-authority cloud storage systems, in Proceedings of IEEE Infocom, 2013.
DOI
[33]
Yang K. and Jia X., Attributed-based access control for Multi authority systems in cloud storage, in Distributed Computing Systems (Icdcs), 2012 IEEE 32nd International Conference on, 2012, pp. 536–545.
DOI
[34]
Wang Y., Zhang D., and Zhong H., Multi-authority based weighted attribute encryption scheme in cloud computing, in 2014 10th International Conference on Natural Computation, 2014.
DOI
Publication history
Copyright
Rights and permissions

Publication history

Received: 15 October 2015
Revised: 06 December 2015
Accepted: 25 December 2015
Published: 04 February 2016
Issue date: February 2016

Copyright

© The author(s) 2016

Rights and permissions

Return