Sign In to Follow Application
View All Documents & Correspondence

A Novel Secure And Fine Grained Self Controlled Outsourced Data Deletion In Cloud Based Io T

Abstract: ABSTRACT [1] Our Invention “A Novel Secure and Fine-grained Self-controlled Outsourced Data Deletion in Cloud-based IoT” has been claimed. The emerging cloud-based IoT paradigm enables IoT devices to directly upload their collected data to the remote cloud and allows data owners to conveniently manage those data through cloud APIs, which has greatly reduced infrastructure investment and data management cost in many IoT applications. Considering that the outsourced data is out of the physical control of data owners and the cloud server cannot always be fully trusted, how to securely delete the unneeded sensitive data stored in cloud to prevent potential data leakage issues is a big challenge. Most of the existing solutions only support coarse-grained deletion and rely on the participation of the cloud server, so their flexibility and practicability are seriously restricted. In this paper, based on an enhanced policy-based puncturable encryption (P-PUN-ENC) primitive, we propose a secure and fine-grained self-controlled outsourced data deletion scheme in cloud-based IoT. The main contribution of our scheme is that it enables data owners to precisely and permanently delete their outsourced IoT-driven data in a policy-based way without relying on the cloud server. To achieve this, we subtly utilize the logical relationship between puncture policy and access policy, and design a policy transform method to convert the puncture process based on puncture policies into update process of access policies. Then, we utilize key delegation technique in attribute-based encryption (ABE) to complete the corresponding key update operations. Additionally, to address the issue of growing key storage and decryption cost in P-PUN-ENC, we propose the outsourced policy-based puncturable encryption (OP-PUN-ENC) primitive by combining the key and decryption outsource technique with P-PUN-ENC. Comprehensive comparisons show that our invention scheme can better meet the data deletion requirements in cloud-based IoT, and formal security proof and extensive simulation results demonstrate the reliability and efficiency of the invention scheme.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
22 November 2022
Publication Number
47/2022
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
prashantece403@gmail.com
Parent Application

Applicants

Archana Patil
Research Scholar, Department of CSE, PDA College of Engineering, Kalaburagi-585102, Karnataka, India archanbpatil@gmail.com
Dr. Rekha Patil
Professor, Department of CSE, PDA College of Engineering, Kalaburagi-585102, Karnataka, India rekha.patilcse@gmail.com
Shehrevar Davierwala
Assistant Professor, Computer Engineering - School of Engineering RK University, Bhavnagar Highway, Kasturbadham-360020. Rajkot, Gujarat, India shehrevard043@gmail.com
Sangamitra Kamble
Assistant Professor, Department of IoT, Malla Reddy Engineering College and Management And Sciences, Medchal-501401, Telangana sangamitra55555@gmail.com
Nukala Lakshmi Deepthi
Assistant Professor, Department of CSE Rishi M.S Institute Of Engineering And Technology For Women, lakshmideepthi16@gmail.com

Inventors

1. Archana Patil
Research Scholar, Department of CSE, PDA College of Engineering, Kalaburagi-585102, Karnataka, India archanbpatil@gmail.com
2. Dr. Rekha Patil
Professor, Department of CSE, PDA College of Engineering, Kalaburagi-585102, Karnataka, India rekha.patilcse@gmail.com
3. Shehrevar Davierwala
Assistant Professor, Computer Engineering - School of Engineering RK University, Bhavnagar Highway, Kasturbadham-360020. Rajkot, Gujarat, India shehrevard043@gmail.com
4. Sangamitra Kamble
Assistant Professor, Department of IoT, Malla Reddy Engineering College and Management And Sciences, Medchal-501401, Telangana sangamitra55555@gmail.com
5. Nukala Lakshmi Deepthi
Assistant Professor, Department of CSE Rishi M.S Institute Of Engineering And Technology For Women, lakshmideepthi16@gmail.com

Specification

Description:DESCRIPTION OF THE INVENTION
[16 ] In our scheme, we endeavor to achieve fine-grained key puncturing to enable the data owner to autonomously delete the outsourced IoT-driven data in a flexible and reliable manner, such that the cipher text of the deleted data still remains confidential against the cloud server or other adversaries even the punctured private key of the data owner is leaked. By taking the non-monotonic attribute-based encryption (NM-ABE) construction as the building block, tag-based puncturable encryption (T-PUN-ENC) allows one-tag-based data deletion. Specifically, in T-PUN-ENC, the data is encrypted under a set of tags T = {t1, . . . , td}, and an efficient Puncture algorithm, on input the current secret key SK and a tag ti, enables the data owner to generate a new secret key SK′ which can decrypt any ciphertext SK can decrypt, except for those including the tag ti . As a result, the data including the tag ti is deleted successfully and cannot be recovered in any case.

[17 ] Algorithm Constructions of P-PUN-ENC The concrete constructions of P-PUN-ENC are given as follows. • KeyGen(ξ, d ) → (PK, SK PK, SK0) This algorithm takes as input a security parameter ξ and number of tags associated with a ciphertext d, and outputs the public key PK and the initial secret key SK0. Specifically, it first generates a bilinear map e : G×G → GT , where G and GT are multiplicative cyclic groups of prime order p, and g is a generator of G. Then, it computes g1 = g α and g2 = g β with random α, β ∈ Z ∗ p . The algorithm randomly selects a degree-d polynomial q(x) with the restriction that q(0) = β, and defines Q(x) = g q(x) .

[ 18] System Operations Our scheme consists of four kinds of system operations corresponding to the algorithms in P-PUN-ENC: System Initialization by DO, Data Encryption by Dev, Data Deletion by DO, and Data Decryption by DO.

[19] System Initialization. In this phase, DO first defines a system security parameter ξ and the number of tags d that will be used to describe the IoT devices. Then, it calls the KeyGen(ξ, d) algorithm to generate the system public key PK and the initial secret key SK0. When deploying the IoT devices, DO will assign a set of tags T = {t1, . . . , td} to them and embed the corresponding public key components into them
, Claims:WE CLAIMS

1. Our Invention “A Novel Secure and Fine-grained Self-controlled Outsourced Data Deletion in Cloud-based IoT”.
2. According to claim1# the invention is to a Our Invention “To achieve reliable and instant data deletion simultaneously, puncturable encryption, a new form of tag-based public-key encryption primitive can be applied .
3. According to claim1,2# Finally, this invention provides Compared with T PUN-ENC, the invention P-PUN-ENC is clearly more flexible and practical, and has wider application foreground.
4. According to claim1,2,3# the invention is In addition, the cloud is able to use the outsourced key to partially decrypt the cipher text without breaking data confidentiality, which significantly reduces the decryption cost for the data owner.
5. According to claim1,2,3,4,# numerically analyze the storage and computation overheads of the invention scheme and conduct extensive simulations to demonstrate its efficiency.

Documents

Application Documents

# Name Date
1 202241067146-COMPLETE SPECIFICATION [22-11-2022(online)].pdf 2022-11-22
1 202241067146-REQUEST FOR EARLY PUBLICATION(FORM-9) [22-11-2022(online)].pdf 2022-11-22
2 202241067146-DRAWINGS [22-11-2022(online)].pdf 2022-11-22
2 202241067146-FORM 1 [22-11-2022(online)].pdf 2022-11-22
3 202241067146-FIGURE OF ABSTRACT [22-11-2022(online)].pdf 2022-11-22
4 202241067146-DRAWINGS [22-11-2022(online)].pdf 2022-11-22
4 202241067146-FORM 1 [22-11-2022(online)].pdf 2022-11-22
5 202241067146-COMPLETE SPECIFICATION [22-11-2022(online)].pdf 2022-11-22
5 202241067146-REQUEST FOR EARLY PUBLICATION(FORM-9) [22-11-2022(online)].pdf 2022-11-22