Abstract

Cloud computing grants us the facility of storing the data and accessing it remotely over the internet. Data storage on the cloud does not guarantee the security of data. If the cloud server containing the information is being hacked or compromised, then any unauthorized user can access the data. To stop data leakage, some encryption schemes should be applied to data than uploading them on the cloud should begin. To guarantee the security Attribute-Based Encryption Scheme (ABE) is used. ABE is further categorized into two policies, Key Policy Attribute-Based Encryption (KP-ABE) and Cipher-text Policy Attribute-Based Encryption (CP-ABE). In this paper, the existing KP-ABE and CP-ABE have been studied broadly. This paper scrutinizes more on CP-ABE and compares various ABE schemes on the scale of their performance and features. Finally, in this paper, we try to catch out on the challenges and research gaps by examining the different ABE Schemes.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.