Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE)

被引:1
|
作者
Abinaya, P. [1 ]
Kumar, Senthil J. [1 ]
机构
[1] Mepco Schlenk Engn Coll, Sivakasi, Tamil Nadu, India
关键词
Cipher text; cloud computing; Data Verification Policy; IoT; SECURE; SCHEME;
D O I
10.1080/01969722.2023.2176654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern cloud computing strategies greatly reduce investment in infrastructure and data maintenance costs across startup companies and large organizations. This is mainly because of the emergence of the cloud-based IoT paradigm, which allows IoT-based devices to directly upload the data acquired from the environments to the remote cloud and allows the owner of those resources to manage their data through cloud-based applications. However, there are many challenges associated with this kind of data being outsourced, and the cloud server is entirely responsible for securing that data. Since these cloud servers cannot always be fully trusted, securing the deletion of unwanted sensitive data stored in the cloud to prevent data leaking is another challenging issue. As a result, most of the existing technology allows coarse-grained deletion of data on cloud servers. Consequently, cloud data security is jeopardized and new technological development in the cloud environment is hampered. This work implements a Cloud-based, Scalable, Secure unique data Deletion and Verification policy (CSSDV) that uses Ciphertext-Attribute-based encryption to enable fine-grained secure data deletion and data verification. We confirm the CSSDV scheme's security under the standard model and demonstrate its accuracy and efficacy through theoretical analysis and extensive numerical experiment data. The experimental results for eleven attribute each with different sizes demonstrate the superiority of our algorithm in accessing and deleting the files in a secure and scalable manner.
引用
收藏
页码:786 / 803
页数:18
相关论文
共 50 条
  • [21] Collaborative Key Management in Ciphertext Policy Attribute Based Encryption for Cloud
    Ghuge, Mayur N.
    Chatur, Prashant N.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 156 - 158
  • [22] Cloud storage data protection mechanisms based on CP-ABE algorithm
    Song, Kaibo
    Luo, Jun
    Sun, Jintao
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 266 - 269
  • [23] Enabling Dynamic and Efficient Data Access Control in Cloud Computing based on Attribute Certificate Management and CP-ABE
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 454 - 461
  • [24] CP-ABE Based Access Control for Cloud Storage with Rich Policy Support
    Wang, Yong
    Wei, Long-xing
    Hu, Chang-zhen
    Zhao, Xiao-lin
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ENGINEERING (ACSE 2014), 2014, : 18 - 24
  • [25] A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter
    Ramu, Gandikota
    EDUCATION AND INFORMATION TECHNOLOGIES, 2018, 23 (05) : 2213 - 2233
  • [26] A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter
    Gandikota Ramu
    Education and Information Technologies, 2018, 23 : 2213 - 2233
  • [27] A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage
    Wang, Haiyong
    Peng, Yao
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 413 - 425
  • [28] Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
    Zhang, Qiuyu
    Zhao, Zhenyu
    Fu, Minrui
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] An Extended CP-ABE based Access Control Model for Data Outsourced in the Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 73 - 78
  • [30] Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1860 - 1865