Fine-grained assured data deletion scheme based on attribute association

ABSTRACT With the rapid development of cloud computing technology, an increasing number of enterprises and users store their data in the cloud to achieve convenient storage and data sharing. However, once data is stored in a third-party cloud storage service provider, the privacy and integrity of the data can be compromised. This paper proposes a fine-grained assured data deletion scheme based on attribute association (ADAA), which aims to protect security and achieve assured deletion of outsourced data. The scheme uses standard encryption technology to ensure the privacy and integrity of the data and implements secure deletion based on attribute revocation. At the same time, it incorporates access policy graphs and policy combinations to achieve fine-grained access control and data sharing. In addition, it associates attributes to achieve access control by using a homomorphic hash function, and it establishes a deletion confirmation feedback mechanism to provide a reliable guarantee. By experimenting and comparing with related schemes, ADAA is proved to be safe and efficient, and it provides a practical method for the assured deletion of cloud storage data.

[1]  Jianfeng Ma,et al.  A Secure Data Self-Destructing Scheme in Cloud Computing , 2014, IEEE Transactions on Cloud Computing.

[2]  Fenghua Li,et al.  An Attribute-Based Assured Deletion Scheme in Cloud Computing , 2019, Int. J. Inf. Technol. Web Eng..

[3]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[4]  Bin Yu,et al.  A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption , 2015 .

[5]  Radia J. Perlman,et al.  File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[6]  Peter Gutmann,et al.  Secure deletion of data from magnetic and solid-state memory , 1996 .

[7]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Alessandro Sorniotti,et al.  Policy-based secure deletion , 2013, IACR Cryptol. ePrint Arch..

[9]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[10]  Shigang Chen,et al.  On Deletion of Outsourced Data in Cloud Computing , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[11]  Xiaojiang Du,et al.  Efficient attribute-based encryption with attribute revocation for assured data deletion , 2018, Inf. Sci..

[12]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[13]  Tom Coughlin,et al.  Disposal of Disk and Tape Data by Secure Sanitization , 2009, IEEE Security & Privacy.

[14]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  Hubert Ritzdorf,et al.  Secure data deletion from persistent media , 2013, CCS.

[16]  Li Hui,et al.  Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .

[17]  Amit Ganatra,et al.  Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS) , 2013 .