Research Article

A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing

Algorithm 2

Verifiable deletion scheme of cloud data in face resolution.
 Begin
 Step 1: TA inputs the master key in Algorithm 1 and the attribute set corresponding to data user . It outputs the private key of the CP-ABE algorithm and sends the private key to MS.
 Step 2: According to Algorithm 1, RS and MS perform authentication between each other. The session key agreement scheme is also performed to generate the session key .
 Step 3: RS uses to SHA-1 hash algorithm to calculate , and then RS uploads to MS. MS calculates to check the data integrity and get face identifier and .
 Step 4: MS receives the stored in the data center. It inputs the private key and ciphertext and uses the CP-ABE algorithm to decrypt. The data ciphertext is obtained. Then, it inputs and the ciphertext through the AES algorithm to obtain the decrypted data .
 Step 5: MS uses the face identifier matching algorithm to match and successfully to obtain . It uses hash algorithm to calculate and then returns to RS.
 Step 6: RS calculates to judge the data integrity. Then, it obtained personal information INF by matching the serial number SN and returned it to the client to complete the face resolution.
 Step 7: TA inputs RS’s deleted request and the master key and generates reencryption key through CP-ABE algorithm. Then, TA returns it to RS and then to MS.
 Step 8: MS inputs the ciphertext and the reencryption key . MS outputs the reencrypted ciphertext and the new MHT tree root through the CP-ABE algorithm. Then, it returns to RS.
 Step 9: RS receives and compares it with . If , that is to say, is equal to , it proves that the cloud server has indeed successfully deleted the target data.
 End