Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE)

被引:1
|
作者
Abinaya, P. [1 ]
Kumar, Senthil J. [1 ]
机构
[1] Mepco Schlenk Engn Coll, Sivakasi, Tamil Nadu, India
关键词
Cipher text; cloud computing; Data Verification Policy; IoT; SECURE; SCHEME;
D O I
10.1080/01969722.2023.2176654
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern cloud computing strategies greatly reduce investment in infrastructure and data maintenance costs across startup companies and large organizations. This is mainly because of the emergence of the cloud-based IoT paradigm, which allows IoT-based devices to directly upload the data acquired from the environments to the remote cloud and allows the owner of those resources to manage their data through cloud-based applications. However, there are many challenges associated with this kind of data being outsourced, and the cloud server is entirely responsible for securing that data. Since these cloud servers cannot always be fully trusted, securing the deletion of unwanted sensitive data stored in the cloud to prevent data leaking is another challenging issue. As a result, most of the existing technology allows coarse-grained deletion of data on cloud servers. Consequently, cloud data security is jeopardized and new technological development in the cloud environment is hampered. This work implements a Cloud-based, Scalable, Secure unique data Deletion and Verification policy (CSSDV) that uses Ciphertext-Attribute-based encryption to enable fine-grained secure data deletion and data verification. We confirm the CSSDV scheme's security under the standard model and demonstrate its accuracy and efficacy through theoretical analysis and extensive numerical experiment data. The experimental results for eleven attribute each with different sizes demonstrate the superiority of our algorithm in accessing and deleting the files in a secure and scalable manner.
引用
收藏
页码:786 / 803
页数:18
相关论文
共 50 条
  • [41] Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices
    Yan, Xiaodan
    Tu, Shanshan
    Alasmary, Hisham
    Huang, Fengming
    APPLIED SCIENCES-BASEL, 2023, 13 (20):
  • [42] Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
    Zhou, Yunhong
    Zheng, Shihui
    Wang, Licheng
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 14
  • [43] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [44] Expressive Ciphertext Policy Attribute-Based Searchable Encryption for Medical Records in Cloud
    Wu, Qing
    Ma, Xujin
    Zhang, Leyou
    Chen, Yanru
    Ma, Xujin (mxj419@126.com), 1600, Femto Technique Co., Ltd. (23): : 461 - 472
  • [45] Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABE
    Tong, Tian
    Wang, Xinxin
    Gao, Qiong
    Yu, Limei
    Yu, Lijie
    Sun, Yuan
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 21 - 28
  • [46] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [47] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [48] Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
    Xue, Shumin
    Ren, Chengjuan
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (04) : 342 - 350
  • [50] CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
    Yin, Hui
    Zhang, Jixin
    Xiong, Yinqiao
    Ou, Lu
    Li, Fangmin
    Liao, Shaolin
    Li, Keqin
    IEEE ACCESS, 2019, 7 : 5682 - 5694