Open Access   Article Go Back

A Survey on Outsourced Attribute-Based Encryption Technique

Hadiya Rafiq Mir1 , U. A. Jogalekar2

Section:Survey Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 76-81, Apr-2016

Online published on Apr 27, 2016

Copyright © Hadiya Rafiq Mir , U. A. Jogalekar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hadiya Rafiq Mir , U. A. Jogalekar , “A Survey on Outsourced Attribute-Based Encryption Technique,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.76-81, 2016.

MLA Style Citation: Hadiya Rafiq Mir , U. A. Jogalekar "A Survey on Outsourced Attribute-Based Encryption Technique." International Journal of Computer Sciences and Engineering 4.4 (2016): 76-81.

APA Style Citation: Hadiya Rafiq Mir , U. A. Jogalekar , (2016). A Survey on Outsourced Attribute-Based Encryption Technique. International Journal of Computer Sciences and Engineering, 4(4), 76-81.

BibTex Style Citation:
@article{Mir_2016,
author = {Hadiya Rafiq Mir , U. A. Jogalekar },
title = {A Survey on Outsourced Attribute-Based Encryption Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {76-81},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=862},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=862
TI - A Survey on Outsourced Attribute-Based Encryption Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Hadiya Rafiq Mir , U. A. Jogalekar
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 76-81
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1588 1353 downloads 1489 downloads
  
  
           

Abstract

In the modern times, more sensitive data is being stored on third party servers which are untrusted, so data on these sites need to be in encrypted form. Every now and then new encryption techniques are put forward. Attribute Based Encryption (ABE) is one such cryptographic technique that secures the data and provides fine-grained access control. However, The Computational complexities of ABE key issuing and decryption are getting too high due to the high expressiveness of ABE approach which affects the efficiency of ABE. To tackle this, many Outsourced Variants of ABE have been proposed to improve the efficiency of ABE such that it could be widely deployed. In this paper, a survey is done on various ABE techniques that have been proposed and their advantages and disadvantages are also discussed.

Key-Words / Index Term

Attribute-based encryption; Key Generation Service Provider; Decryption Service Provider; Access control; Outsourcing computation; Key issuing; Checkability

References

[1] A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer-Verlag.
[2] M. Green, S. Hohenberger, and B. Waters, ‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in Proc. 20th USENIX Conf. SEC, 2011, p. 34.
[3] Z. Zhou and D. Huang, ‘‘Efficient and Secure Data Storage Operations for Mobile Cloud Computing,’’ in Cryptology ePrint Archive, Report 2011/185, 2011.
[4] P. Golle and I. Mironov, ‘‘Uncheatable Distributed Computations,’’ in Proc. Conf. Topics Cryptol., CT-RSA, 2001, pp. 425-440.
[5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ‘‘Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,’’ in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.


[6] J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext-Policy Attribute-Based Encryption,’’ in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334.
[7] Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms." International Journal of Computer Science and Information Security 14.2 (2016): pp(105-110).
[8] S. Hohenberger and A. Lysyanskaya, ‘‘How to Securely Outsource Cryptographic Computations,’’ in Proc. Theory Cryptogr., LNCS 3378, J. Kilian, Ed., Berlin, Germany, pp. 264-282, Springer- Verlag.
[9] S. Goldwasser, Y.T. Kalai, and G.N. Rothblum, ‘‘Delegating Computation: Interactive Proofs for Muggles,’’ in Proc. 40th Annu. ACM STOC, 2008, pp. 113-122.
[10] C. Gentry, ‘‘Fully Homomorphic Encryption Using Ideal Lattices,’’ in Proc. 41st Annu. ACM STOC, 2009, pp. 169-178.
[11] C.Gentry and S.Halevi, ‘‘ImplementingGentry’s Fully-Homomorphic Encryption Scheme,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 6632, K. Paterson, Ed., Berlin, Germany, 2011, pp. 129-148, Springer-Verlag.
[12] J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, ‘‘Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption,’’ in Proc. 18th ESORICS, 2013, pp. 592-609.
[13] M.J. Atallah, K. Pantazopoulos, J.R. Rice, and E.E. Spafford, ‘‘Secure Outsourcing of Scientific Computations,’’ in Trends in Software Engineering, vol. 54, M.V. Zelkowitz, Ed. Amsterdam, The Netherlands: Elsevier, 2002, pp. 215-272.
[14] R. Gennaro, C. Gentry, and B. Parno, ‘‘Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers,’’ in Proc. Adv. Cryptol.-CRYPTO, LNCS 6223, T. Rabin, Ed., Berlin, Germany, 2010, pp. 465-482, Springer-Verlag
[15] K.-M. Chung, Y.Kalai, F.-H. Liu, and R. Raz, ‘‘MemoryDelegation,’’ in Proc. Adv. Cryptol.-CRYPTO, LNCS 6841, P. Rogaway, Ed., Berlin, 2011, pp. 151-168, Springer-Verlag.
[16] D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data Dissemination in Delay Tolerant Networks,’’ IEEE Trans. Parallel Distrib. Syst. http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.221.