An Attribute-Based Assured Deletion Scheme in Cloud Computing

An Attribute-Based Assured Deletion Scheme in Cloud Computing

Fangfang Shan (State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi'an, China), Hui Li (State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi'an, China), Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy, Beijing, China), Yunchuan Guo (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy, Beijing, China) and Jinbo Xiong (College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China)
DOI: 10.4018/IJITWE.2019040105

Abstract

With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assuredly deletes data upon revocations of attributes. AADS could be applied to solve important security problems by supporting fine-grained attribute-based policies and their combinations. According to the comparison and analysis, AADS provides efficient data encryption and flexible attribute-based assured deletion for cloud-stored data with an acceptable concession in performance cost.
Article Preview
Top

To ensure that deleted data does not reveal privacy, researchers have proposed a variety of secure deletion mechanisms. These mechanisms are broadly divided into three categories, namely overwriting method, cryptography-based method with keys centrally preserved and cryptography-based method with keys distributed preserved.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 15: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing