Affiliation:
1. School of Cyberspace Security, Xi’an University of Posts 8 Telecommunications, China and Singapore Management University, Singapore
2. Singapore Management University, Singapore
3. Nanjing University of Posts 8 Telecommunications, China
4. National Engineering Laboratory for Wireless Security, Xi’an University of Posts 8 Telecommunications, China and Westone Cryptologic Research Center, China
Abstract
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding access control scenario is presented and explained by concrete examples. Specifically, the syntax of ABE is given followed by the adversarial model and security goals. ABE schemes are discussed according to the design strategies and special features and are compared in the light of the proposed assessment criteria with respect to security and performance. Compared to related state-of-the-art survey papers, this article not only provides a broader 12 categories of ABE schemes, but also makes a more comprehensive and holistic comparison. Finally, a number of open research challenges in ABE are pointed out.
Funder
Innovation Capability Support Program of Shaanxi
Huawei International Pte Ltd Research Grant
Basic Research Program of Qinghai Province
Key Research and Development Program of Shaanxi
New Star Team of Xi'an University of Posts and Telecommunications
National Key R&D Program of China
National Research Foundation Singapore, under the National Satellite of Excellence in Mobile System Security and Cloud Security
the AXA Research Fund
Sichuan Science and Technology Program
National Natural Science Foundation of China
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献