Abstract
With the rapid development of cloud computing, an increasing number of data owners are willing to employ cloud storage service. In cloud storage, the resource-constraint data owners can outsource their large-scale data to the remote cloud server, by which they can greatly reduce local storage overhead and computation cost. Despite plenty of attractive advantages, cloud storage inevitably suffers from some new security challenges due to the separation of outsourced data ownership and its management, such as secure data insertion and deletion. The cloud server may maliciously reserve some data copies and return a wrong deletion result to cheat the data owner. Moreover, it is very difficult for the data owner to securely insert some new data blocks into the outsourced data set. To solve the above two problems, we adopt the primitive of Merkle sum hash tree to design a novel publicly verifiable cloud data deletion scheme, which can also simultaneously achieve provable data storage and dynamic data insertion. Moreover, an interesting property of our proposed scheme is that it can satisfy private and public verifiability without requiring any trusted third party. Furthermore, we formally prove that our proposed scheme not only can achieve the desired security properties, but also can realize the high efficiency and practicality.
Highlights
Due to a lot of attractive advantages, these services have been widely applied in the daily life and work, especially for the cloud storage service
The rest of this article is organized as follows: In section ‘‘Preliminaries,’’ we describe the preliminary of Merkle sum hash tree (MSHT), which can be viewed as an extension of the traditional Merkle hash tree (MHT)
The data owner does not believe that the cloud server may honestly execute outsourced data insertion and deletion operations
Summary
Cloud computing is the fusion, development, and application of the concepts of parallel computing, grid computing, and distributed computing.[1,2] It can connect large-scale distributed resources through network and form a pool of computing resources to provide tenants with a series of on-demand services, such as data sharing service,[3,4] data migration service,[5] and data storage service (i.e. cloud storage service).[6,7] Due to a lot of attractive advantages, these services have been widely applied in the daily life and work, especially for the cloud storage service. How to efficiently achieve publicly verifiable outsourced data deletion without requiring any TTP is a problem that needs to be solved solidly. The cloud server might not honestly perform the data insertion operation since it may cost some computing resources and storage spaces.[19] how to conveniently insert some new data blocks into the outsourced data set and efficiently verify the data insertion result is another severe security challenge. To the best of our knowledge, it seems that there is no research work on publicly verifiable outsourced data deletion scheme that simultaneously supports dynamic data insertion without requiring any TTP. We mainly study the problem of designing publicly verifiable outsourced data deletion scheme that simultaneously supports dynamic data insertion in cloud storage. It can demonstrate the practicality of the proposal in real-world applications
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have