Advertisement

An Associated Deletion Scheme for Multi-copy in Cloud Storage

  • Dulin
  • Zhiwei Zhang
  • Shichong Tan
  • Jianfeng Wang
  • Xiaoling Tao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)

Abstract

Cloud storage reduces the cost of data storage and brings great convenience for data backup, therefore in order to improve data availability, more and more users choose to outsource personal data for multiple copies instead of storing them locally. However, multi-copy storage brings the difficulty in associating all the copies to store, increases the number of keys for encrypting every single copy and makes the integrity and the verifiable deletion of copies hard to be guaranteed, all of these issues introduce more threatens to the security of user data. In this paper, we present a cryptographic solution called ADM to solve above problems. To reduce management cost, we outsource data keys encrypted by blinded RSA to the third party, and not only to guarantee the integrity of multi-copy but also to give the verifiable evidence for deletion operation of the copies, we propose a multi-copy associated deleting solution based on pre-deleting sequence and Merkle hash tree. Finally, a proof-of-concept implementation of ADM is presented to demonstrate its practical feasibility, and we compare our scheme with other typical schemes in functionalities and conduct the security analysis and empirical performance of the prototype.

Keywords

Cloud storage Multi-copy storage Associated deletion Pre-deleting sequence 

References

  1. 1.
    Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45353-9_12CrossRefGoogle Scholar
  2. 2.
    Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing. Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009. http://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
  3. 3.
    Cachin, C., Haralambiev, K., Hsiao, H., Sorniotti, A.: Policy-based secure deletion. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, 4–8 November 2013, Berlin, Germany, pp. 259–270 (2013)Google Scholar
  4. 4.
    Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)CrossRefGoogle Scholar
  5. 5.
    Diesburg, S.M., Wang, A.A.: A survey of confidential data storage and deletion methods. ACM Comput. Surv. (CSUR) 43(1), 2:1–2:37 (2010)CrossRefGoogle Scholar
  6. 6.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987).  https://doi.org/10.1007/3-540-47721-7_12CrossRefGoogle Scholar
  8. 8.
    Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Proceedings of 18th USENIX Security Symposium, 10–14 August 2009, Montreal, Canada, pp. 299–316 (2009)Google Scholar
  9. 9.
    Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, Cambridge (2009)zbMATHGoogle Scholar
  10. 10.
    Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425–440. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45353-9_31CrossRefGoogle Scholar
  11. 11.
    Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)CrossRefGoogle Scholar
  12. 12.
    Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., Lou, W.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Forensics Secur. 12(3), 532–543 (2017)CrossRefGoogle Scholar
  14. 14.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)zbMATHGoogle Scholar
  15. 15.
    Li, J., et al.: Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64(12), 3569–3579 (2015)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Liu, J., Ma, J., Wu, W., Chen, X., Huang, X., Xu, L.: Protecting mobile health records in cloud computing: a secure, efficient, and anonymous design. ACM Trans. Embed. Comput. Syst. (TECS) 16(2), 57:1–57:20 (2017)Google Scholar
  17. 17.
    Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE Symposium on Security and Privacy, 14–16 April 1980, Oakland, California, USA, pp. 122–134 (1980)Google Scholar
  18. 18.
    Reardon, J.: Secure Data Deletion. Information Security and Cryptography. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-28778-2CrossRefGoogle Scholar
  19. 19.
    Reardon, J., Basin, D.A., Capkun, S.: SoK: secure data deletion. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, 19–22 May 2013, Berkeley, CA, USA, pp. 301–315 (2013)Google Scholar
  20. 20.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRefGoogle Scholar
  22. 22.
    Stallings, W.: Cryptography and Network Security - Principles and Practice, 3rd edn. Prentice Hall, Upper Saddle River (2003)Google Scholar
  23. 23.
    Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.J.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)CrossRefGoogle Scholar
  24. 24.
    Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293–3303 (2015)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3), 270–289 (2017)CrossRefGoogle Scholar
  26. 26.
    Wang, J., Chen, X., Li, J., Zhao, J., Shen, J.: Towards achieving flexible and verifiable search for outsourced database in cloud computing. Futur. Gener. Comput. Syst. 67, 266–275 (2017)CrossRefGoogle Scholar
  27. 27.
    Wang, J., Miao, M., Gao, Y., Chen, X.: Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11), 4487–4495 (2016)CrossRefGoogle Scholar
  28. 28.
    Xiong, J., Li, F., Wang, Y., Ma, J., Yao, Z.: Research progress on cloud data assured deletion based on cryptography. J. Commun. 37(8), 167–184 (2016)Google Scholar
  29. 29.
    Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)CrossRefGoogle Scholar
  30. 30.
    Zhang, X., Jiang, T., Li, K.C., Castiglione, A., Chen, X.: New publicly verifiable computation for batch matrix multiplication. Inf. Sci. (2017).  https://doi.org/10.1016/j.ins.2017.11.063
  31. 31.
    Zhang, Y., Xiong, J., Li, X., Jin, B., Li, S., Wang, X.A.: A multi-replica associated deleting scheme in cloud. In: 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, 6–8 July 2016, Fukuoka, Japan, pp. 444–448 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Dulin
    • 1
  • Zhiwei Zhang
    • 1
  • Shichong Tan
    • 1
  • Jianfeng Wang
    • 1
  • Xiaoling Tao
    • 2
    • 3
  1. 1.State Key Laboratory of Integrated Services Networks (ISN)Xidian UniversityXi’anChina
  2. 2.Guangxi Cooperative Innovation Center of Cloud Computing and Big DataGuilin University of Electronic TechnologyGuilinChina
  3. 3.Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex SystemsGuilin University of Electronic TechnologyGuilinChina

Personalised recommendations