skip to main content
10.1145/3102304.3102338acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT

Published:19 July 2017Publication History

ABSTRACT

The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are well documented there are concerns relating to the security of such data through data corruption, theft, exploitation or deletion. Innovative encryption schemes have been developed to address the challenges of data protection in the Cloud and having greater control over who should be accessing what data, one of which is Attribute-Based Encryption (ABE). ABE is a type of role-based access control encryption solution which allows data owners and data consumers or users to encrypt and decrypt based on their personal attributes (e.g. department, location, gender, role). A number of ABE schemes have been developed over the years but ABE in MCC has established its own paradigm driven by a) the use of mobile devices to access private data hosted in the Cloud and b) the physical limitations of the mobile device to perform complex computation in support of encryption and decryption in ABE. ABE in MCC is an evolving research field but given the breadth and strength of interest at time of writing it is timely to perform a survey. Due to the sheer volume of research, the survey has focused on one aspect of ABE - Ciphertext-Policy Attribute-Based Encryption - in line with its prominence in ABE in MCC research to date. Further, given the significant developments and interest in IoT, the survey has since been extended to assess whether the research into mobile devices has been translated to the application of attribute-based encryption in IoT where the challenges to support complex computation and data transmission are potentially more complex given the much greater heterogeneity and resource restrictions of IoT devices.

References

  1. Sahai, A. and Waters, B. (2005). Fuzzy identity-based encryption. Springer. Advances in Cryptology-EUROCRYPT 2005. pp. 457-473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Goyal, V., Pandey, C., Sahai, A. and Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM. Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bethencourt, J., Sahai, A. and Waters, B., (2007) Ciphertext-Policy Attribute-Based Encryption. IEEE. Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kumar, N., Rajya Lakshmi, G.V. and Balamurugan, B. (2015) Survey of Attribute Based Encryption. Elsevier. Procedia Computer Science Volume(46) pp. 689-696Google ScholarGoogle Scholar
  5. Qaio, Z., Liang, S., Davis, S. and Jiang, H. (2014) Survey of Attribute Based Encryption.IEEE. 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334.Google ScholarGoogle Scholar
  6. Jin, Y., Tian, C., He, H. and Wang, F (2015) A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing. IEEE. 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hohenburger, S. and Waters, B.(2014) "Online/offline attribute-based encryption," in Public-Key Cryptography pp. 293-310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Zhang, Y., Jin, L., Chen, X., Wong, D. and Li, H.(2013) Anonymous attribute-based encryption supporting efficient decryption test ACM Digital Library.Proceedings of the 8th ACM SIGSAC symposium on information, computer and communication security 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhang, Y., Jin, L., Chen, X. and Li, H.(2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing Wiley Online Library. Security and Communication Networks. 2016. Volume 9, Issue 14, pp. 2397-2411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chen, C., Zhang, Z. and Feng, D.(2011) Efficient ciphertext-policy attribute-based encryption with constant cipher-text and constant computation-cost Springer. Provable Security. pp. 84-101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zhang, Y., Zheng, D., Chen, J. Li, H.(2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Springer. Provable Security. pp. 259-273.Google ScholarGoogle Scholar
  12. Guo, F., Susilo, W., Wong, D. and Varadharajan, V. (2014) CP-ABE with Constant-Size Keys for Lightweight Devices IEEE. IEEE Transactions on Information Forensics and Security, Vol 9, No. 5, pp. 763-771. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Odelu, V., Kumar Das, A., Sreenivasa Rao, Y., Kumari, S., Khan, M. and Choo, K. (2016) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Elsevier. Computer Standards and Interfaces 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Li, Q., Ma, J., Li, R., Xiong, J., Liu, X.(2015) Provably secure unbounded multi-authority ciphertextpolicy attribute-based encryption Wiley Online Library. Security and Communication Networks 2015. Volume 8, pp. 4098-4109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhang, Y., Zheng, D., Li, Q., Jin, L. and Li, H.(2016) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Wiley Online Library. Security and Communication Networks. 2016. Volume 9, Issue 16, pp. 3688-3702. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yao, X., Chen, Z. and Tian, Y. (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Elsevier. Future Generation Computer Systems Volume 49 (2015) pp. 104-112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lee, J., Oh, S. and Jang, J.W. (2015) A Work in Progress: Context based encryption scheme for Internet of Things. Elsevier.Procedia Computer Science Volume(56) pp. 271-275.Google ScholarGoogle Scholar
  18. Touati, L., Challal, Y. and Bouabdallah, A. (2014) C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things. 2014 International Conference on Advanced Networking Distributed Systems and Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Touati L. and Challal, Y. (2015) Batch-Based CPABE with Attribute Revocation Mechanism for the Internet of Things. 2015 International Conference on Computing, Networking and Communications, Wireless Networks Symposium.Google ScholarGoogle Scholar
  20. Touati L. and Challal, Y. (2015) Efficient CP-ABE Attribute/Key Management for IoT Applications. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ambrosin, M. et al(2016) On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. 2016 IEEE Micro Volume:36 Issue:6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ambrosin, M. et al(2015) On the Feasibility of Attribute-Based Encryption on Smartphone Devices. 2015 Proc.Workshop IoT Challenges in Mobile and Industrial Systems, pp49-54 Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
    July 2017
    325 pages
    ISBN:9781450348447
    DOI:10.1145/3102304

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 19 July 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader