Attribute-Based Encryption Techniques: A Review Study on Secure Access to Cloud System

  • Conference paper
  • First Online:
Machine Learning and Computational Intelligence Techniques for Data Engineering (MISP 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 998))

Included in the following conference series:

  • 311 Accesses

Abstract

Cloud computing system is an emerging technique for fast and secure on-demand allocation of user data storage. Cloud computing offers better approaches to services types of assistance while fundamentally modifying the expense structure underlying those services. This paper summarizes the facts about the new technique implemented with cloud computing. The overall motive of the paper is to summarize the existing studies done on security issues and to clarify the characteristics required in proposing a novel technique of Attribute-based encryption used in cloud security. For analyzing exhibitions of models from various angles, related writing for identification of error, data sharing organized on a cloud, for complex framework structures will be investigated and contemplated. Cloud computing gives the best stage to organize data which is complex.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khalid A (2010) Cloud Computing: applying issues in Small Business. In: Intl. Conf. on Signal Acquisition and Process (ICSAP’10). pp. 278–281

    Google Scholar 

  2. KPMG (2010) From hype to future: KPMG’s 2010 Cloud Computing survey. Available at: http://www.techrepublic.com/whitepapers/from-hype-to-futurekpmgs-2010-cloud-computing-survey/2384291

  3. Rosado DG et al (2012) Security analysis in the migration to cloud environments. Futur Internet 4(2):469–487. https://doi.org/10.3390/fi4020469

    Article  Google Scholar 

  4. Mather T et al (2009) Cloud security and privacy. O’Reilly Media Inc., Sebastopol, CA

    Google Scholar 

  5. Gartner Inc. Gartner identifies the Top 10 strategic technologies for 2011. Online. Available at: http://www.gartner.com/it/page.jsp?id=1454221

  6. Bierer BE et al (2017) Data authorship as an incentive to data sharing. N Engl J Med 376(17):1684–1687. https://doi.org/10.1056/NEJMsb1616595

    Article  Google Scholar 

  7. Chunhua L, **biao H, Cheng L, Zhou K (2018) Achieving privacy-preserving CP-ABE access control with multi-cloud. In: IEEE Intl Conf on parallel & distributed processing with applications. p. 978-1-7281

    Google Scholar 

  8. Bramm G, et al. (2018) BDABE: Blockchain-based distributed attribute-based encryption. In: Proc. 15th international joint conf. on E-business and telecommunications (ICETE 2018), SECRYPT, vol 2, pp. 99–110

    Google Scholar 

  9. Wang S et al (2019) A secure cloud storage framework with access control based on Blockchain. IEEE Access 7:112713–112725. https://doi.org/10.1109/ACCESS.2019.2929205

    Article  Google Scholar 

  10. Sarmah SS (2019) Application of Blockchain in cloud computing. Int. J. Innov. Technol. Explor. Eng. (IJITEE) ISSN: 2278-3075 8(12)

    Google Scholar 

  11. Qin X, et al. (2020) A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Archit. 112:2021, 101854, ISSN: 1383-7621

    Google Scholar 

  12. Zhang Y, et al. (2020) Attribute-Based Encryption for Cloud Computing Access Control: A Survey. ACM Computing Surveys, Article No. 83

    Google Scholar 

  13. Guo R, et al. (2021) O-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J. 8(11):8949–8963. doi:https://doi.org/10.1109/JIOT.2021.3055541

  14. Alharby M, et al. (2018) Blockchain-based smart contracts: a systematic map** study of academic research 2018. In: Intl. Conf. on Cloud Comput., Big Data and Blockchain (ICCBB), vol 2018. IEEE, Fuzhou, pp. 1–6

    Google Scholar 

  15. Huh S, et al. (2017) Managing IoT devices using a block-chain platform. In: Proc. 2017 19th Intl. Conf. on Advanced Communication Technology (ICACT), Bongpyeong, Korea, February 19–22 2017

    Google Scholar 

  16. Armknecht F, et al. (2015) Ripple: Overview and outlook. In: Conti M, Schunter M, Askoxylakis I (eds) Trust and trustworthy computing. Springer International Publishing, Cham, Switzerland, 2015, pp. 163–180

    Google Scholar 

  17. Vasek M, Moore T (2015) There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In: Lecture Notes in Computer Science, Proc. Intl. Conf. on Financial Cryptography and Data Security, San Juan, Puerto Rico. Springer, Berlin/Heidelberg, Germany, 44–61, Jan. 26–30 2015. doi:https://doi.org/10.1007/978-3-662-47854-7_4

  18. Zhang J et al (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239–9250. https://doi.org/10.1109/ACCESS.2016.2645904

    Article  Google Scholar 

  19. Singh S et al (2016) A survey on cloud computing security: Issues, threats, and solutions. J Netw Comput Appl 75:200–222. https://doi.org/10.1016/j.jnca.2016.09.002

    Article  Google Scholar 

  20. Assad M, et al. (2007) Personis AD: Distributed, active, a scrutable model framework for context-aware services. In: Intl. Conf. on Pervasive Comput. Springer, Berlin; Heidelberg, pp. 55–72

    Google Scholar 

  21. Benet J (2015) IPFS-content addressed, Versioned. File System (DRAFT 3). Available at: https://ipfs.io/ipfs/QmV9tSDx9UiPeWExXEeH6aoDvmihvx6jD5eLb4jbTaKGps, vol. P2p

  22. Raghavendra S et al (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comput Sci 89:293–300. https://doi.org/10.1016/j.procs.2016.06.062

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashutosh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, A., Verma, G. (2023). Attribute-Based Encryption Techniques: A Review Study on Secure Access to Cloud System. In: Singh, P., Singh, D., Tiwari, V., Misra, S. (eds) Machine Learning and Computational Intelligence Techniques for Data Engineering. MISP 2022. Lecture Notes in Electrical Engineering, vol 998. Springer, Singapore. https://doi.org/10.1007/978-981-99-0047-3_15

Download citation

Publish with us

Policies and ethics

Navigation