ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage

05/03/2022
by   Zhengyu Yue, et al.
0

With the rapid development of general cloud services, more and more individuals or collectives use cloud platforms to store data. Assured data deletion deserves investigation in cloud storage. In time-sensitive data storage scenarios, it is necessary for cloud platforms to automatically destroy data after the data owner-specified expiration time. Therefore, assured timesensitive data deletion should be sought. In this paper, a finegrained assured time-sensitive data deletion (ATDD) scheme in cloud storage is proposed by embedding the time trapdoor in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Timesensitive data is self-destructed after the data owner-specified expiration time so that the authorized users cannot get access to the related data. In addition, a credential is returned to the data owner for data deletion verification. This proposed scheme provides solutions for fine-grained access control and verifiable data self-destruction. Detailed security and performance analysis demonstrate the security and the practicability of the proposed scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/08/2018

vFAC: Fine-Grained Access Control with Versatility for Cloud Storage

In recent years, cloud storage technology has been widely used in many f...
research
07/10/2023

Accelerating Secure and Verifiable Data Deletion in Cloud Storage via SGX and Blockchain

Secure data deletion enables data owners to fully control the erasure of...
research
06/24/2021

SecureDL: Securing Code Execution and Access Control for Distributed Data Analytics Platforms

Distributed data analytics platforms such as Apache Spark enable cost-ef...
research
01/21/2020

Investigation of Data Deletion Vulnerabilities in NAND Flash Memory Based Storage

Semiconductor NAND Flash based memory technology dominates the electroni...
research
04/09/2018

Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications

The advances of cloud computing, fog computing and Internet of Things (I...
research
05/22/2014

Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage

Backup storage systems often remove redundancy across backups via inline...
research
03/21/2018

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices

With the rapid development of health equipments, increasingly more patie...

Please sign up or login with your details

Forgot password? Click here to reset