Citation: | Yousheng ZHOU, Lüjun CHEN. Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control[J]. Journal of Electronics & Information Technology, 2021, 43(7): 1856-1863. doi: 10.11999/JEIT200399 |
[1] |
LI Yannan, YU Yong, MIN Geyong, et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J]. IEEE Transactions on Dependable and Secure Computing, 2017, 16(1): 72–83. doi: 10.1109/TDSC.2017.2662216
|
[2] |
张玉磊, 刘祥震, 郎晓丽, 等. 云存储环境下多服务器的密钥聚合可搜索加密方案[J]. 电子与信息学报, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418
ZHANG Yulei, LIU Xiangzhen, LANG Xiaoli, et al. Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment[J]. Journal of Electronics &Information Technology, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418
|
[3] |
ZHANG Zhiwei, TAN Shichong, WANG Jianfeng, et al. An associated deletion scheme for multi-copy in cloud storage[C]. International Conference on Algorithms and Architectures for Parallel Processing. Guangzhou, China, 2018: 511-526. doi: 10.1007/978-3-030-05063-4_38.
|
[4] |
HUANG Hui, CHEN Xiaofeng, WU Qianhong, et al. Bitcoin-based fair payments for outsourcing computations of fog devices[J]. Future Generation Computer Systems, 2018, 78: 850–858. doi: 10.1016/j.future.2016.12.016
|
[5] |
赵志远, 朱智强, 王建华, 等. 云存储环境下无密钥托管可撤销属性基加密方案研究[J]. 电子与信息学报, 2018, 40(1): 1–10. doi: 10.11999/JEIT170317
ZHAO Zhiyuan, ZHU Zhiqiang, WANG Jianhua, et al. Revocable Attribute-based Encryption with Escrow-free in Cloud Storage[J]. Journal of Electronics &Information Technology, 2018, 40(1): 1–10. doi: 10.11999/JEIT170317
|
[6] |
张曙光, 咸鹤群, 王利明, 等. 云加密数据安全重复删除方法[J]. 软件学报, 2019, 30(12): 3815–3828. doi: 10.13328/j.cnki.jos.005610
ZHANG Shuguang, XIAN Hequn, WANG Liming, et al. Secure Cloud Encrypted Data Deduplication Method[J]. Journal of Software, 2019, 30(12): 3815–3828. doi: 10.13328/j.cnki.jos.005610
|
[7] |
GARFINKEL S L and SHELAT A. Remembrance of data passed: A study of disk sanitization practices[J]. IEEE Security & Privacy, 2003, 1(1): 17–27. doi: 10.1109/MSECP.2003.1176992
|
[8] |
GUTMANN P. Secure deletion of data from magnetic and solid-state memory[C]. The Sixth USENIX Security Symposium, San Jose, USA. 1996, 14: 77-89.
|
[9] |
PAUL M and SAXENA A. Proof of erasability for ensuring comprehensive data deletion in cloud computing[C]. International Conference on Network Security and Applications. Berlin, Germany, 2010: 340-348. doi: 10.1007/978-3-642-14478-3_35.
|
[10] |
PERITO D and TSUDIK G. Secure code update for embedded devices via proofs of secure erasure[C]. European Symposium on Research in Computer Security. Berlin, Germany, 2010: 643-662. doi: 10.1007/978-3-642-15497-3_39.
|
[11] |
HU Pengfei, NING Huansheng, QIU Tie, et al. Fog computing based face identification and resolution scheme in internet of things[J]. IEEE Transactions on Industrial Informatics, 2016, 13(4): 1910–1920. doi: 10.1109/TII.2016.2607178
|
[12] |
PERLMAN R. File system design with assured delete[C]. The 3rd IEEE International, Security in Storage Workshop. San Francisco, USA, 2005. doi: 10.1109/SISW.2005.5.
|
[13] |
张曙光, 咸鹤群, 王利明, 等. 无可信第三方的加密重复数据安全删除方法[J]. 密码学报, 2018, 5(3): 286-296.
ZHANG Shuguang, XIAN Hequn, WANG Liming, et al. Security deduplication method of encrypted data without ant additional server[J]. Journal of Cryptologic Research, 2018, 5(3): 286-296.
|
[14] |
YANG Changsong, CHEN Xiaofeng, and XIANG Yang. Blockchain-based publicly verifiable data deletion scheme for cloud storage[J]. Journal of Network and Computer Applications, 2018, 103: 185–193. doi: 10.1016/j.jnca.2017.11.011
|
[15] |
YU Yong, XUE Liang, LI Yannan, et al. Assured data deletion with fine-grained access control for fog-based industrial applications[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10): 4538–4547. doi: 10.1109/TII.2018.2841047
|
[16] |
MO Zhen, XIAO Qingjun, ZHOU Yian, et al. On deletion of outsourced data in cloud computing[C]. 2014 IEEE 7th International Conference on Cloud Computing. Anchorage, USA, 2014: 344-351. doi: 10.1109/CLOUD.2014.54.
|
[17] |
REARDON J, RITZDORF H, BASIN D, et al. Secure data deletion from persistent media[C]. The 2013 ACM SIGSAC conference on Computer & communications security. Berlin, Germany, 2013: 271-284. doi: 10.1007/978-3-319-28778-2_9.
|
[18] |
XUE Liang, YU Yong, LI Yannan, et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640–650. doi: 10.1016/j.ins.2018.02.015
|
[19] |
BEIMEL A. Secure Schemes for Secret Sharing and Key Distribution[M]. Haifa, International Journal of Pure & Applied Mathematics, 1996.
|
[20] |
SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Germany, 2005: 457-473. doi: 10.1007/11426639_27.
|
[21] |
刘忆宁, 周元健, 蓝如师, 等. 基于区块链的云数据删除验证协议[J]. 计算机研究与发展, 2018, 55(10): 2199–2207. doi: 10.7544/issn1000-1239.2018.2018.20180436
LIU Yining, ZHOU Yuanjian, LAN Rushi, et al. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199–2207. doi: 10.7544/issn1000-1239.2018.2018.20180436
|
[22] |
RAMOKAPANE K M, RASHID A, and SUCH J M. Assured deletion in the cloud: requirements, challenges and future directions[C]. The 2016 ACM on Cloud Computing Security Workshop. New York, USA, 2016: 97-108. doi: 10.1145/2996429.2996434.
|
[23] |
HAO Feng, CLARKE D, and ZORZO A F. Deleting secret data with public verifiability[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(6): 617–629. doi: 10.1109/TDSC.2015.2423684
|