Abstract

Modern cloud computing strategies greatly reduce investment in infrastructure and data maintenance costs across startup companies and large organizations. This is mainly because of the emergence of the cloud-based IoT paradigm, which allows IoT-based devices to directly upload the data acquired from the environments to the remote cloud and allows the owner of those resources to manage their data through cloud-based applications. However, there are many challenges associated with this kind of data being outsourced, and the cloud server is entirely responsible for securing that data. Since these cloud servers cannot always be fully trusted, securing the deletion of unwanted sensitive data stored in the cloud to prevent data leaking is another challenging issue. As a result, most of the existing technology allows coarse-grained deletion of data on cloud servers. Consequently, cloud data security is jeopardized and new technological development in the cloud environment is hampered. This work implements a Cloud-based, Scalable, Secure unique data Deletion and Verification policy (CSSDV) that uses Ciphertext-Attribute-based encryption to enable fine-grained secure data deletion and data verification. We confirm the CSSDV scheme’s security under the standard model and demonstrate its accuracy and efficacy through theoretical analysis and extensive numerical experiment data. The experimental results for eleven attribute each with different sizes demonstrate the superiority of our algorithm in accessing and deleting the files in a secure and scalable manner.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.