Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications

04/09/2018
by   Yong Yu, et al.
0

The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel techniques. In this paper, we focus on assured data deletion, an issue which is important but received less attention in academia and industry. We firstly propose a framework to integrate the cloud, the fog and the things together to manage the stored data from industries or individuals. We then focus on secure data deletion in this framework by proposing an assured data deletion scheme which fulfills fine-grained access control over sensitive data and verifiable data deletion. Only the data owners and the fog devices are involved when deleting a data key and validating the data deletion, which makes the protocol practical due to the features of low latency and real-time interaction of fog computing. The proposed protocol takes advantage of attribute-based encryption and is provably secure under the standard model. The theoretical analysis shows the good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/14/2020

A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0

The advent of Industrial IoT (IIoT) along with Cloud computing has broug...
research
05/03/2022

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage

With the rapid development of general cloud services, more and more indi...
research
11/12/2020

Fog based Secure Framework for Personal Health Records Systems

The rapid development of personal health records (PHR) systems enables a...
research
01/13/2020

A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes

People have used cloud computing approach to store their data remotely. ...
research
08/02/2022

Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

NAND flash memory-based IoT device can potentially still leave behind or...
research
08/24/2023

Security Assessment and Hardening of Fog Computing Systems

In recent years, there has been a shift in computing architectures, movi...
research
08/09/2023

IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances

NAND flash memory-based IoT devices inherently suffer from data retentio...

Please sign up or login with your details

Forgot password? Click here to reset