Abstract

Cloud computing has emerged as a transformative development in the realm of Information Technology. The advent of services like "on-demand" and "pay-as-you-go" has led to the migration of both government and industrial IT infrastructures up in the clouds. With data and business logic being stored on remote cloud servers, the security concerns connecting to the cloud environment differ from those of traditional computing. In the domain inside cloud computing, data security is administered by Cloud Service Providers (CSPs), leaving owner of the data with limited control over the security policies governing their own data. Privacy and saftey stand out as two critical factors that discourage users from transitioning to untrusted cloud environments. Despite the substantial savings in costs associated with cloud adoption, ensuring secured data sharing consistently remains a top priority for data owners. As a result, these two aspects demand heightened attention to facilitate securely sharing data within the cloud computing landscape. This paper undertakes a comprehensive review and comparison of various attribute-based encryption schemes within the context of cloud computing.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call