Reference Hub1
A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing

A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing

Lokesh B. Bhajantri, Tabassum N. Mujawar
Copyright: © 2019 |Volume: 11 |Issue: 3 |Pages: 20
ISSN: 1937-965X|EISSN: 1937-9668|EISBN13: 9781522564966|DOI: 10.4018/IJAPUC.2019070103
Cite Article Cite Article

MLA

Bhajantri, Lokesh B., and Tabassum N. Mujawar. "A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing." IJAPUC vol.11, no.3 2019: pp.33-52. http://doi.org/10.4018/IJAPUC.2019070103

APA

Bhajantri, L. B. & Mujawar, T. N. (2019). A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(3), 33-52. http://doi.org/10.4018/IJAPUC.2019070103

Chicago

Bhajantri, Lokesh B., and Tabassum N. Mujawar. "A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.3: 33-52. http://doi.org/10.4018/IJAPUC.2019070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.