A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing
Algorithm 2
Verifiable deletion scheme of cloud data in face resolution.
Begin
Step 1: TA inputs the master key in Algorithm 1 and the attribute set corresponding to data user . It outputs the private key of the CP-ABE algorithm and sends the private key to MS.
Step 2: According to Algorithm 1, RS and MS perform authentication between each other. The session key agreement scheme is also performed to generate the session key .
Step 3: RS uses to SHA-1 hash algorithm to calculate , and then RS uploads to MS. MS calculates to check the data integrity and get face identifier and .
Step 4: MS receives the stored in the data center. It inputs the private key and ciphertext and uses the CP-ABE algorithm to decrypt. The data ciphertext is obtained. Then, it inputs and the ciphertext through the AES algorithm to obtain the decrypted data .
Step 5: MS uses the face identifier matching algorithm to match and successfully to obtain . It uses hash algorithm to calculate and then returns to RS.
Step 6: RS calculates to judge the data integrity. Then, it obtained personal information INF by matching the serial number SN and returned it to the client to complete the face resolution.
Step 7: TA inputs RS’s deleted request and the master key and generates reencryption key through CP-ABE algorithm. Then, TA returns it to RS and then to MS.
Step 8: MS inputs the ciphertext and the reencryption key . MS outputs the reencrypted ciphertext and the new MHT tree root through the CP-ABE algorithm. Then, it returns to RS.
Step 9: RS receives and compares it with . If , that is to say, is equal to , it proves that the cloud server has indeed successfully deleted the target data.