Blockchain-based publicly verifiable data deletion scheme for cloud storage

被引:94
作者
Yang, Changsong [1 ]
Chen, Xiaofeng [1 ]
Xiang, Yang [1 ,2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Swinburne Univ Technol, Digital Res & Innovat Capabil Platform, Hawthorn, Vic, Australia
基金
中国国家自然科学基金;
关键词
Cloud storage; Secure deletion; Blockchain; Public verification; SECURE;
D O I
10.1016/j.jnca.2017.11.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud storage, more and more data owners store their data on the remote cloud, that can reduce data owners' overhead because the cloud server maintaining the data for them, e.g., storing, updating and deletion. However, that leads to data deletion becomes a security challenge because the cloud server may not delete the data honestly for financial incentives. Recently, plenty of research works have been done on secure data deletion. However, most of the existing methods can be summarized with the same protocol essentially, which called "one-bit-return" protocol: the storage server deletes the data and returns a one-bit result. The data owner has to believe the returned result because he cannot verify it. In this paper, we propose a novel blockchain-based data deletion scheme, which can make the deletion operation more transparent. In our scheme, the data owner can verify the deletion result no matter how malevolently the cloud server behaves. Besides, with the application of blockchain, the proposed scheme can achieve public verification without any trusted third party.
引用
收藏
页码:185 / 193
页数:9
相关论文
共 37 条
[1]  
[Anonymous], 1997, Computer and Communications Security, DOI [10.1145/266420.266430, DOI 10.1145/266420.266430]
[2]  
[Anonymous], 2005, ACM Transactions on Storage
[3]  
Bayer D., 1993, Sequences II: Methods in Communication, Security, and Computer Science, P329, DOI DOI 10.1007/978-1-4613-9323-8_24
[4]  
Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
[5]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[6]  
Cachin C., 2013, P 2013 ACM SIGSAC C, P259
[7]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[8]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[9]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[10]   Secure or usable? [J].
Cranor, LF ;
Garfinkel, S .
IEEE SECURITY & PRIVACY, 2004, 2 (05) :16-18