File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.ins.2018.02.015
- Scopus: eid_2-s2.0-85042168097
- WOS: WOS:000458229200040
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Efficient attribute-based encryption with attribute revocation for assured data deletion
Title | Efficient attribute-based encryption with attribute revocation for assured data deletion |
---|---|
Authors | |
Keywords | Attribute-based encryption Cloud storage Assured data deletion |
Issue Date | 2019 |
Citation | Information Sciences, 2019, v. 479, p. 640-650 How to Cite? |
Abstract | © 2018 Elsevier Inc. Cloud storage allows customers to store their data on remote cloud servers. With the advantage of reducing the burden of data management and storage, an increasing number of users prefer to store their data on the cloud. While secure data deletion is a crucial, it is a challenging issue in cloud storage. Logically deleted data may be easily exposed to un-authorized users in the cloud storage scenario thanks to its salient features such as multi-tenancy, virtualization and elasticity. Moreover, cloud servers might not delete customers’ data as instructed for hidden business interest. Hence, assured deletion is highly sought after. It helps preserve cloud users’ data privacy and is a necessary component of data retention regulations in cloud storage. In this paper, we first investigate the goals of assured data deletion and formalize its security model.Then, we propose a key-policy attribute-based encryption scheme for assured deletion (AD-KP-ABE) of cloud data. Our construction makes use of the attribute revocation cryptographic primitive and Merkle Hash Tree to achieve fine-grained access control and verifiable data deletion. The proposed AD-KP-ABE enjoys desirable properties such as no secret key update, partial ciphertext update and assured data deletion. The detailed security proof and implementation results demonstrate the security and practicality of our proposal. |
Persistent Identifier | http://hdl.handle.net/10722/280652 |
ISSN | 2022 Impact Factor: 8.1 2023 SCImago Journal Rankings: 2.238 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xue, Liang | - |
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Li, Yannan | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Du, Xiaojiang | - |
dc.contributor.author | Yang, Bo | - |
dc.date.accessioned | 2020-02-17T14:34:35Z | - |
dc.date.available | 2020-02-17T14:34:35Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Information Sciences, 2019, v. 479, p. 640-650 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280652 | - |
dc.description.abstract | © 2018 Elsevier Inc. Cloud storage allows customers to store their data on remote cloud servers. With the advantage of reducing the burden of data management and storage, an increasing number of users prefer to store their data on the cloud. While secure data deletion is a crucial, it is a challenging issue in cloud storage. Logically deleted data may be easily exposed to un-authorized users in the cloud storage scenario thanks to its salient features such as multi-tenancy, virtualization and elasticity. Moreover, cloud servers might not delete customers’ data as instructed for hidden business interest. Hence, assured deletion is highly sought after. It helps preserve cloud users’ data privacy and is a necessary component of data retention regulations in cloud storage. In this paper, we first investigate the goals of assured data deletion and formalize its security model.Then, we propose a key-policy attribute-based encryption scheme for assured deletion (AD-KP-ABE) of cloud data. Our construction makes use of the attribute revocation cryptographic primitive and Merkle Hash Tree to achieve fine-grained access control and verifiable data deletion. The proposed AD-KP-ABE enjoys desirable properties such as no secret key update, partial ciphertext update and assured data deletion. The detailed security proof and implementation results demonstrate the security and practicality of our proposal. | - |
dc.language | eng | - |
dc.relation.ispartof | Information Sciences | - |
dc.subject | Attribute-based encryption | - |
dc.subject | Cloud storage | - |
dc.subject | Assured data deletion | - |
dc.title | Efficient attribute-based encryption with attribute revocation for assured data deletion | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.ins.2018.02.015 | - |
dc.identifier.scopus | eid_2-s2.0-85042168097 | - |
dc.identifier.volume | 479 | - |
dc.identifier.spage | 640 | - |
dc.identifier.epage | 650 | - |
dc.identifier.isi | WOS:000458229200040 | - |
dc.identifier.issnl | 0020-0255 | - |