Skip to main content

Research Repository

Advanced Search

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Belguith, S; Kaaniche, N; Hammoudeh, M

Authors

S Belguith

N Kaaniche

M Hammoudeh



Abstract

Recent technological advances such as the Internet of Things (IoT), fog computing, cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side. Attribute based cryptography is commonly used to provide encrypted and / or authenticated access to outsourced data in remote servers. However, the use of these cryptographic mechanisms often increase the storage and computation costs; consequently, the energy consumption in the entire cloud ecosystem. In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. We also provide a detailed discussion of different reviewed schemes, w.r.t . supported features, namely security, privacy and functional requirements. In addition, we explore the limitations of existing attribute based cryptographic mechanisms and propose future research directions to better fit the growing needs of this cloud environment in terms of energy - savings, processing and storage efficiency and availability requirements.

Journal Article Type Article
Acceptance Date May 16, 2019
Online Publication Date Jun 17, 2019
Publication Date Jun 17, 2019
Deposit Date Jun 19, 2019
Publicly Available Date Jun 19, 2019
Journal Transactions on Emerging Telecommunications Technologies
Electronic ISSN 2161-3915
Publisher Wiley
Pages e3667
DOI https://doi.org/10.1002/ett.3667
Publisher URL https://doi.org/10.1002/ett.3667
Related Public URLs https://onlinelibrary.wiley.com/journal/21613915

Files

Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__Final Version.pdf (3.4 Mb)
PDF





Downloadable Citations