A Brief Survey on Encryption Schemes in Cloud Environments
|
International Journal of Computer & Organization Trends (IJCOT) | |
© 2013 by IJCOT Journal | ||
Volume-3 Issue-5 |
||
Year of Publication : 2013 | ||
Authors : S.M. Hema Latha , S.Ganesh |
Citation
S.M. Hema Latha , S.Ganesh. "A Brief Survey on Encryption Schemes in Cloud Environments" . International Journal of Computer & organization Trends (IJCOT), V3(5):1-5 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and they are all third party.It focuses on a technique to Hierarchical Attribute Set Based Encryption (HASBE); it is proposed by the Cipher Policy attribute-based encryption (CP-ABE).It achieves both flexibility and fine-grained access control of data in cloud not only the scalability. It stores the data in encrypted form for privacy protection. Cloud system is responsible for both tasks on storage and encryption or decryption of data. In this paper I provide a technique called Hierarchical Attribute set based Encryption(HASBE) to give security and fine grained access control to the users of cloud computing . It was an enhancement for the technique called Attribute based Encryption(ABE) which is inflexible to handle complex control.
References
[1]R. Buyya, C. ShinYeo, J. Broderg, and I. Brandic, "Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility".
[2] Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available: http://aws.amazon.com/ec2/
[3] Amazon Web Services (AWS) [Online]. Available: https://s3.amazonaws.com/
[4] R. Martin, "IBM brings cloud computing to earth with massive new data centers," InformationWeek Aug. 2008[Online].Available:http://www.informationweek.com/news/hardware/data_centers/209901523
[5] Google App Engine [Online]. Available: http://code.google.com/appengine/
[6] "Cloud Computing: The Next Great Technological Innovation, the Death of Online Privacy, Or Both?" Derek Constantine.
[7] "Security Guidance for Critical Areas of Focus in Cloud Computing v3.0".pdf
[8] "A Hand Book of Cloud Computing" Borko Furht, Armando Escalante.
[9] A. Ross, "Technical perspective: A chilly sense of security," Commun. ACM, vol. 52, pp. 90-90, 2009.
[10] D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation The MITRE Corporation, Tech. Rep., 1976.
[11] K. J. Biba, Integrity Considerations for Secure Computer Sytems TheMITRE Corporation, Tech. Rep., 1977.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attibute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexan- dria, VA, 2006.
[13] S. Yu, C. Wang, K. Ren, and W. Lou, "Achiving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM 2010, 2010, pp. 534-542.
[14] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security and Privacy, Oak- land, CA, 2007.
[15] R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Proc. ESORICS, Saint Malo, France, 2009.
[16] A. Sahai and B. Waters, "Fuzzy identity based encryption," in Proc. Acvances in Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp. 457-473.
[17] G. Wang, Q. Liu, and J. Wu, "Hierachical attibute-based encryption for fine-grained access control in cloud storage services," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010. 1962
[18] M. Pirretti, P. Traynor, P. McDaniel and B. Waters, “Secure Atrribute-Based Systems”, ACM conference on Computer and Communications Security (ACM CCS), 2006.
[19] A. Kapadia, P. Tsang and S. Smith, “Attribute-based publishing with hidden credentials and hidden policies”, NDSS, 2007.
[20] G.Wang, Q. Liu, and J.Wu, “Hierachical attibute-based encryption for fine-grained access control in cloud storage services,” ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010
[21] Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran,“Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption”, July 27, 2009
[22] Dan Boneh, Xavier Boyen, Eu-Jin Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext”, Advances in Cryptology—EUROCRYPT 2005, volume 3493.
Keywords
Cipher Policy attribute-based encryption (CP-ABE), Hierarchical Attribute Set Based Encryption (HASBE), Cloud Computing.