Analysis of Classical Encryption Techniques in Cloud Computing

Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Tsinghua science and technology 2016-02, Vol.21 (1), p.102-113
Hauptverfasser: Shabir, Muhammad Yasir, Iqbal, Asif, Mahmood, Zahid, Ghafoor, Ataullah
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 113
container_issue 1
container_start_page 102
container_title Tsinghua science and technology
container_volume 21
creator Shabir, Muhammad Yasir
Iqbal, Asif
Mahmood, Zahid
Ghafoor, Ataullah
description Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.
doi_str_mv 10.1109/TST.2016.7399287
format Article
fullrecord <record><control><sourceid>wanfang_jour_cross</sourceid><recordid>TN_cdi_wanfang_journals_qhdxxb_e201601009</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>667886494</cqvip_id><wanfj_id>qhdxxb_e201601009</wanfj_id><sourcerecordid>qhdxxb_e201601009</sourcerecordid><originalsourceid>FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</originalsourceid><addsrcrecordid>eNo9kL1vwjAUxK2qlUpp945Rtw6hz3HiZy-VUEQ_JKQOTWfL2A4EgQMxUeG_ryNQp3fD707vjpBHChNKQb5U39UkA8onyKTMBF6RERUoUuTAr6MGwBQymt-SuxDWAIwXyEbkder15hSakLR1Um50CI3Rm2TmTXfaHZrWJ5UzK9_sexeSxkek7W1Stttdf2j88p7c1HoT3MPljsnP26wqP9L51_tnOZ2nhuX8kFrLkCMXQNEZiQXynDuRMyuRLgpRmEwXhbTW0qgMzVCiqy1kUFiacyHZmDyfc3-1r7VfqnXbd_HzoPYrezwulBu6Q2w5sHBmTdeG0Lla7bpmq7uToqCGrVTcSg28umwVLU8Xy6r1y30s9u_hHIXguczZH-zAZsc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</creator><creatorcontrib>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</creatorcontrib><description>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</description><identifier>ISSN: 1007-0214</identifier><identifier>EISSN: 1878-7606</identifier><identifier>EISSN: 1007-0214</identifier><identifier>DOI: 10.1109/TST.2016.7399287</identifier><language>eng</language><publisher>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer &amp; Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</publisher><subject>信息技术产业 ; 加密技术 ; 技术分析 ; 控制方案 ; 敏感数据 ; 计算模式 ; 计算资源 ; 访问控制</subject><ispartof>Tsinghua science and technology, 2016-02, Vol.21 (1), p.102-113</ispartof><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85782X/85782X.jpg</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Shabir, Muhammad Yasir</creatorcontrib><creatorcontrib>Iqbal, Asif</creatorcontrib><creatorcontrib>Mahmood, Zahid</creatorcontrib><creatorcontrib>Ghafoor, Ataullah</creatorcontrib><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><title>Tsinghua science and technology</title><addtitle>Tsinghua Science and Technology</addtitle><description>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</description><subject>信息技术产业</subject><subject>加密技术</subject><subject>技术分析</subject><subject>控制方案</subject><subject>敏感数据</subject><subject>计算模式</subject><subject>计算资源</subject><subject>访问控制</subject><issn>1007-0214</issn><issn>1878-7606</issn><issn>1007-0214</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNo9kL1vwjAUxK2qlUpp945Rtw6hz3HiZy-VUEQ_JKQOTWfL2A4EgQMxUeG_ryNQp3fD707vjpBHChNKQb5U39UkA8onyKTMBF6RERUoUuTAr6MGwBQymt-SuxDWAIwXyEbkder15hSakLR1Um50CI3Rm2TmTXfaHZrWJ5UzK9_sexeSxkek7W1Stttdf2j88p7c1HoT3MPljsnP26wqP9L51_tnOZ2nhuX8kFrLkCMXQNEZiQXynDuRMyuRLgpRmEwXhbTW0qgMzVCiqy1kUFiacyHZmDyfc3-1r7VfqnXbd_HzoPYrezwulBu6Q2w5sHBmTdeG0Lla7bpmq7uToqCGrVTcSg28umwVLU8Xy6r1y30s9u_hHIXguczZH-zAZsc</recordid><startdate>20160201</startdate><enddate>20160201</enddate><creator>Shabir, Muhammad Yasir</creator><creator>Iqbal, Asif</creator><creator>Mahmood, Zahid</creator><creator>Ghafoor, Ataullah</creator><general>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer &amp; Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20160201</creationdate><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><author>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>信息技术产业</topic><topic>加密技术</topic><topic>技术分析</topic><topic>控制方案</topic><topic>敏感数据</topic><topic>计算模式</topic><topic>计算资源</topic><topic>访问控制</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shabir, Muhammad Yasir</creatorcontrib><creatorcontrib>Iqbal, Asif</creatorcontrib><creatorcontrib>Mahmood, Zahid</creatorcontrib><creatorcontrib>Ghafoor, Ataullah</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>Tsinghua science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shabir, Muhammad Yasir</au><au>Iqbal, Asif</au><au>Mahmood, Zahid</au><au>Ghafoor, Ataullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Classical Encryption Techniques in Cloud Computing</atitle><jtitle>Tsinghua science and technology</jtitle><addtitle>Tsinghua Science and Technology</addtitle><date>2016-02-01</date><risdate>2016</risdate><volume>21</volume><issue>1</issue><spage>102</spage><epage>113</epage><pages>102-113</pages><issn>1007-0214</issn><eissn>1878-7606</eissn><eissn>1007-0214</eissn><abstract>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</abstract><pub>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer &amp; Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</pub><doi>10.1109/TST.2016.7399287</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1007-0214
ispartof Tsinghua science and technology, 2016-02, Vol.21 (1), p.102-113
issn 1007-0214
1878-7606
1007-0214
language eng
recordid cdi_wanfang_journals_qhdxxb_e201601009
source EZB-FREE-00999 freely available EZB journals
subjects 信息技术产业
加密技术
技术分析
控制方案
敏感数据
计算模式
计算资源
访问控制
title Analysis of Classical Encryption Techniques in Cloud Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T04%3A46%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Classical%20Encryption%20Techniques%20in%20Cloud%20Computing&rft.jtitle=Tsinghua%20science%20and%20technology&rft.au=Shabir,%20Muhammad%20Yasir&rft.date=2016-02-01&rft.volume=21&rft.issue=1&rft.spage=102&rft.epage=113&rft.pages=102-113&rft.issn=1007-0214&rft.eissn=1878-7606&rft_id=info:doi/10.1109/TST.2016.7399287&rft_dat=%3Cwanfang_jour_cross%3Eqhdxxb_e201601009%3C/wanfang_jour_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=667886494&rft_wanfj_id=qhdxxb_e201601009&rfr_iscdi=true