Analysis of Classical Encryption Techniques in Cloud Computing
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challen...
Gespeichert in:
Veröffentlicht in: | Tsinghua science and technology 2016-02, Vol.21 (1), p.102-113 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 113 |
---|---|
container_issue | 1 |
container_start_page | 102 |
container_title | Tsinghua science and technology |
container_volume | 21 |
creator | Shabir, Muhammad Yasir Iqbal, Asif Mahmood, Zahid Ghafoor, Ataullah |
description | Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications. |
doi_str_mv | 10.1109/TST.2016.7399287 |
format | Article |
fullrecord | <record><control><sourceid>wanfang_jour_cross</sourceid><recordid>TN_cdi_wanfang_journals_qhdxxb_e201601009</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>667886494</cqvip_id><wanfj_id>qhdxxb_e201601009</wanfj_id><sourcerecordid>qhdxxb_e201601009</sourcerecordid><originalsourceid>FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</originalsourceid><addsrcrecordid>eNo9kL1vwjAUxK2qlUpp945Rtw6hz3HiZy-VUEQ_JKQOTWfL2A4EgQMxUeG_ryNQp3fD707vjpBHChNKQb5U39UkA8onyKTMBF6RERUoUuTAr6MGwBQymt-SuxDWAIwXyEbkder15hSakLR1Um50CI3Rm2TmTXfaHZrWJ5UzK9_sexeSxkek7W1Stttdf2j88p7c1HoT3MPljsnP26wqP9L51_tnOZ2nhuX8kFrLkCMXQNEZiQXynDuRMyuRLgpRmEwXhbTW0qgMzVCiqy1kUFiacyHZmDyfc3-1r7VfqnXbd_HzoPYrezwulBu6Q2w5sHBmTdeG0Lla7bpmq7uToqCGrVTcSg28umwVLU8Xy6r1y30s9u_hHIXguczZH-zAZsc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</creator><creatorcontrib>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</creatorcontrib><description>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</description><identifier>ISSN: 1007-0214</identifier><identifier>EISSN: 1878-7606</identifier><identifier>EISSN: 1007-0214</identifier><identifier>DOI: 10.1109/TST.2016.7399287</identifier><language>eng</language><publisher>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer & Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</publisher><subject>信息技术产业 ; 加密技术 ; 技术分析 ; 控制方案 ; 敏感数据 ; 计算模式 ; 计算资源 ; 访问控制</subject><ispartof>Tsinghua science and technology, 2016-02, Vol.21 (1), p.102-113</ispartof><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85782X/85782X.jpg</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Shabir, Muhammad Yasir</creatorcontrib><creatorcontrib>Iqbal, Asif</creatorcontrib><creatorcontrib>Mahmood, Zahid</creatorcontrib><creatorcontrib>Ghafoor, Ataullah</creatorcontrib><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><title>Tsinghua science and technology</title><addtitle>Tsinghua Science and Technology</addtitle><description>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</description><subject>信息技术产业</subject><subject>加密技术</subject><subject>技术分析</subject><subject>控制方案</subject><subject>敏感数据</subject><subject>计算模式</subject><subject>计算资源</subject><subject>访问控制</subject><issn>1007-0214</issn><issn>1878-7606</issn><issn>1007-0214</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNo9kL1vwjAUxK2qlUpp945Rtw6hz3HiZy-VUEQ_JKQOTWfL2A4EgQMxUeG_ryNQp3fD707vjpBHChNKQb5U39UkA8onyKTMBF6RERUoUuTAr6MGwBQymt-SuxDWAIwXyEbkder15hSakLR1Um50CI3Rm2TmTXfaHZrWJ5UzK9_sexeSxkek7W1Stttdf2j88p7c1HoT3MPljsnP26wqP9L51_tnOZ2nhuX8kFrLkCMXQNEZiQXynDuRMyuRLgpRmEwXhbTW0qgMzVCiqy1kUFiacyHZmDyfc3-1r7VfqnXbd_HzoPYrezwulBu6Q2w5sHBmTdeG0Lla7bpmq7uToqCGrVTcSg28umwVLU8Xy6r1y30s9u_hHIXguczZH-zAZsc</recordid><startdate>20160201</startdate><enddate>20160201</enddate><creator>Shabir, Muhammad Yasir</creator><creator>Iqbal, Asif</creator><creator>Mahmood, Zahid</creator><creator>Ghafoor, Ataullah</creator><general>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer & Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20160201</creationdate><title>Analysis of Classical Encryption Techniques in Cloud Computing</title><author>Shabir, Muhammad Yasir ; Iqbal, Asif ; Mahmood, Zahid ; Ghafoor, Ataullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c346t-dd376768017ec9757646e843d971b585c2a559ddd1c2ac12797efd0205d146893</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>信息技术产业</topic><topic>加密技术</topic><topic>技术分析</topic><topic>控制方案</topic><topic>敏感数据</topic><topic>计算模式</topic><topic>计算资源</topic><topic>访问控制</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shabir, Muhammad Yasir</creatorcontrib><creatorcontrib>Iqbal, Asif</creatorcontrib><creatorcontrib>Mahmood, Zahid</creatorcontrib><creatorcontrib>Ghafoor, Ataullah</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>Tsinghua science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shabir, Muhammad Yasir</au><au>Iqbal, Asif</au><au>Mahmood, Zahid</au><au>Ghafoor, Ataullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Classical Encryption Techniques in Cloud Computing</atitle><jtitle>Tsinghua science and technology</jtitle><addtitle>Tsinghua Science and Technology</addtitle><date>2016-02-01</date><risdate>2016</risdate><volume>21</volume><issue>1</issue><spage>102</spage><epage>113</epage><pages>102-113</pages><issn>1007-0214</issn><eissn>1878-7606</eissn><eissn>1007-0214</eissn><abstract>Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications.</abstract><pub>Department of Computer Science, University of Management Science and Information, Kotli, AJK, Pakistan%School of Computer & Communication Engineering, University of Science and Technology, Beijing 100083, China%Department of Computer Science,National University of Modem Languages, Islamabad 44000,Pakistan</pub><doi>10.1109/TST.2016.7399287</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1007-0214 |
ispartof | Tsinghua science and technology, 2016-02, Vol.21 (1), p.102-113 |
issn | 1007-0214 1878-7606 1007-0214 |
language | eng |
recordid | cdi_wanfang_journals_qhdxxb_e201601009 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | 信息技术产业 加密技术 技术分析 控制方案 敏感数据 计算模式 计算资源 访问控制 |
title | Analysis of Classical Encryption Techniques in Cloud Computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T04%3A46%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Classical%20Encryption%20Techniques%20in%20Cloud%20Computing&rft.jtitle=Tsinghua%20science%20and%20technology&rft.au=Shabir,%20Muhammad%20Yasir&rft.date=2016-02-01&rft.volume=21&rft.issue=1&rft.spage=102&rft.epage=113&rft.pages=102-113&rft.issn=1007-0214&rft.eissn=1878-7606&rft_id=info:doi/10.1109/TST.2016.7399287&rft_dat=%3Cwanfang_jour_cross%3Eqhdxxb_e201601009%3C/wanfang_jour_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=667886494&rft_wanfj_id=qhdxxb_e201601009&rfr_iscdi=true |