Abstract
Cloud storage, one of the most attractive services offered by cloud computing, can provide users with boundless storage capacity. Thus, users can outsource their data to the cloud server for greatly saving local storage overhead. However, in cloud storage, due to the separation between data ownership and management, users lose the direct control over their outsourced data, resulting in plenty of security and privacy problems. In this paper, we focus on the problem of verifiable outsourced data deletion, which is important but received less attention in industry and academia. We propose an efficient fine-grained outsourced data deletion scheme based on invertible Bloom filter, which can also achieve public and private verifiability of the storage and deletion results. If the cloud server does not honestly maintain/delete the data and generate corresponding evidences, users can easily detect the cloud server’s malicious behaviors with an overwhelming probability. Meanwhile, in data deletion and deletion result verification processes, the computational complexity is independent of the number of outsourced data blocks, which makes the proposed scheme be suitable for large-scale data deletion scenario. Moreover, we provide the detailed security analysis and performance evaluation, which can respectively demonstrate the security and practicability of the proposed scheme.
Highlights
As a new computing paradigm, cloud computing is the fusion and development of parallel computing, distributed computing and grid computing [1], [2]
We propose a flexible and efficient fine-grained outsourced data deletion scheme based on invertible Bloom filter (IBF)
Wang et al [42] proposed an improved provable data possession (PDP) scheme characterized by provable storage, secure outsourced data transfer and data deletion
Summary
As a new computing paradigm, cloud computing is the fusion and development of parallel computing, distributed computing and grid computing [1], [2]. C. Yang et al.: Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing the data decryption key will make the whole outsourced file unavailable. In 2018, Liu et al [40] found that there is a security flaw in scheme [39]: a dishonest cloud server can modify the data block and forge a related tag that can successfully pass verification They designed a novel improved verifiable data transfer and deletion scheme, which can resist this attack. Wang et al [42] proposed an improved PDP scheme characterized by provable storage, secure outsourced data transfer and data deletion They used homomorphic authenticators and homomorphic encryption to meet the requirements of proof data possession and verifiable data deletion, respectively.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.