Abstract

As one of the most important services in the cloud computing, cloud storage service can provide boundless storage resources for clients. Because of its tremendous advantages, cloud storage service has attracted widespread attentions and plenty of clients. By employing cloud storage service, the data owners can migrate the heavy overhead of maintaining their data to the cloud server. However, upon uploading their data to the cloud server, the data owners will lose the direct control over their data, therefore, the computations over the data will be performed by the cloud server, for example, data transfer and deletion. However, during the data transfer and deletion processes, the cloud server may not perform these operations honestly for economic interests. That will make data transfer and deletion become new security challenges. In this paper, we propose a novel data transfer and deletion scheme that supporting public verifiability. In our construction, if the cloud server is malicious, the data owners can detect the cloud server’s unfaithful data transfer or dishonest data deletion by verifying the returned proofs efficiently. Moreover, with the utilization of vector commitment, our novel scheme can realize public verifiability without any trusted third party.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call