Efficient data transfer supporting provable data deletion for secure cloud storage

被引:0
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Ding, Yong [1 ,4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
关键词
Cloud storage; Outsourced data; Data transfer; Data deletion; CBFT; RMHT; Verifiability; COUNTING BLOOM FILTER; ACCESS-CONTROL;
D O I
10.1007/s00500-022-07116-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large quantity of enterprises provide cloud storage services, which are equipped with different prices, reliability, security, and so on. Hence, outsourced data transfer has become a fundamental requirement for tenants to flexibly change cloud service providers (CSPs) to enjoy more suitable services. Nevertheless, how to guarantee the data integrity when the data are transferred from a cloud data center to another is a concern of tenants. To solve this concern, we design a new validation data structure, namely, counting Bloom filter tree (CBFT), which can be viewed as a specific binary tree based on CBF. Then, we present an efficient outsourced data transfer scheme supporting provable data deletion, in which tenants can flexibly change CSPs and transfer their outsourced data blocks from a cloud data center to another without retrieving them. At the same time, after the data are successfully transferred, tenants can validate the transferred data integrity and usability on the new cloud data center and permanently delete the transferred data from the old cloud data center. Moreover, the formal security analysis proves that our new solution can achieve all of the anticipant security goals without interaction with a third party. At last, we develop a prototype system and implement our new solution, thus providing accurate performance evaluation, which intuitively presents the high efficiency and practicality of our new solution.
引用
收藏
页码:6463 / 6479
页数:17
相关论文
共 50 条
  • [1] Efficient data transfer supporting provable data deletion for secure cloud storage
    Changsong Yang
    Yueling Liu
    Yong Ding
    [J]. Soft Computing, 2022, 26 : 6463 - 6479
  • [2] Provable Data Possession Supporting Secure Data Transfer for Cloud Storage
    Yu, Yong
    Ni, Jianbing
    Yu, Yong
    Wu, Wei
    Wang, Yilei
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 38 - 42
  • [3] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [4] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [6] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [7] Provable data deletion from efficient data integrity auditing and insertion in cloud storage
    Yang, Changsong
    Liu, Yueling
    Zhao, Feng
    Zhang, Shubin
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [8] SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (03) : 876 - 888
  • [9] Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage"
    Yu, Jia
    Hao, Rong
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 2090 - 2092
  • [10] Improved Outsourced Provable Data Possession for Secure Cloud Storage
    Yang, Haibin
    Yi, Zhengge
    Li, Ruifeng
    Tu, Zheng
    Wang, Xu An
    Cui, Yuanyou
    Yang, Xiaoyuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021