Download PDFOpen PDF in browserA Comparative Study on Cipher Text Policy Attribute Based Encryption SchemesEasyChair Preprint 57445 pages•Date: June 7, 2021AbstractCloud Computing is one of the demanding services in the current times. It should be said that it has become a necessity of small to large scale business to have a dedicated cloud computing service. The security, privacy and other features must be kept intact in all conditions. This high demand has made cloud computing being utilized in several ways such as in Fog ,VANETs, Mobile cloud computing and many others. All these are based on a common encryption scheme known as CP-ABE(Ciphertext Policy Attribute Based Encryption Scheme) it is an enhanced form of ABE which allows owner to set the attribute of user within the encryption. As a result even after sharing the data stays secure and this is one of the reasons which compelled many to use this as a base for their targeted encryption scheme. This is quite flexible to be utilized in a vehicle, mobile and in fog systems which are based off of cloud computing. In this review paper our contribution lies within the range of qualitative analysis of ABEs and CP-ABEs. The comparison will be shown in tabular form on the basis on the criteria of an ideal encryption scheme. This could be helpful for selection of a suitable scheme for a specific type of tasks in cloud computing. Keyphrases: ABE, Advanced Encryption Standard cryptography, CP-ABE, Ciphertext-Policy Attribute-Based Encryption, Decryption, Encryption, Privacy, Security, Symmetric Key Cryptography, access control, attribute-based encryption, cryptography
|