A New Outsourced Data Deletion Scheme with Public Verifiability

  • Changsong Yang
  • Xiaoling TaoEmail author
  • Feng Zhao
  • Yong Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11604)


In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud data deletion operation. However, the selfish cloud server might maliciously reserve the data copy for financial interests, and deliberately send a false deletion result to cheat the data owner. In this paper, we design an IBF-based publicly verifiable cloud data deletion scheme. The proposed scheme enables the cloud server to delete the data and return a proof. Then the data owner can check the deletion result by verifying the returned deletion proof. Besides, the proposed scheme can realize public verifiability by applying the primitive of invertible bloom filter. Finally, we can prove that our proposed protocol not only can reach the expected security properties but also can achieve the practicality and high-efficiency.


Cloud storage Data deletion Invertible bloom filter Public verifiability Data confidentiality 



This work was supported by the Natural Science Foundation of Guangxi (No. 2016GXNSFAA380098) and the Science and Technology Program of Guangxi (No. AB17195045).


  1. 1.
    Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the 6th Conference on USENIX Security Symposium, vol. 6, pp. 91–96 (1996)Google Scholar
  2. 2.
    Eppstein, D., Goodrich, M.T.: Straggler identification in round-trip data streams via Newton’s identities and invertible Bloom filters. IEEE Trans. Knowl. Data Eng. 23(2), 297–306 (2011)Google Scholar
  3. 3.
    Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium, vol. 14, pp. 77–89 (1996)Google Scholar
  4. 4.
    Hall, B., Govindarasu, M.: An assured deletion technique for cloud-based IoT. In: Proceeding of the 27th International Conference on Computer Communication and Networks (ICCCN 2018), pp. 1–9 (2018)Google Scholar
  5. 5.
    Hao, F., Clarke, D., Zorzo, A.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)Google Scholar
  6. 6.
    Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, pp. 17–23 (2016)Google Scholar
  7. 7.
    Miao, M., Wang, J., Ma, J., Susilo, W.: Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86, 49–58 (2017)Google Scholar
  8. 8.
    Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 340–348. Springer, Heidelberg (2010). Scholar
  9. 9.
    Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643–662. Springer, Heidelberg (2010). Scholar
  10. 10.
    Rahumed, A., Chen, H.C., Tang, Y., Lee, P.P., Lui, J.C.: A secure cloud backup system with assured deletion and version control. In: Proceedings of the 40th International Conference on Parallel Processing Workshops, pp. 160–167 (2011)Google Scholar
  11. 11.
    Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)Google Scholar
  12. 12.
    Tian, H., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)Google Scholar
  13. 13.
    Wei, M.Y.C., Grupp, L.M., Spada, F.E., Swanson, S.: Reliably erasing data from flash-based solid state drives. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST 2011), pp. 105–117 (2011)Google Scholar
  14. 14.
    Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106–121 (2018)Google Scholar
  15. 15.
    Xiong, J., et al.: A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)Google Scholar
  16. 16.
    Xue, L., Ni, J., Li, Y., Shen, J.: Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54, 46–54 (2017)Google Scholar
  17. 17.
    Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)Google Scholar
  18. 18.
    Yang, C., Tao, X.: New publicly verifiable cloud data deletion scheme with efficient tracking. In: Yang, C.N., Peng, S.L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 359–372. Springer, Cham (2020). Scholar
  19. 19.
    Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 445–458. Springer, Cham (2018). Scholar
  20. 20.
    Yang, C., Ye, J.: Secure and efficient fine-grained data access control scheme in cloud computing. J. High Speed Netw. 21(4), 259–271 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Changsong Yang
    • 1
    • 2
  • Xiaoling Tao
    • 2
    Email author
  • Feng Zhao
    • 2
  • Yong Wang
    • 2
  1. 1.School of Cyber EngineeringXidian UniversityXi’anChina
  2. 2.School of Computer Science and Information SecurityGuilin University of Electronic TechnologyGuilinChina

Personalised recommendations