Abstract
With the rapid development of cloud storage technology, cloud data assured deletion has received extensive attention. While ensuring the deletion of cloud data, users have also placed increasing demands on cloud data assured deletion, such as improving the execution efficiency of various stages of a cloud data assured deletion system and performing fine-grained access and deletion operations. In this paper, we propose the Fast deletion scheme of cloud data. The scheme replaces complicated bilinear pairing with simple scalar multiplication on elliptic curves to realize ciphertext policy attribute-based encryption of cloud data, while solving the security problem of shared data. In addition, the efficiency of encryption and decryption is improved, and fine-grained access of ciphertext is realized. The scheme designs an attribute key management system that employs a dual-server to solve system flaws caused by single point failure. The scheme is proven to be secure, based on the decisional Diffie-Hellman assumption in the standard model; therefore, it has stronger security. The theoretical analysis and experimental results show that the scheme guarantees security and significantly improves the efficiency of each stage of cloud data assured deletion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Reardon, J., Basin, D.A., Capkun, S.: Secure data deletion. Inf. Secur. Cryptogr. (2016)
Xiong, J.B., Li, F.H., Wang, Y.C., et al.: Research progress on cloud data assured deletion based on cryptography. J. Commun. 37(8), 167–184 (2016)
Liu, Z.L., Li, T., Li, P., et al.: Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78(2), 778–788 (2018)
Liu, Z.L., Huang, Y.Y., Li, J., et al.: DivORAM: towards a practical oblivious RAM with variable block size. Inf. Sci. 447, 1–11 (2018)
Li, T., Liu, Z.L., Li, J., et al.: CDPS: a cryptographic data publishing system. J. Comput. Syst. Sci. 89, 80–91 (2017)
Agrawal, S., Mohassel, P., Mukherjee, P., et al.: DiSE: distributed symmetric-key encryption. In: ACM Conference on Computer and Communications Security, pp. 1993–2010 (2018)
Li, H., Sun, W.H., Li, F.H., et al.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014)
Xiong, J.B., Yao, Z.Q., Ma, J.F., et al.: A secure self-destruction scheme with IBE for the internet content privacy. Chin. J. Comput. 37(1), 139–150 (2014)
Yao, W., Chen, Y., Wang, D.: Cloud multimedia files assured deletion based on bit stream transformation with chaos sequence. In: Ibrahim, S., Choo, K.-K.R., Yan, Z., Pedrycz, W. (eds.) ICA3PP 2017. LNCS, vol. 10393, pp. 441–451. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65482-9_31
Liang, X., Lu, R., Lin, X., et al.: Ciphertext policy attribute based encryption with efficient revocation. IEEE Symp. Secur. Priv. 2008, 321–334 (2010)
Wang, G.B., Liu, H.T., Wang, C.L., et al.: Revocable attribute based encryption in cloud storage. J. Comput. Res. Dev. 55(6), 1190–1200 (2018)
Xue, L., Yu, Y., Li, Y., et al.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci., 1–11 (2018)
Li, B., Huang, D.J., Wang, Z.J., et al.: Attribute-based access control for ICN naming scheme. IEEE Trans. Dependable Secur. Comput. 15(2), 194–206 (2018)
Peng, Q., Tian, Y.L.: A secret sharing scheme based on multilinear Diffie-Hellman problem. Acta Electron. Sin. 45(1), 200–205 (2017)
Waters, B.: Ciphertext policy attribute based on encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, pp. 53–70 (2011)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shao, T., Tian, Y., Li, Z., Jing, X. (2019). FDSCD: Fast Deletion Scheme of Cloud Data. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)