Abstract
The strategic point of data assured deletion in cloud storage is how to avoid unauthorized users accessing or backing up data. The main choice for this issue is how to improve the data access strategy or how to manage the encryption keys better. However, these methods are still put whole encrypted data in the cloud. In case that the encryption key is pick up by an attacker, the data is not secure. A new scheme named AD-IHSE is proposed in this paper. In this method, the bit stream of encrypted data will be divided into two parts. Big part of encrypted data is uploaded to the cloud directly, while the small part of encrypted data is embedded in the carrier and then uploaded to the cloud after secondary encryption with logistic chaotic sequence encryption. This method can even guarantee the security of the data when the encryption key is lost. In addition, the scheme does not bring other third parties to lessen the risk of data leakage. Both safety certificates and experimental results show that it not only realizes the certainty of the cloud data assured deletion but also has good security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Perlman, R.: File system design with assured deletion. In: The 14th Annual Network & Distributed System Security, pp. 1–7. IEEE (2007)
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16161-2_22
Xiong, J., Yao, Z., Ma, J.: A secure document self-destruction scheme with identity based encryption. In: The 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 239–243. IEEE, Xi’an (2013)
Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)
Zeng, L., Shi, Z., Xu, S., Feng, D.: Safevanish: an improved data self-destruction for protecting data privacy. In: Proceedings of CloudCom, pp. 521–528. IEEE (2010)
Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015)
Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014)
Li, C., Chen, Y., Zhou, Y.: A data assured deletion scheme in cloud storage in China. Communications 11(4), 98–110 (2014)
Shahzad, F.: Safe haven in the cloud: secure access controlled file encryption (SAFE) system. In: Science and Information Conference, pp. 1329–1334. IEEE (2015)
Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 4331–4339. IEEE (2011)
Deshmukh, P.U., Pattewar, T.M.: A novel approach for edge adaptive steganography on LSB insertion technique. In: International Conference on Information Communication and Embedded Systems, pp. 1–5. IEEE (2015)
Acknowledgment
This work was partly supported by the NSFC-Guangdong Joint Found (U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China (2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, Y., Yao, W. (2018). Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_56
Download citation
DOI: https://doi.org/10.1007/978-3-030-00916-8_56
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00915-1
Online ISBN: 978-3-030-00916-8
eBook Packages: Computer ScienceComputer Science (R0)