Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

FDSCD: Fast Deletion Scheme of Cloud Data

Download
102 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_27,
        author={Tong Shao and Yuechi Tian and Zhen Li and Xuan Jing},
        title={FDSCD: Fast Deletion Scheme of Cloud Data},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Cloud storage CP-ABE Data privacy Elliptic curve cryptography (ECC) Assured deletion},
        doi={10.1007/978-3-030-21373-2_27}
    }
    
  • Tong Shao
    Yuechi Tian
    Zhen Li
    Xuan Jing
    Year: 2019
    FDSCD: Fast Deletion Scheme of Cloud Data
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_27
Tong Shao1,*, Yuechi Tian2, Zhen Li, Xuan Jing1
  • 1: Hebei University
  • 2: HUST
*Contact email: 15613668123@163.com

Abstract

With the rapid development of cloud storage technology, cloud data assured deletion has received extensive attention. While ensuring the deletion of cloud data, users have also placed increasing demands on cloud data assured deletion, such as improving the execution efficiency of various stages of a cloud data assured deletion system and performing fine-grained access and deletion operations. In this paper, we propose the Fast deletion scheme of cloud data. The scheme replaces complicated bilinear pairing with simple scalar multiplication on elliptic curves to realize ciphertext policy attribute-based encryption of cloud data, while solving the security problem of shared data. In addition, the efficiency of encryption and decryption is improved, and fine-grained access of ciphertext is realized. The scheme designs an attribute key management system that employs a dual-server to solve system flaws caused by single point failure. The scheme is proven to be secure, based on the decisional Diffie-Hellman assumption in the standard model; therefore, it has stronger security. The theoretical analysis and experimental results show that the scheme guarantees security and significantly improves the efficiency of each stage of cloud data assured deletion.