{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:42:47Z","timestamp":1747474967585,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61170254"],"award-info":[{"award-number":["61170254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The Natural Science Foundation of Hebei Province","award":["F2016201244"],"award-info":[{"award-number":["F2016201244"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the rapid development of cloud storage technology, cloud data assured deletion has received extensive attention. While ensuring the deletion of cloud data, users have also placed increasing demands on cloud data assured deletion, such as improving the execution efficiency of various stages of a cloud data assured deletion system and performing fine-grained access and deletion operations. In this paper, we propose an efficient scheme of cloud data assured deletion. The scheme replaces complicated bilinear pairing with simple scalar multiplication on elliptic curves to realize ciphertext policy attribute-based encryption of cloud data, while solving the security problem of shared data. In addition, the efficiency of encryption and decryption is improved, and fine-grained access of ciphertext is realized. The scheme designs an attribute key management system that employs a dual-server to solve system flaws caused by single point failure. The scheme is proven to be secure, based on the decisional Diffie-Hellman assumption in the standard model; therefore, it has stronger security. The theoretical analysis and experimental results show that the scheme guarantees security and significantly improves the efficiency of each stage of cloud data assured deletion.<\/jats:p>","DOI":"10.1007\/s11036-019-01497-z","type":"journal-article","created":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T20:02:35Z","timestamp":1578340955000},"page":"1597-1608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Efficient Scheme of Cloud Data Assured Deletion"],"prefix":"10.1007","volume":"26","author":[{"given":"Yuechi","family":"Tian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8248-9353","authenticated-orcid":false,"given":"Tong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,6]]},"reference":[{"key":"1497_CR1","doi-asserted-by":"crossref","unstructured":"Reardon J, Basin DA, Capkun S (2016) Secure data deletion[J]. Information Security and Cryptography\u00a0(IS&C)\u00a0","DOI":"10.1007\/978-3-319-28778-2"},{"issue":"8","key":"1497_CR2","first-page":"167","volume":"37","author":"JB Xiong","year":"2016","unstructured":"Xiong JB, Li FH, Wang YC et al (2016) Research progress on cloud data assured deletion based on cryptography[J]. J Commun 37(8):167\u2013184","journal-title":"J Commun"},{"issue":"2","key":"1497_CR3","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.future.2017.02.024","volume":"78","author":"ZL Liu","year":"2018","unstructured":"Liu ZL, Li T, Li P et al (2018) Verifiable searchable encryption with aggregate keys for data sharing system[J]. Futur Gener Comput Syst 78(2):778\u2013788","journal-title":"Futur Gener Comput Syst"},{"key":"1497_CR4","doi-asserted-by":"crossref","unstructured":"Liu ZL, Huang YY, Li J et al (2018) DivORAM: towards a practical oblivious RAM with variable block size[J]. Inf Sci 447","DOI":"10.1016\/j.ins.2018.02.071"},{"key":"1497_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jcss.2016.12.004","volume":"89","author":"T Li","year":"2017","unstructured":"Li T, Liu ZL, Li J et al (2017) CDPS: a cryptographic data publishing system[J]. J Comput Syst Sci 89:80\u201391","journal-title":"J Comput Syst Sci"},{"key":"1497_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal S, Mohassel P, Mukherjee P et al (2018) DiSE: distributed symmetric-key encryption[C]. ACM Conference on Computer and Communications Security(CCS):1993\u20132010","DOI":"10.1145\/3243734.3243774"},{"issue":"7","key":"1497_CR7","first-page":"1397","volume":"51","author":"H Li","year":"2014","unstructured":"Li H, Sun WH, Li FH et al (2014) Secure and privacy-preserving data storage Service in Public Cloud[J]. Journal of Computer Research and Development 51(7):1397\u20131409","journal-title":"Journal of Computer Research and Development"},{"key":"1497_CR8","unstructured":"Perlman R. File system design with assured delete[C]. Third IEEE International Security in Storage Workshop (SISW). San Francisco, CA, USA, c2005:83\u201388"},{"key":"1497_CR9","unstructured":"Perlman R. File system design with assured delete[C]. The 14th Annual Network and Distributed System Security (ISOC NDSS). San Diego, USA, c2007:1\u20137"},{"issue":"1","key":"1497_CR10","first-page":"139","volume":"37","author":"JB Xiong","year":"2014","unstructured":"Xiong JB, Yao ZQ, Ma JF et al (2014) A secure self-destruction scheme with IBE for the internet content privacy[J]. Chinese Journal of Computers 37(1):139\u2013150","journal-title":"Chinese Journal of Computers"},{"key":"1497_CR11","doi-asserted-by":"crossref","unstructured":"Yao W, Chen Y, Wang D (2017) Cloud multimedia file assured deletion based on bit stream transformation with chaos sequence[C]. International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham, p 441\u2013451","DOI":"10.1007\/978-3-319-65482-9_31"},{"issue":"11","key":"1497_CR12","first-page":"108","volume":"36","author":"K Zhang","year":"2016","unstructured":"Zhang K, Yang C, Ma JF et al (2016) Novel cloud data assured deletion approach based on ciphertext sample slice[J]. J Commun 36(11):108\u2013117","journal-title":"J Commun"},{"key":"1497_CR13","unstructured":"Liang X, Lu R, Lin X, Liang X, Lu R, Lin X et al (2010) Ciphertext policy attribute based encryption with efficient revocation[J]. IEEE Symposium on Security and Privacy(S&P) 2008:321\u2013334"},{"issue":"6","key":"1497_CR14","first-page":"1190","volume":"55","author":"GB Wang","year":"2018","unstructured":"Wang GB, Liu HT, Wang CL et al (2018) Revocable attribute based encryption in cloud storage[J]. Journal of Computer Research and Development 55(6):1190\u20131200","journal-title":"Journal of Computer Research and Development"},{"key":"1497_CR15","unstructured":"Xue L, Yu Y, Li Y et al (2018) Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Inf Sci:1\u201311"},{"issue":"1","key":"1497_CR16","first-page":"1","volume":"40","author":"ZY Zhao","year":"2018","unstructured":"Zhao ZY, Zhu ZQ, Wang JH et al (2018) Revocable attribute-based encryption with escrow-free in cloud storage[J]. J Electron Inf Technol 40(1):1\u201310","journal-title":"J Electron Inf Technol"},{"key":"1497_CR17","doi-asserted-by":"crossref","unstructured":"Li B, Huang DJ, Wang ZJ et al (2018) Attribute-based access control for ICN naming scheme[J]. IEEE Transactions on Dependable and Secure Computing(TDSC) 15(2):194\u2013206","DOI":"10.1109\/TDSC.2016.2550437"},{"key":"1497_CR18","unstructured":"Robshaw M, Yin Y (1997) Elliptic curve cryptosystems. An RSA Laboratories Technical Note Revised June 27"},{"issue":"11","key":"1497_CR19","first-page":"1281","volume":"36","author":"QL Xu","year":"1999","unstructured":"Xu QL, Li DX (1999) Elliptic curve cryptosystems[J]. Journal of Computer Research and Development 36(11):1281\u20131288","journal-title":"Journal of Computer Research and Development"},{"issue":"1","key":"1497_CR20","first-page":"200","volume":"45","author":"Q Peng","year":"2017","unstructured":"Peng Q, Tian YL (2017) A secret sharing scheme based on multilinear Diffie-Hellman problem[J]. Acta Electron Sin 45(1):200\u2013205","journal-title":"Acta Electron Sin"},{"key":"1497_CR21","doi-asserted-by":"crossref","unstructured":"Brent Waters (2011) Ciphertext policy attribute based on encryption: An expressive, efficient, and provably secure realization. Proceedings of the 14th international conference on practice and theory in public key cryptography, Taormina, Italy, p 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1497_CR22","first-page":"62","volume-title":"Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]","author":"A Lewko","year":"2010","unstructured":"Lewko A, Okamoto T, Sahai A et al (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Springer, Berlin, pp 62\u201391"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01497-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01497-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01497-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T03:40:45Z","timestamp":1635306045000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01497-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,6]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1497"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01497-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2020,1,6]]},"assertion":[{"value":"6 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}