Abstract

Cloud storage service, one of the most important services in the cloud computing, can offer high-quality storage service for tenants. By employing the cloud storage service, the resource-constraint data owners can outsource their data to the remote cloud server to reduce the heavy storage burden. Due to the attractive advantages, there are an increasing number of data owners prefer to embrace the cloud storage service. However, the data owners will lose the direct control over their outsourced data, and they can not directly execute operations over their outsourced data, such as data deletion operation. That will make outsourced data deletion become a crucial security problem: the selfish cloud server may not honestly perform the data deletion operation for economic interests, and then returns error results to mislead the data owners. Although a series of solutions have been proposed to solve this problem, most of them can be described as “one-bit-return” protocol: the storage server removes the data and then returns a one-bit deletion reply, and the data owners have to trust the deletion reply because they can not verify it conveniently.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call