Wan et al.[2]: Hierarchical ABE | Computation tasks are fully delegated by combining HIBE and CP-ABE | Lack of support compound attributes and multiple attribute allocation |
Sahai and Waters[15] : Fuzzy IBE | One-to-many encryption technique for the fine grained access control | Lack of express ability in their threshold value. Create computation overhead, when users vary |
Goyal et al.[17]: Key policy | Reducing the computation overhead by defining the access control structure with the private key | Lack of flexibility and scalability |
Bethencourt et al.[20]: Cipher text policy | Better than key policy in the terms of enforce access control with encrypted data | Not suitable in enterprise environment because only supports logically organized single set of attributes |
Rifki et al.[21]: Non monotonic access structure | More flexibility in their access control structure by defining negated attributes | Huge overhead in the sense of useless attributes |
Bobba et al.[22]: Attribute set base ABE | Useful in enterprise level and support recursive family set of attribute instead of single set | Preventing collusion and combining attribute from multiple set is real challenge. |
Wang et al.[24]: Hierarchical ASBE | Achieved scalability, flexibility, and fine grained access by supporting compound attribute with a hierarchical structure of the users | Leave or absent of any low level authority cause for delay for that duration also domain hierarchy is very complex |
Liu et al.[30]: Weighted cipher text access structure | Improve fine grained access control by defining attribute weight according to their importance in the system. | Cipher text size is too long |
Liu et al.[31]: Weighted key access structure | Reduce cipher text size by annotated weighted access structure with the private key also simplifying different nicknames of single attribute | Encryption cannot decide who can decrypt the encrypted data |
Wang et al.[34]: Weighted threshold access structure | Efficient multi-authority scheme that used weighted threshold access structure and issued different attribute related keys also avoid collusion resistance | System model of this scheme is complex and how to achieve more significant access structure needs to be studied in future work |