Efficient data transfer supporting provable data deletion for secure cloud storage

被引:0
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Ding, Yong [1 ,4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
关键词
Cloud storage; Outsourced data; Data transfer; Data deletion; CBFT; RMHT; Verifiability; COUNTING BLOOM FILTER; ACCESS-CONTROL;
D O I
10.1007/s00500-022-07116-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large quantity of enterprises provide cloud storage services, which are equipped with different prices, reliability, security, and so on. Hence, outsourced data transfer has become a fundamental requirement for tenants to flexibly change cloud service providers (CSPs) to enjoy more suitable services. Nevertheless, how to guarantee the data integrity when the data are transferred from a cloud data center to another is a concern of tenants. To solve this concern, we design a new validation data structure, namely, counting Bloom filter tree (CBFT), which can be viewed as a specific binary tree based on CBF. Then, we present an efficient outsourced data transfer scheme supporting provable data deletion, in which tenants can flexibly change CSPs and transfer their outsourced data blocks from a cloud data center to another without retrieving them. At the same time, after the data are successfully transferred, tenants can validate the transferred data integrity and usability on the new cloud data center and permanently delete the transferred data from the old cloud data center. Moreover, the formal security analysis proves that our new solution can achieve all of the anticipant security goals without interaction with a third party. At last, we develop a prototype system and implement our new solution, thus providing accurate performance evaluation, which intuitively presents the high efficiency and practicality of our new solution.
引用
收藏
页码:6463 / 6479
页数:17
相关论文
共 50 条
  • [41] Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage
    Ni, Jianbing
    Zhang, Kuan
    Yu, Yong
    Yang, Tingting
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1753 - 1769
  • [42] Group provable data possession with deduplication in cloud storage
    Wang H.-Y.
    Zhu L.-H.
    Li L.-Y.-J.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1417 - 1431
  • [43] Secure Data Storage and Efficient Data Retrieval over Cloud Using Sensitive Hashing
    Gawade, Shruti
    Kadu, Sujata
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 87 - 92
  • [44] An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1359 - 1371
  • [45] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [46] Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
    Ming, Yang
    Shi, Wenchang
    [J]. IEEE ACCESS, 2019, 7 : 122091 - 122105
  • [47] EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage
    Dhakad, Nandini
    Kar, Jayaprakash
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6658 - 6668
  • [48] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [49] A Secure Data Forwarding In Cloud Storage
    Prabha, K.
    Nalini, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON OPTICAL IMAGING SENSOR AND SECURITY (ICOSS 2013), 2013,
  • [50] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,