Attribute-Based Access Control Schemes in Cloud: Performance and Research Directions

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Disclosure of sensitive data leads to identity theft and violation of privacy. The untrusted cloud service provider (CSP) may try to disclose/misuse the data. It is necessary to provide access control and security over the outsourced and shared data to hide it from the CSP and unauthorized users. Traditional access control schemes are prone to security threats in the cloud environment. Attribute-based access control schemes (ABAC) are well suited for the cloud environment. Attribute-based encryption (ABE) is a promising cryptographic solution to provide fine-grained access control over the shared data. It selectively shares the data among the users and hides data from the CSP and unauthorized users. It preserves the privacy of users and the security of data being shared. Users can decrypt the data only if their attributes are satisfied with the access policy associated in the ciphertext. This paper presents a comprehensive survey of the ABE schemes. Taxonomy, performance comparison, and applications of ABE schemes are dealt with. The taxonomy and performance comparison help the selection of the most suitable ABE scheme based on specific usage scenarios. Thus, the survey opens up very interesting avenues for further research in this area, which are also discussed.

Cite

CITATION STYLE

APA

Sabitha, S., & Rajasree, M. S. (2020). Attribute-Based Access Control Schemes in Cloud: Performance and Research Directions. In Lecture Notes in Networks and Systems (Vol. 106, pp. 235–243). Springer. https://doi.org/10.1007/978-981-15-2329-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free