Skip to main content

Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence

  • Conference paper
  • First Online:
  • 1201 Accesses

Abstract

The strategic point of data assured deletion in cloud storage is how to avoid unauthorized users accessing or backing up data. The main choice for this issue is how to improve the data access strategy or how to manage the encryption keys better. However, these methods are still put whole encrypted data in the cloud. In case that the encryption key is pick up by an attacker, the data is not secure. A new scheme named AD-IHSE is proposed in this paper. In this method, the bit stream of encrypted data will be divided into two parts. Big part of encrypted data is uploaded to the cloud directly, while the small part of encrypted data is embedded in the carrier and then uploaded to the cloud after secondary encryption with logistic chaotic sequence encryption. This method can even guarantee the security of the data when the encryption key is lost. In addition, the scheme does not bring other third parties to lessen the risk of data leakage. Both safety certificates and experimental results show that it not only realizes the certainty of the cloud data assured deletion but also has good security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Perlman, R.: File system design with assured deletion. In: The 14th Annual Network & Distributed System Security, pp. 1–7. IEEE (2007)

    Google Scholar 

  2. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16161-2_22

    Chapter  Google Scholar 

  3. Xiong, J., Yao, Z., Ma, J.: A secure document self-destruction scheme with identity based encryption. In: The 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 239–243. IEEE, Xi’an (2013)

    Google Scholar 

  4. Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)

    Article  MathSciNet  Google Scholar 

  5. Zeng, L., Shi, Z., Xu, S., Feng, D.: Safevanish: an improved data self-destruction for protecting data privacy. In: Proceedings of CloudCom, pp. 521–528. IEEE (2010)

    Google Scholar 

  6. Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015)

    Google Scholar 

  7. Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014)

    Google Scholar 

  8. Li, C., Chen, Y., Zhou, Y.: A data assured deletion scheme in cloud storage in China. Communications 11(4), 98–110 (2014)

    Google Scholar 

  9. Shahzad, F.: Safe haven in the cloud: secure access controlled file encryption (SAFE) system. In: Science and Information Conference, pp. 1329–1334. IEEE (2015)

    Google Scholar 

  10. Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 4331–4339. IEEE (2011)

    Google Scholar 

  11. Deshmukh, P.U., Pattewar, T.M.: A novel approach for edge adaptive steganography on LSB insertion technique. In: International Conference on Information Communication and Embedded Systems, pp. 1–5. IEEE (2015)

    Google Scholar 

Download references

Acknowledgment

This work was partly supported by the NSFC-Guangdong Joint Found (U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China (2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Y., Yao, W. (2018). Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00916-8_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00915-1

  • Online ISBN: 978-3-030-00916-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics