Skip to main content

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10393))

Abstract

As more and more data is outsourced to the cloud, data owners lose direct control of their data. When clients delete their data, it is important to prevent illegal users from visiting the deleted or backup data. The mainstream method of this problem is to encrypt the data in advance, and then protect the decryption key without being sent to unauthorized users. However, if we remain the full encrypted data in the cloud, once the decryption key is stolen by attackers, the data is unsafe. Especially, it is important to protect the privacy of cloud pictures, videos and other multimedia files which contain plenty of private information. In this paper, a new scheme named ADBST is presented for cloud multimedia files. In this method, the bit stream of multimedia files will be transformed into a new one by using logistic chaotic mapping before being encrypted in order to make the cloud file be different from the original file. It can even ensure the security of files on the condition of missing the encryption key. Moreover, this scheme does not bring other third parties in order to reduce the risk of data leakage. Compared with other schemes on the same condition, it only brings little time costs in the acceptable range.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perlman R.: File system design with assured deletion. In: International Security in Storage Workshop, Third IEEE International, pp. 83–88. IEEE (2005)

    Google Scholar 

  2. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16161-2_22

    Chapter  Google Scholar 

  3. Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Conference on Usenix Security Symposium, pp. 299–316. USENIX Association (2009)

    Google Scholar 

  4. Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)

    Article  MathSciNet  Google Scholar 

  5. Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015)

    Google Scholar 

  6. Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014)

    Google Scholar 

  7. Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: International Conference on Cloud Computing, pp. 344–351. IEEE (2014)

    Google Scholar 

  8. Reardon, J., Ritzdorf, H., Basin, D., Capkun, S.: Secure data deletion from persistent media. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 271–284. ACM (2013)

    Google Scholar 

  9. Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755–2765 (2010)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgment

This work was partly supported by the NSFC-Guangdong Joint Found (U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China (2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yijie Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yao, W., Chen, Y., Wang, D. (2017). Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence. In: Ibrahim, S., Choo, KK., Yan, Z., Pedrycz, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2017. Lecture Notes in Computer Science(), vol 10393. Springer, Cham. https://doi.org/10.1007/978-3-319-65482-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65482-9_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65481-2

  • Online ISBN: 978-3-319-65482-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics