Abstract
With the development of Internet of Things, heterogeneous data from all kinds of sensors are processed and stored in the cloud server provider. Cloud can be regarded as one of the important layers in the Internet of Things architecture and Internet of Things is the biggest customer of the cloud. As to the security in the Internet of Things, encryption is one of the important mechanisms to achieve confidentiality of the data. However, data encryption introduces new challenges for its assured deletion in cloud, which becomes crucial for big data storage and processing in cloud for Internet of Things. Most existing solutions of cloud data assured deletion only delete the key while the ciphertext is still intact. On the other hand, the decryption time of the user increases with the size of data in the solutions. In this article, we propose a novel assured deletion scheme over encrypted cloud data based on the idea of uploading by sampling slice and outsourcing the decryption of ciphertext policy attribute–based encryption. The analysis and simulation results show that our scheme is secure and efficient, especially on reducing the decryption time of the user. We also designed a ciphertext deduplication scheme based on this scheme and explained its flow.
Highlights
Internet of Things (IoT) is a complex system with multiple heterogeneous networks.[1]
As the encoding time occupies most of the total decryption time, the study of efficient coding strategy helps us improve the efficiency of decryption
The combination of the IoT and cloud computing had to face problems in their practical way as they are based on the Internet
Summary
Internet of Things (IoT) is a complex system with multiple heterogeneous networks.[1]. Most of the existing cloud data assured deletion schemes are the destruction of the key. HjUj 2 G The random number a, b, s, z 2 Zp The public parameters The master key The owner data The remain plaintext The sampled plaintext The bit information of sampled plaintext The position information of sampling plaintext A set of attributes The access structure A The ciphertext of m1 The ciphertext of m2 The ciphertext of d2 The private key consists of S, K, K0, Ki The transpose key consists of S, TK, TK0, TKi The recovery key The transpose ciphertext
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.