CP-ABE-Based Secure and Verifiable Data Deletion in Cloud
نویسندگان
چکیده
Cloud data, the ownership of which is separated from their administration, usually contain users’ private information, especially in fifth-generation mobile communication (5G) environment, because collecting data various smart devices inevitably containing personal information. If it not securely deleted time or result deletion cannot be verified after expiration, this will lead to serious issues, such as unauthorized access and privacy disclosure. Therefore, affects security cloud hinders development computing services seriously. In paper, we propose a novel secure verification (SDVC) scheme based on CP-ABE achieve fine-grained for data. Based idea policy CP-ABE, construct an attribute association tree implement fast revoking reencrypting key control deletion. Furthermore, build rule transposition algorithm generate random blocks combine overwriting technology with Merkle hash ciphertext validator, then used verify We prove SDVC under standard model correctness effectiveness through theoretical analysis ample simulation experiment results.
منابع مشابه
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...
متن کاملA Secure and Efficient Erasure Code-based Content Transmission in Cloud Using Cp-abe Approach
-In cloud the retention of retrieval data transmission which contain collection of storage servers to enable expanded storage services .Transmission of content in cloud causes data robustness and data confidentiality .For data robustness implementation of erasure code-based content with multiple key servers are concerned for the recovery process using redundancy. For data confidentiality implem...
متن کاملCP-ABE with Fine-Grained Access Control and Verifiable Delegation in Cloud Computing
With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptograp...
متن کاملA Privacy Protection Method Based on CP-ABE and KP-ABE for Cloud Computing
Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...
متن کاملSecure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption (CP-ABE) System for the DTNs
Mobile Nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Several application scenarios require a security design that provides fine grain access control to conte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/8855341