Provable data deletion from efficient data integrity auditing and insertion in cloud storage

被引:15
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Zhao, Feng [2 ]
Zhang, Shubin [4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310000, Peoples R China
关键词
Cloud storage; Data integrity auditing; Provable data deletion; Efficient data insertion; NR-MHT; DATA POSSESSION SCHEME; DYNAMIC DATA POSSESSION; ASSURED DATA DELETION; ACCESS-CONTROL; SECURITY;
D O I
10.1016/j.csi.2022.103629
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread popularity of cloud storage, a growing number of data owners are willing to outsource their massive data to remote cloud servers, thus effectively avoiding the heavy burden of storing and managing the massive data by themselves in local physical storage mediums. Despite the tremendous advantages, cloud storage inescapably suffers from some severe security challenges resulting from the separation of outsourced data management and its ownership, such as data integrity, data deletion, and data insertion. In this paper, we aim to deal with the problems of integrity auditing, dynamic insertion and provable deletion over outsourced data. Specifically, we design a novel authentication data structure, namely, number-rank-based Merkle hash tree (NRMHT), which can achieve data dynamic operations. Meanwhile, NR-MHT can maintain many data blocks in each leaf node, thus effectively solving the problem of the height indefinitely increases with the total number of data blocks. Subsequently, we adopt NR-MHT to propose a new provable data deletion scheme based on efficient data integrity auditing and dynamic data insertion. In our presented scheme, the data owner can not only permanently delete the unnecessary outsourced data blocks to save storage expenditures but also efficiently insert new data blocks to dynamically update the outsourced data set. Meanwhile, we analyze the security to formally demonstrate that our presented scheme can satisfy all of the expected security requirements without interacting with a third party auditor. Finally, we also develop a prototype implementation of our presented scheme and provide an accurate efficiency evaluation. The numerical analysis and experimental results show that compared with the existing schemes, our presented scheme is more attractive in efficiency and practicability.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [2] Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing
    Yang, Changsong
    Xiao, Jun
    Liu, Yueling
    Liu, Yang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [3] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [4] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [5] Efficient data transfer supporting provable data deletion for secure cloud storage
    Yang, Changsong
    Liu, Yueling
    Ding, Yong
    [J]. SOFT COMPUTING, 2022, 26 (14) : 6463 - 6479
  • [6] Efficient data transfer supporting provable data deletion for secure cloud storage
    Changsong Yang
    Yueling Liu
    Yong Ding
    [J]. Soft Computing, 2022, 26 : 6463 - 6479
  • [7] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [8] Efficient data integrity auditing for storage security in mobile health cloud
    Yongjun Ren
    Jian Shen
    Yuhui Zheng
    Jin Wang
    Han-Chieh Chao
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 854 - 863
  • [9] Efficient data integrity auditing for storage security in mobile health cloud
    Ren, Yongjun
    Shen, Jian
    Zheng, Yuhui
    Wang, Jin
    Chao, Han-Chieh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 854 - 863
  • [10] Mutual Verifiable Provable Data Auditing in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Han, Jin
    Lee, Sungyoung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (02): : 317 - 323