Abstract
In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud data deletion operation. However, the selfish cloud server might maliciously reserve the data copy for financial interests, and deliberately send a false deletion result to cheat the data owner. In this paper, we design an IBF-based publicly verifiable cloud data deletion scheme. The proposed scheme enables the cloud server to delete the data and return a proof. Then the data owner can check the deletion result by verifying the returned deletion proof. Besides, the proposed scheme can realize public verifiability by applying the primitive of invertible bloom filter. Finally, we can prove that our proposed protocol not only can reach the expected security properties but also can achieve the practicality and high-efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the 6th Conference on USENIX Security Symposium, vol. 6, pp. 91–96 (1996)
Eppstein, D., Goodrich, M.T.: Straggler identification in round-trip data streams via Newton’s identities and invertible Bloom filters. IEEE Trans. Knowl. Data Eng. 23(2), 297–306 (2011)
Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium, vol. 14, pp. 77–89 (1996)
Hall, B., Govindarasu, M.: An assured deletion technique for cloud-based IoT. In: Proceeding of the 27th International Conference on Computer Communication and Networks (ICCCN 2018), pp. 1–9 (2018)
Hao, F., Clarke, D., Zorzo, A.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)
Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, pp. 17–23 (2016)
Miao, M., Wang, J., Ma, J., Susilo, W.: Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86, 49–58 (2017)
Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 340–348. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14478-3_35
Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643–662. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_39
Rahumed, A., Chen, H.C., Tang, Y., Lee, P.P., Lui, J.C.: A secure cloud backup system with assured deletion and version control. In: Proceedings of the 40th International Conference on Parallel Processing Workshops, pp. 160–167 (2011)
Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)
Tian, H., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)
Wei, M.Y.C., Grupp, L.M., Spada, F.E., Swanson, S.: Reliably erasing data from flash-based solid state drives. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST 2011), pp. 105–117 (2011)
Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106–121 (2018)
Xiong, J., et al.: A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)
Xue, L., Ni, J., Li, Y., Shen, J.: Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54, 46–54 (2017)
Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)
Yang, C., Tao, X.: New publicly verifiable cloud data deletion scheme with efficient tracking. In: Yang, C.N., Peng, S.L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 359–372. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_28
Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 445–458. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01950-1_26
Yang, C., Ye, J.: Secure and efficient fine-grained data access control scheme in cloud computing. J. High Speed Netw. 21(4), 259–271 (2015)
Acknowledgements
This work was supported by the Natural Science Foundation of Guangxi (No. 2016GXNSFAA380098) and the Science and Technology Program of Guangxi (No. AB17195045).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, C., Tao, X., Zhao, F., Wang, Y. (2019). A New Outsourced Data Deletion Scheme with Public Verifiability. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_53
Download citation
DOI: https://doi.org/10.1007/978-3-030-23597-0_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23596-3
Online ISBN: 978-3-030-23597-0
eBook Packages: Computer ScienceComputer Science (R0)