Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 329626, 8 pages
http://dx.doi.org/10.1155/2015/329626
Research Article

A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption

Zhengzhou Institute of Information Science and Technology, Zhengzhou 450000, China

Received 17 June 2015; Revised 29 September 2015; Accepted 5 October 2015

Academic Editor: Mark Leeson

Copyright © 2015 Tonghao Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. D. P. Shah and P. A. Ganatra, “Comparative study of data possession techniques for data storage as a service (DSaaS),” International Journal of Computer Applications, vol. 80, no. 4, pp. 38–42, 2013. View at Google Scholar
  3. D. Catteddu, “Cloud computing: benefits, risks and recommendations for information security,” in Web Application Security, p. 17, Springer, 2010. View at Publisher · View at Google Scholar
  4. L. M. Kaufman, “Data security in the world of cloud computing,” IEEE Security and Privacy, vol. 7, no. 4, pp. 61–64, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Geambasu, T. Kohno, A. Levy et al., “Vanish: increasing data privacy with self-destructing data,” in Proceedings of the 18th USENIX Security Symposium, pp. 299–315, Montreal, Canada, August 2009.
  6. G. Wang, F. Yue, and Q. Liu, “A secure self-destructing scheme for electronic data,” Journal of Computer and System Sciences, vol. 79, no. 2, pp. 279–290, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Perlman, “File system design with assured delete,” in Proceedings of the 3rd IEEE International Security in Storage Workshop (SISW '05), pp. 83–88, IEEE, San Francisco, Calif, USA, December 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “FADE: secure overlay cloud storage with file assured deletion,” in Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7–9, 2010. Proceedings, vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 380–397, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  9. R. Perlman, “The Ephemerizer: making data disappear,” Journal of Information System Security, vol. 1, no. 1, pp. 21–32, 2005. View at Google Scholar
  10. S. Wolchok, S. O. Hofmann, N. Heninger et al., “Defeating vanish with low-cost Sybil attacks against large DHT,” in Proceedings of the 17th Annual Network & Distributed System Security Conference (NDSS '10), pp. 1–15, San Diego, Calif, USA, February 2010.
  11. L. Zeng, Z. Shi, S. Xu, and D. Feng, “SafeVanish: an improved data self-destruction for protecting data privacy,” in Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science, pp. 521–528, IEEE, Indianapolis, Ind, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Xiong, Z. Yao, J. Ma et al., “A secure document self-destruction scheme: an ABE approach,” in Proceedings of the 15th IEEE International Conference on High Performance Computing and Communications (HPCC '13), pp. 59–64, Zhangjiajie, China, November 2013.
  13. D. Frank, A Distributed Hash Table, Massachusetts Institute of Technology, 2005.
  14. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings, vol. 3494 of Lecture Notes in Computer Science, pp. 457–473, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  15. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Rhea, B. Godfrey, B. Karp et al., “OpenDHT: a public DHT service and its uses,” Computer Communication Review, vol. 35, no. 4, pp. 73–84, 2005. View at Google Scholar