Abstract

With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality.

Highlights

  • Cloud computing, an emerging and promising computing paradigm, was first put forward by Google.[1]

  • Thanks to a number of irresistible advantages, the cloud storage service has been widely applied in daily life and work

  • We put forward a new vector commitment-based scheme that can achieve publicly verifiable cloud data deletion and can realize provable data transfer between two different cloud servers

Read more

Summary

Introduction

An emerging and promising computing paradigm, was first put forward by Google.[1]. As far as we know, it seems that there is no research work on efficient and publicly verifiable outsourced data transfer and deletion scheme that does not require a TTP under the dishonest cloud server model. We use the primitive of vector commitment to generate some corresponding proofs that can be used to verify the data transfer and deletion results.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call