Cargando…
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption te...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6479996/ https://www.ncbi.nlm.nih.gov/pubmed/30970678 http://dx.doi.org/10.3390/s19071695 |
_version_ | 1783413474291875840 |
---|---|
author | Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif |
author_facet | Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif |
author_sort | Al-Dahhan, Ruqayah R. |
collection | PubMed |
description | Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine-grained access control of sensitive data according to attributes, particularly for Internet of Things (IoT) applications. However, although this technique provides several critical functions such as data confidentiality and expressiveness, it faces some hurdles including revocation issues and lack of managing a wide range of attributes. These two issues have been highlighted by many existing studies due to their complexity which is hard to address without high computational cost affecting the resource-limited IoT devices. In this paper, unlike other survey papers, existing single and multiauthority CP-ABE schemes are reviewed with the main focus on their ability to address the revocation issues, the techniques used to manage the revocation, and comparisons among them according to a number of secure cloud storage criteria. Therefore, this is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues. |
format | Online Article Text |
id | pubmed-6479996 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-64799962019-04-29 Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif Sensors (Basel) Review Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine-grained access control of sensitive data according to attributes, particularly for Internet of Things (IoT) applications. However, although this technique provides several critical functions such as data confidentiality and expressiveness, it faces some hurdles including revocation issues and lack of managing a wide range of attributes. These two issues have been highlighted by many existing studies due to their complexity which is hard to address without high computational cost affecting the resource-limited IoT devices. In this paper, unlike other survey papers, existing single and multiauthority CP-ABE schemes are reviewed with the main focus on their ability to address the revocation issues, the techniques used to manage the revocation, and comparisons among them according to a number of secure cloud storage criteria. Therefore, this is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues. MDPI 2019-04-09 /pmc/articles/PMC6479996/ /pubmed/30970678 http://dx.doi.org/10.3390/s19071695 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title | Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title_full | Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title_fullStr | Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title_full_unstemmed | Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title_short | Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption |
title_sort | survey on revocation in ciphertext-policy attribute-based encryption |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6479996/ https://www.ncbi.nlm.nih.gov/pubmed/30970678 http://dx.doi.org/10.3390/s19071695 |
work_keys_str_mv | AT aldahhanruqayahr surveyonrevocationinciphertextpolicyattributebasedencryption AT shiqi surveyonrevocationinciphertextpolicyattributebasedencryption AT leegyumyoung surveyonrevocationinciphertextpolicyattributebasedencryption AT kifayatkashif surveyonrevocationinciphertextpolicyattributebasedencryption |