Provable data deletion from efficient data integrity auditing and insertion in cloud storage

被引:20
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Zhao, Feng [2 ]
Zhang, Shubin [4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310000, Peoples R China
关键词
Cloud storage; Data integrity auditing; Provable data deletion; Efficient data insertion; NR-MHT; DATA POSSESSION SCHEME; DYNAMIC DATA POSSESSION; ASSURED DATA DELETION; ACCESS-CONTROL; SECURITY;
D O I
10.1016/j.csi.2022.103629
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread popularity of cloud storage, a growing number of data owners are willing to outsource their massive data to remote cloud servers, thus effectively avoiding the heavy burden of storing and managing the massive data by themselves in local physical storage mediums. Despite the tremendous advantages, cloud storage inescapably suffers from some severe security challenges resulting from the separation of outsourced data management and its ownership, such as data integrity, data deletion, and data insertion. In this paper, we aim to deal with the problems of integrity auditing, dynamic insertion and provable deletion over outsourced data. Specifically, we design a novel authentication data structure, namely, number-rank-based Merkle hash tree (NRMHT), which can achieve data dynamic operations. Meanwhile, NR-MHT can maintain many data blocks in each leaf node, thus effectively solving the problem of the height indefinitely increases with the total number of data blocks. Subsequently, we adopt NR-MHT to propose a new provable data deletion scheme based on efficient data integrity auditing and dynamic data insertion. In our presented scheme, the data owner can not only permanently delete the unnecessary outsourced data blocks to save storage expenditures but also efficiently insert new data blocks to dynamically update the outsourced data set. Meanwhile, we analyze the security to formally demonstrate that our presented scheme can satisfy all of the expected security requirements without interacting with a third party auditor. Finally, we also develop a prototype implementation of our presented scheme and provide an accurate efficiency evaluation. The numerical analysis and experimental results show that compared with the existing schemes, our presented scheme is more attractive in efficiency and practicability.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [2] Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
    Barsoum, Ayad F.
    Hasan, M. Anwar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 485 - 497
  • [3] Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
  • [4] Blockchain-Based Dynamic Provable Data Possession for Smart Cities
    Chen, Ruonan
    Li, Yannan
    Yu, Yong
    Li, Huilin
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4143 - 4154
  • [5] Publicly Verifiable Databases With All Efficient Updating Operations
    Chen, Xiaofeng
    Li, Hui
    Li, Jin
    Wang, Qian
    Huang, Xinyi
    Susilo, Willy
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (12) : 3729 - 3740
  • [6] Secure Outsourced Attribute-Based Signatures
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Xiang, Yang
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) : 3285 - 3294
  • [7] Cloud computing risk and audit issues
    Chou, David C.
    [J]. COMPUTER STANDARDS & INTERFACES, 2015, 42 : 137 - 142
  • [8] An Associated Deletion Scheme for Multi-copy in Cloud Storage
    Dulin
    Zhang, Zhiwei
    Tan, Shichong
    Wang, Jianfeng
    Tao, Xiaoling
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 511 - 526
  • [9] Forward Information Industrial Research Institute, 2021, REP PROSP INV STRAT
  • [10] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872