Skip to main content

FDSCD: Fast Deletion Scheme of Cloud Data

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

With the rapid development of cloud storage technology, cloud data assured deletion has received extensive attention. While ensuring the deletion of cloud data, users have also placed increasing demands on cloud data assured deletion, such as improving the execution efficiency of various stages of a cloud data assured deletion system and performing fine-grained access and deletion operations. In this paper, we propose the Fast deletion scheme of cloud data. The scheme replaces complicated bilinear pairing with simple scalar multiplication on elliptic curves to realize ciphertext policy attribute-based encryption of cloud data, while solving the security problem of shared data. In addition, the efficiency of encryption and decryption is improved, and fine-grained access of ciphertext is realized. The scheme designs an attribute key management system that employs a dual-server to solve system flaws caused by single point failure. The scheme is proven to be secure, based on the decisional Diffie-Hellman assumption in the standard model; therefore, it has stronger security. The theoretical analysis and experimental results show that the scheme guarantees security and significantly improves the efficiency of each stage of cloud data assured deletion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Reardon, J., Basin, D.A., Capkun, S.: Secure data deletion. Inf. Secur. Cryptogr. (2016)

    Google Scholar 

  2. Xiong, J.B., Li, F.H., Wang, Y.C., et al.: Research progress on cloud data assured deletion based on cryptography. J. Commun. 37(8), 167–184 (2016)

    Google Scholar 

  3. Liu, Z.L., Li, T., Li, P., et al.: Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78(2), 778–788 (2018)

    Article  Google Scholar 

  4. Liu, Z.L., Huang, Y.Y., Li, J., et al.: DivORAM: towards a practical oblivious RAM with variable block size. Inf. Sci. 447, 1–11 (2018)

    Article  Google Scholar 

  5. Li, T., Liu, Z.L., Li, J., et al.: CDPS: a cryptographic data publishing system. J. Comput. Syst. Sci. 89, 80–91 (2017)

    Article  MathSciNet  Google Scholar 

  6. Agrawal, S., Mohassel, P., Mukherjee, P., et al.: DiSE: distributed symmetric-key encryption. In: ACM Conference on Computer and Communications Security, pp. 1993–2010 (2018)

    Google Scholar 

  7. Li, H., Sun, W.H., Li, F.H., et al.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014)

    MathSciNet  Google Scholar 

  8. Xiong, J.B., Yao, Z.Q., Ma, J.F., et al.: A secure self-destruction scheme with IBE for the internet content privacy. Chin. J. Comput. 37(1), 139–150 (2014)

    Google Scholar 

  9. Yao, W., Chen, Y., Wang, D.: Cloud multimedia files assured deletion based on bit stream transformation with chaos sequence. In: Ibrahim, S., Choo, K.-K.R., Yan, Z., Pedrycz, W. (eds.) ICA3PP 2017. LNCS, vol. 10393, pp. 441–451. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65482-9_31

    Chapter  Google Scholar 

  10. Liang, X., Lu, R., Lin, X., et al.: Ciphertext policy attribute based encryption with efficient revocation. IEEE Symp. Secur. Priv. 2008, 321–334 (2010)

    Google Scholar 

  11. Wang, G.B., Liu, H.T., Wang, C.L., et al.: Revocable attribute based encryption in cloud storage. J. Comput. Res. Dev. 55(6), 1190–1200 (2018)

    MathSciNet  Google Scholar 

  12. Xue, L., Yu, Y., Li, Y., et al.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci., 1–11 (2018)

    Google Scholar 

  13. Li, B., Huang, D.J., Wang, Z.J., et al.: Attribute-based access control for ICN naming scheme. IEEE Trans. Dependable Secur. Comput. 15(2), 194–206 (2018)

    Article  Google Scholar 

  14. Peng, Q., Tian, Y.L.: A secret sharing scheme based on multilinear Diffie-Hellman problem. Acta Electron. Sin. 45(1), 200–205 (2017)

    Google Scholar 

  15. Waters, B.: Ciphertext policy attribute based on encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, pp. 53–70 (2011)

    Google Scholar 

  16. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tong Shao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shao, T., Tian, Y., Li, Z., Jing, X. (2019). FDSCD: Fast Deletion Scheme of Cloud Data. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics