ABSTRACT
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are well documented there are concerns relating to the security of such data through data corruption, theft, exploitation or deletion. Innovative encryption schemes have been developed to address the challenges of data protection in the Cloud and having greater control over who should be accessing what data, one of which is Attribute-Based Encryption (ABE). ABE is a type of role-based access control encryption solution which allows data owners and data consumers or users to encrypt and decrypt based on their personal attributes (e.g. department, location, gender, role). A number of ABE schemes have been developed over the years but ABE in MCC has established its own paradigm driven by a) the use of mobile devices to access private data hosted in the Cloud and b) the physical limitations of the mobile device to perform complex computation in support of encryption and decryption in ABE. ABE in MCC is an evolving research field but given the breadth and strength of interest at time of writing it is timely to perform a survey. Due to the sheer volume of research, the survey has focused on one aspect of ABE - Ciphertext-Policy Attribute-Based Encryption - in line with its prominence in ABE in MCC research to date. Further, given the significant developments and interest in IoT, the survey has since been extended to assess whether the research into mobile devices has been translated to the application of attribute-based encryption in IoT where the challenges to support complex computation and data transmission are potentially more complex given the much greater heterogeneity and resource restrictions of IoT devices.
- Sahai, A. and Waters, B. (2005). Fuzzy identity-based encryption. Springer. Advances in Cryptology-EUROCRYPT 2005. pp. 457-473. Google ScholarDigital Library
- Goyal, V., Pandey, C., Sahai, A. and Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM. Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98. Google ScholarDigital Library
- Bethencourt, J., Sahai, A. and Waters, B., (2007) Ciphertext-Policy Attribute-Based Encryption. IEEE. Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334 Google ScholarDigital Library
- Kumar, N., Rajya Lakshmi, G.V. and Balamurugan, B. (2015) Survey of Attribute Based Encryption. Elsevier. Procedia Computer Science Volume(46) pp. 689-696Google Scholar
- Qaio, Z., Liang, S., Davis, S. and Jiang, H. (2014) Survey of Attribute Based Encryption.IEEE. 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334.Google Scholar
- Jin, Y., Tian, C., He, H. and Wang, F (2015) A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing. IEEE. 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. Google ScholarDigital Library
- Hohenburger, S. and Waters, B.(2014) "Online/offline attribute-based encryption," in Public-Key Cryptography pp. 293-310. Google ScholarDigital Library
- Zhang, Y., Jin, L., Chen, X., Wong, D. and Li, H.(2013) Anonymous attribute-based encryption supporting efficient decryption test ACM Digital Library.Proceedings of the 8th ACM SIGSAC symposium on information, computer and communication security 2013. Google ScholarDigital Library
- Zhang, Y., Jin, L., Chen, X. and Li, H.(2016) Anonymous attribute-based proxy re-encryption for access control in cloud computing Wiley Online Library. Security and Communication Networks. 2016. Volume 9, Issue 14, pp. 2397-2411. Google ScholarDigital Library
- Chen, C., Zhang, Z. and Feng, D.(2011) Efficient ciphertext-policy attribute-based encryption with constant cipher-text and constant computation-cost Springer. Provable Security. pp. 84-101. Google ScholarDigital Library
- Zhang, Y., Zheng, D., Chen, J. Li, H.(2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Springer. Provable Security. pp. 259-273.Google Scholar
- Guo, F., Susilo, W., Wong, D. and Varadharajan, V. (2014) CP-ABE with Constant-Size Keys for Lightweight Devices IEEE. IEEE Transactions on Information Forensics and Security, Vol 9, No. 5, pp. 763-771. Google ScholarDigital Library
- Odelu, V., Kumar Das, A., Sreenivasa Rao, Y., Kumari, S., Khan, M. and Choo, K. (2016) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Elsevier. Computer Standards and Interfaces 2016. Google ScholarDigital Library
- Li, Q., Ma, J., Li, R., Xiong, J., Liu, X.(2015) Provably secure unbounded multi-authority ciphertextpolicy attribute-based encryption Wiley Online Library. Security and Communication Networks 2015. Volume 8, pp. 4098-4109. Google ScholarDigital Library
- Zhang, Y., Zheng, D., Li, Q., Jin, L. and Li, H.(2016) Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Wiley Online Library. Security and Communication Networks. 2016. Volume 9, Issue 16, pp. 3688-3702. Google ScholarDigital Library
- Yao, X., Chen, Z. and Tian, Y. (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Elsevier. Future Generation Computer Systems Volume 49 (2015) pp. 104-112. Google ScholarDigital Library
- Lee, J., Oh, S. and Jang, J.W. (2015) A Work in Progress: Context based encryption scheme for Internet of Things. Elsevier.Procedia Computer Science Volume(56) pp. 271-275.Google Scholar
- Touati, L., Challal, Y. and Bouabdallah, A. (2014) C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things. 2014 International Conference on Advanced Networking Distributed Systems and Applications. Google ScholarDigital Library
- Touati L. and Challal, Y. (2015) Batch-Based CPABE with Attribute Revocation Mechanism for the Internet of Things. 2015 International Conference on Computing, Networking and Communications, Wireless Networks Symposium.Google Scholar
- Touati L. and Challal, Y. (2015) Efficient CP-ABE Attribute/Key Management for IoT Applications. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.Google ScholarCross Ref
- Ambrosin, M. et al(2016) On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. 2016 IEEE Micro Volume:36 Issue:6 Google ScholarDigital Library
- Ambrosin, M. et al(2015) On the Feasibility of Attribute-Based Encryption on Smartphone Devices. 2015 Proc.Workshop IoT Challenges in Mobile and Industrial Systems, pp49-54 Google ScholarDigital Library
Recommendations
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
Ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile cloud environment to ensure that data outsourced to the cloud will be protected from unauthorized access. Since mobile devices are generally resource-constrained, ...
TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption
Attribute-based encryption (ABE) is a very efficient way of authorising users to access confidential data in organisations without public-key validation from external trusted authorities or complex login processes. Ciphertext-policy attribute-based ...
Ciphertext-policy attribute-based delay encryption
Timed-release CP-ABE can provide fine-grained and timed-release access control while ensuring data confidentiality. Existing schemes usually rely on a trusted third-party called time server. This paper proposes a novel timed-release CP-ABE scheme named ...
Comments