TY - JOUR
T1 - Analysis of attribute-based cryptographic techniques and their application to protect cloud services
AU - Belguith, S.
AU - Kaaniche, N.
AU - Hammoudeh, M.
PY - 2022/3/21
Y1 - 2022/3/21
N2 - Recent technological advances such as the internet of things, fog computing, and cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side. Attribute-based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers. However, the use of these cryptographic mechanisms often increase the storage and computation costs; consequently, the energy consumption in the entire cloud ecosystem. In this paper, we provide a comparative analysis of different attribute-based cryptographic mechanisms suitable for cloud data sharing services. We also provide a detailed discussion of different reviewed schemes, w.r.t. supported features, namely, security, privacy, and functional requirements. In addition, we explore the limitations of existing attribute-based cryptographic mechanisms and propose future research directions to better fit the growing needs of this cloud environment in terms of energy savings, processing and storage efficiency, and availability requirements.
AB - Recent technological advances such as the internet of things, fog computing, and cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side. Attribute-based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers. However, the use of these cryptographic mechanisms often increase the storage and computation costs; consequently, the energy consumption in the entire cloud ecosystem. In this paper, we provide a comparative analysis of different attribute-based cryptographic mechanisms suitable for cloud data sharing services. We also provide a detailed discussion of different reviewed schemes, w.r.t. supported features, namely, security, privacy, and functional requirements. In addition, we explore the limitations of existing attribute-based cryptographic mechanisms and propose future research directions to better fit the growing needs of this cloud environment in terms of energy savings, processing and storage efficiency, and availability requirements.
UR - http://www.scopus.com/inward/record.url?eid=2-s2.0-85067455493&partnerID=MN8TOARS
U2 - 10.1002/ett.3667
DO - 10.1002/ett.3667
M3 - Article (Academic Journal)
SN - 2161-5748
VL - 33
JO - Transactions on Emerging Telecommunications Technologies
JF - Transactions on Emerging Telecommunications Technologies
IS - 3
M1 - e3667
ER -