2018
DOI: 10.1109/tii.2018.2841047
|View full text |Cite
|
Sign up to set email alerts
|

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications

Abstract: The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel techniques. In this paper, we focus on assured data deletion, an issue which is important but received less attention… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(18 citation statements)
references
References 35 publications
0
18
0
Order By: Relevance
“…Zhang proposed an instantaneous deterministic deletion method of cloud storage data based on feature iteration [13], which extracts and classifies the features of redundant data in cloud storage data, iterates until convergence, and achieves high-performance deletion of redundant data. In addition, some assured deletion or selfdestruction schemes for cloud data based on DHT [10,14], attribute-based encryption [15][16][17][18], and identity-based encryption [19,20] are proposed in recent years. Xiong et al [21] made an in-depth analysis and comments on the related research work in recent years from three aspects: trusted execution environment, key management, and access control strategy.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang proposed an instantaneous deterministic deletion method of cloud storage data based on feature iteration [13], which extracts and classifies the features of redundant data in cloud storage data, iterates until convergence, and achieves high-performance deletion of redundant data. In addition, some assured deletion or selfdestruction schemes for cloud data based on DHT [10,14], attribute-based encryption [15][16][17][18], and identity-based encryption [19,20] are proposed in recent years. Xiong et al [21] made an in-depth analysis and comments on the related research work in recent years from three aspects: trusted execution environment, key management, and access control strategy.…”
Section: Related Workmentioning
confidence: 99%
“…e user encrypts data with the KP-ABE algorithm. When the expired data needs to be deleted, the users cannot decrypt and access the data by revoking the attribute corresponding to the expired data and reencrypting the data [42]. Before the cloud data storage, the data is encrypted, and a digital signature is generated for each data block in the ciphertext by a hash operation.…”
Section: Abe-based Deletion and Verificationmentioning
confidence: 99%
“…For static and dynamic decision trees, the time complexity of the deduplication scheme was reduced with the help of interactive protocols. Yu et al had worked [13,16] on data deduplication in cloud storage. To some extent, these schemes tighten the security of the duplicated data, but the complexity of both the system and the Convergent Key management increases rapidly.…”
Section: Related Workmentioning
confidence: 99%