Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE)

被引:1
作者
Abinaya, P. [1 ]
Kumar, Senthil J. [1 ]
机构
[1] Mepco Schlenk Engn Coll, Sivakasi, Tamil Nadu, India
关键词
Cipher text; cloud computing; Data Verification Policy; IoT; SECURE; SCHEME;
D O I
10.1080/01969722.2023.2176654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern cloud computing strategies greatly reduce investment in infrastructure and data maintenance costs across startup companies and large organizations. This is mainly because of the emergence of the cloud-based IoT paradigm, which allows IoT-based devices to directly upload the data acquired from the environments to the remote cloud and allows the owner of those resources to manage their data through cloud-based applications. However, there are many challenges associated with this kind of data being outsourced, and the cloud server is entirely responsible for securing that data. Since these cloud servers cannot always be fully trusted, securing the deletion of unwanted sensitive data stored in the cloud to prevent data leaking is another challenging issue. As a result, most of the existing technology allows coarse-grained deletion of data on cloud servers. Consequently, cloud data security is jeopardized and new technological development in the cloud environment is hampered. This work implements a Cloud-based, Scalable, Secure unique data Deletion and Verification policy (CSSDV) that uses Ciphertext-Attribute-based encryption to enable fine-grained secure data deletion and data verification. We confirm the CSSDV scheme's security under the standard model and demonstrate its accuracy and efficacy through theoretical analysis and extensive numerical experiment data. The experimental results for eleven attribute each with different sizes demonstrate the superiority of our algorithm in accessing and deleting the files in a secure and scalable manner.
引用
收藏
页码:786 / 803
页数:18
相关论文
共 21 条
  • [1] Cao J., 2018, INT J HYDROGEN ENERG, V7, P329
  • [2] Du R., 2019, J COMMUNICATIONS, V40, P130
  • [3] Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Jiang, Qi
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 336 - 348
  • [4] Secure, efficient and revocable multi-authority access control system in cloud storage
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Liu, Ximeng
    Xiong, Jinbo
    Chen, Danwei
    [J]. COMPUTERS & SECURITY, 2016, 59 : 45 - 59
  • [5] [刘忆宁 Liu Yining], 2018, [计算机研究与发展, Journal of Computer Research and Development], V55, P2199
  • [6] Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    Li, Jiguo
    Li, Hongwei
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1080 - 1094
  • [7] Assured Deletion in the Cloud: Requirements, Challenges and Future Directions
    Ramokapane, Kopo M.
    Rashid, Awais
    Such, Jose M.
    [J]. CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, : 97 - 108
  • [8] EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet
    Sun, Yunqing
    Cao, Jin
    Ma, Maode
    Zhang, Yinghui
    Li, Hui
    Niu, Ben
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 370 - 387
  • [9] Secure limitation analysis of public-key cryptography for smart card settings
    Tian, Youliang
    Li, Qiuxian
    Hu, Jia
    Lin, Hui
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 1423 - 1440
  • [10] RESOURCE-AWARE SECURE ECG HEALTHCARE MONITORING THROUGH BODY SENSOR NETWORKS
    Wang, Honggang
    Peng, Dongming
    Wang, Wei
    Sharif, Hamid
    Chen, Hsiao-Hwa
    Khoynezhad, Ali
    [J]. IEEE WIRELESS COMMUNICATIONS, 2010, 17 (01) : 12 - 19