Abstract
Cloud computing system is an emerging technique for fast and secure on-demand allocation of user data storage. Cloud computing offers better approaches to services types of assistance while fundamentally modifying the expense structure underlying those services. This paper summarizes the facts about the new technique implemented with cloud computing. The overall motive of the paper is to summarize the existing studies done on security issues and to clarify the characteristics required in proposing a novel technique of Attribute-based encryption used in cloud security. For analyzing exhibitions of models from various angles, related writing for identification of error, data sharing organized on a cloud, for complex framework structures will be investigated and contemplated. Cloud computing gives the best stage to organize data which is complex.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khalid A (2010) Cloud Computing: applying issues in Small Business. In: Intl. Conf. on Signal Acquisition and Process (ICSAP’10). pp. 278–281
KPMG (2010) From hype to future: KPMG’s 2010 Cloud Computing survey. Available at: http://www.techrepublic.com/whitepapers/from-hype-to-futurekpmgs-2010-cloud-computing-survey/2384291
Rosado DG et al (2012) Security analysis in the migration to cloud environments. Futur Internet 4(2):469–487. https://doi.org/10.3390/fi4020469
Mather T et al (2009) Cloud security and privacy. O’Reilly Media Inc., Sebastopol, CA
Gartner Inc. Gartner identifies the Top 10 strategic technologies for 2011. Online. Available at: http://www.gartner.com/it/page.jsp?id=1454221
Bierer BE et al (2017) Data authorship as an incentive to data sharing. N Engl J Med 376(17):1684–1687. https://doi.org/10.1056/NEJMsb1616595
Chunhua L, Jinbiao H, Cheng L, Zhou K (2018) Achieving privacy-preserving CP-ABE access control with multi-cloud. In: IEEE Intl Conf on parallel & distributed processing with applications. p. 978-1-7281
Bramm G, et al. (2018) BDABE: Blockchain-based distributed attribute-based encryption. In: Proc. 15th international joint conf. on E-business and telecommunications (ICETE 2018), SECRYPT, vol 2, pp. 99–110
Wang S et al (2019) A secure cloud storage framework with access control based on Blockchain. IEEE Access 7:112713–112725. https://doi.org/10.1109/ACCESS.2019.2929205
Sarmah SS (2019) Application of Blockchain in cloud computing. Int. J. Innov. Technol. Explor. Eng. (IJITEE) ISSN: 2278-3075 8(12)
Qin X, et al. (2020) A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Archit. 112:2021, 101854, ISSN: 1383-7621
Zhang Y, et al. (2020) Attribute-Based Encryption for Cloud Computing Access Control: A Survey. ACM Computing Surveys, Article No. 83
Guo R, et al. (2021) O-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J. 8(11):8949–8963. doi:https://doi.org/10.1109/JIOT.2021.3055541
Alharby M, et al. (2018) Blockchain-based smart contracts: a systematic mapping study of academic research 2018. In: Intl. Conf. on Cloud Comput., Big Data and Blockchain (ICCBB), vol 2018. IEEE, Fuzhou, pp. 1–6
Huh S, et al. (2017) Managing IoT devices using a block-chain platform. In: Proc. 2017 19th Intl. Conf. on Advanced Communication Technology (ICACT), Bongpyeong, Korea, February 19–22 2017
Armknecht F, et al. (2015) Ripple: Overview and outlook. In: Conti M, Schunter M, Askoxylakis I (eds) Trust and trustworthy computing. Springer International Publishing, Cham, Switzerland, 2015, pp. 163–180
Vasek M, Moore T (2015) There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In: Lecture Notes in Computer Science, Proc. Intl. Conf. on Financial Cryptography and Data Security, San Juan, Puerto Rico. Springer, Berlin/Heidelberg, Germany, 44–61, Jan. 26–30 2015. doi:https://doi.org/10.1007/978-3-662-47854-7_4
Zhang J et al (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239–9250. https://doi.org/10.1109/ACCESS.2016.2645904
Singh S et al (2016) A survey on cloud computing security: Issues, threats, and solutions. J Netw Comput Appl 75:200–222. https://doi.org/10.1016/j.jnca.2016.09.002
Assad M, et al. (2007) Personis AD: Distributed, active, a scrutable model framework for context-aware services. In: Intl. Conf. on Pervasive Comput. Springer, Berlin; Heidelberg, pp. 55–72
Benet J (2015) IPFS-content addressed, Versioned. File System (DRAFT 3). Available at: https://ipfs.io/ipfs/QmV9tSDx9UiPeWExXEeH6aoDvmihvx6jD5eLb4jbTaKGps, vol. P2p
Raghavendra S et al (2016) Index generation and secure multi-user access control over an encrypted cloud data. Procedia Comput Sci 89:293–300. https://doi.org/10.1016/j.procs.2016.06.062
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A., Verma, G. (2023). Attribute-Based Encryption Techniques: A Review Study on Secure Access to Cloud System. In: Singh, P., Singh, D., Tiwari, V., Misra, S. (eds) Machine Learning and Computational Intelligence Techniques for Data Engineering. MISP 2022. Lecture Notes in Electrical Engineering, vol 998. Springer, Singapore. https://doi.org/10.1007/978-981-99-0047-3_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-0047-3_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0046-6
Online ISBN: 978-981-99-0047-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)