Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
Version 2 2024-06-05, 07:19Version 2 2024-06-05, 07:19
Version 1 2017-07-26, 15:38Version 1 2017-07-26, 15:38
journal contribution
posted on 2024-06-05, 07:19authored byM Sookhak, FR Yu, MK Khan, Y Xiang, R Buyya
With the thriving growth of the cloud computing, the security and privacy concerns of outsourcing data have been increasing dramatically. However, because of delegating the management of data to an untrusted cloud server in data outsourcing process, the data access control has been recognized as a challenging issue in cloud storage systems. One of the preeminent technologies to control data access in cloud computing is Attribute-based Encryption (ABE) as a cryptographic primitive, which establishes the decryption ability on the basis of a user's attributes. This paper provides a comprehensive survey on attribute-based access control schemes and compares each scheme's functionality and characteristic. We also present a thematic taxonomy of attribute-based approaches based on significant parameters, such as access control mode, architecture, revocation mode, revocation method, revocation issue, and revocation controller. The paper reviews the state-of-the-art ABE methods and categorizes them into three main classes, such as centralized, decentralized, and hierarchal, based on their architectures. We also analyzed the different ABE techniques to ascertain the advantages and disadvantages, the significance and requirements, and identifies the research gaps. Finally, the paper presents open issues and challenges for further investigations.
History
Journal
Future Generation Computer Systems
Volume
72
Pagination
273-287
Location
Amsterdam, The Netherlands
ISSN
0167-739X
Language
eng
Publication classification
C Journal article, C1 Refereed article in a scholarly journal