ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud

被引:1
|
作者
Senthilkumar, Sudha [1 ]
Viswanatham, Madhu [2 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[2] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
access control; access control list; assured file deletion; cloud computing; cloud storage; data owner; trusted authority;
D O I
10.5614/itbj.ict.res.appl.2014.8.1.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. While this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage problem from unauthorized users. Existing solutions that use pure cryptographic techniques suffers from heavy computation work with respect to key management and key distribution. Attribute based encryption is an alternative solution that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn't address the access control with assured deletion of the files upon revocation of user access. This article addresses this open issue using a trusted authority that manages the access control list and takes care of key management and key distribution and file deletion upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [1] Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing
    Kaushik, Shweta
    Gandhi, Charu
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (01) : 64 - 84
  • [2] Secure Overlay Cloud Storage with Access Control and Assured Deletion
    Tang, Yang
    Lee, Patrick P. C.
    Lui, John C. S.
    Perlman, Radia
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 903 - 916
  • [3] A Survey on Assured Deletion of Outsourced Data in Cloud Storage
    Ren Z.-W.
    Li X.-T.
    Wang L.-N.
    Tong Y.
    Xu S.-W.
    Ding W.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (10): : 2542 - 2560
  • [4] FADE: Secure Overlay Cloud Storage with File Assured Deletion
    Tang, Yang
    Lee, Patrick P. C.
    Lui, John C. S.
    Perlman, Radia
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 380 - +
  • [5] Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)
    Ranjan, Aditya Kaushal
    Kumar, Vijay
    Hussain, Muzzammil
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 453 - 458
  • [6] Scalable and secure access control policy update for outsourced big data
    Fugkeaw, Somchart
    Sato, Hiroyuki
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 364 - 373
  • [7] Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study
    Debnath, S.
    Bhuyan, B.
    [J]. MULTIAGENT AND GRID SYSTEMS, 2018, 14 (04) : 383 - 401
  • [8] Secure and effective assured deletion scheme with orderly overwriting for cloud data
    Junfeng Tian
    Tianfeng Zhang
    [J]. The Journal of Supercomputing, 2022, 78 : 9326 - 9354
  • [9] Secure and effective assured deletion scheme with orderly overwriting for cloud data
    Tian, Junfeng
    Zhang, Tianfeng
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9326 - 9354
  • [10] Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation
    Cheng, Yuting
    Yang, Li
    Yu, Shui
    Ma, Jianfeng
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 392 - 411