Efficient data transfer supporting provable data deletion for secure cloud storage

被引:3
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Ding, Yong [1 ,4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
关键词
Cloud storage; Outsourced data; Data transfer; Data deletion; CBFT; RMHT; Verifiability; ACCESS-CONTROL; BLOOM FILTER;
D O I
10.1007/s00500-022-07116-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large quantity of enterprises provide cloud storage services, which are equipped with different prices, reliability, security, and so on. Hence, outsourced data transfer has become a fundamental requirement for tenants to flexibly change cloud service providers (CSPs) to enjoy more suitable services. Nevertheless, how to guarantee the data integrity when the data are transferred from a cloud data center to another is a concern of tenants. To solve this concern, we design a new validation data structure, namely, counting Bloom filter tree (CBFT), which can be viewed as a specific binary tree based on CBF. Then, we present an efficient outsourced data transfer scheme supporting provable data deletion, in which tenants can flexibly change CSPs and transfer their outsourced data blocks from a cloud data center to another without retrieving them. At the same time, after the data are successfully transferred, tenants can validate the transferred data integrity and usability on the new cloud data center and permanently delete the transferred data from the old cloud data center. Moreover, the formal security analysis proves that our new solution can achieve all of the anticipant security goals without interaction with a third party. At last, we develop a prototype system and implement our new solution, thus providing accurate performance evaluation, which intuitively presents the high efficiency and practicality of our new solution.
引用
收藏
页码:6463 / 6479
页数:17
相关论文
共 41 条
[1]   Homomorphic Authentication Based on Rank-Based Merkle Hash Tree [J].
Bai, Ping ;
Zhang, Wei ;
Wang, Xu An ;
Liu, Yudong ;
Yang, HaiBin ;
Shan, Chun .
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 :841-848
[2]   An IBE-based design for assured deletion in cloud storage [J].
Bentajer, Ahmed ;
Hedabou, Mustapha ;
Abouelmehdi, Karim ;
Igarramen, Zakaria ;
El Fezazi, Said .
CRYPTOLOGIA, 2019, 43 (03) :254-265
[3]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[4]  
Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
[5]  
Changsong Yang, 2018, Information and Communications Security. 20th International Conference, ICICS 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11149), P445, DOI 10.1007/978-3-030-01950-1_26
[6]   An Innovative Industry 4.0 Cloud Data Transfer Method for an Automated Waste Collection System [J].
Cotet, Costel Emil ;
Deac, Gicu Calin ;
Deac, Crina Narcisa ;
Popa, Cicerone Laurentiu .
SUSTAINABILITY, 2020, 12 (05) :1-15
[7]   Hybrid Context Aware Recommendation System for E-Health Care by merkle hash tree from cloud using evolutionary algorithm [J].
Deepa, N. ;
Pandiaraja, P. .
SOFT COMPUTING, 2020, 24 (10) :7149-7161
[8]   An Associated Deletion Scheme for Multi-copy in Cloud Storage [J].
Dulin ;
Zhang, Zhiwei ;
Tan, Shichong ;
Wang, Jianfeng ;
Tao, Xiaoling .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 :511-526
[9]   Summary cache: A scalable wide-area Web cache sharing protocol [J].
Fan, L ;
Cao, P ;
Almeida, J ;
Broder, AZ .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (03) :281-293
[10]  
Guan ZL, 2010, PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, P269, DOI 10.1049/cp.2010.0767