Skip to main content

An Associated Deletion Scheme for Multi-copy in Cloud Storage

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11337))

Abstract

Cloud storage reduces the cost of data storage and brings great convenience for data backup, therefore in order to improve data availability, more and more users choose to outsource personal data for multiple copies instead of storing them locally. However, multi-copy storage brings the difficulty in associating all the copies to store, increases the number of keys for encrypting every single copy and makes the integrity and the verifiable deletion of copies hard to be guaranteed, all of these issues introduce more threatens to the security of user data. In this paper, we present a cryptographic solution called ADM to solve above problems. To reduce management cost, we outsource data keys encrypted by blinded RSA to the third party, and not only to guarantee the integrity of multi-copy but also to give the verifiable evidence for deletion operation of the copies, we propose a multi-copy associated deleting solution based on pre-deleting sequence and Merkle hash tree. Finally, a proof-of-concept implementation of ADM is presented to demonstrate its practical feasibility, and we compare our scheme with other typical schemes in functionalities and conduct the security analysis and empirical performance of the prototype.

This work is supported by National Natural Science Foundation of China (No. 61572382, No. 61702401 and No. 61772405), Key Project of Natural Science Basic Research Plan in Shaanxi Province of China (No. 2016JZ021), China 111 Project (No. B16037), Guangxi Cooperative Innovation Center of Cloud Computing and Big Data (No. YD17X07), and Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems (No. YF17103).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_12

    Chapter  Google Scholar 

  2. Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing. Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009. http://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html

  3. Cachin, C., Haralambiev, K., Hsiao, H., Sorniotti, A.: Policy-based secure deletion. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, 4–8 November 2013, Berlin, Germany, pp. 259–270 (2013)

    Google Scholar 

  4. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386–2396 (2014)

    Article  Google Scholar 

  5. Diesburg, S.M., Wang, A.A.: A survey of confidential data storage and deletion methods. ACM Comput. Surv. (CSUR) 43(1), 2:1–2:37 (2010)

    Article  Google Scholar 

  6. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  7. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12

    Chapter  Google Scholar 

  8. Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Proceedings of 18th USENIX Security Symposium, 10–14 August 2009, Montreal, Canada, pp. 299–316 (2009)

    Google Scholar 

  9. Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  10. Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425–440. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_31

    Chapter  Google Scholar 

  11. Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)

    Article  Google Scholar 

  12. Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)

    Article  MathSciNet  Google Scholar 

  13. Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., Lou, W.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Forensics Secur. 12(3), 532–543 (2017)

    Article  Google Scholar 

  14. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)

    MATH  Google Scholar 

  15. Li, J., et al.: Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64(12), 3569–3579 (2015)

    Article  MathSciNet  Google Scholar 

  16. Liu, J., Ma, J., Wu, W., Chen, X., Huang, X., Xu, L.: Protecting mobile health records in cloud computing: a secure, efficient, and anonymous design. ACM Trans. Embed. Comput. Syst. (TECS) 16(2), 57:1–57:20 (2017)

    Google Scholar 

  17. Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE Symposium on Security and Privacy, 14–16 April 1980, Oakland, California, USA, pp. 122–134 (1980)

    Google Scholar 

  18. Reardon, J.: Secure Data Deletion. Information Security and Cryptography. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-28778-2

    Book  Google Scholar 

  19. Reardon, J., Basin, D.A., Capkun, S.: SoK: secure data deletion. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, 19–22 May 2013, Berkeley, CA, USA, pp. 301–315 (2013)

    Google Scholar 

  20. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  21. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)

    Article  Google Scholar 

  22. Stallings, W.: Cryptography and Network Security - Principles and Practice, 3rd edn. Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  23. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.J.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)

    Article  Google Scholar 

  24. Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293–3303 (2015)

    Article  MathSciNet  Google Scholar 

  25. Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3), 270–289 (2017)

    Article  Google Scholar 

  26. Wang, J., Chen, X., Li, J., Zhao, J., Shen, J.: Towards achieving flexible and verifiable search for outsourced database in cloud computing. Futur. Gener. Comput. Syst. 67, 266–275 (2017)

    Article  Google Scholar 

  27. Wang, J., Miao, M., Gao, Y., Chen, X.: Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11), 4487–4495 (2016)

    Article  Google Scholar 

  28. Xiong, J., Li, F., Wang, Y., Ma, J., Yao, Z.: Research progress on cloud data assured deletion based on cryptography. J. Commun. 37(8), 167–184 (2016)

    Google Scholar 

  29. Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)

    Article  Google Scholar 

  30. Zhang, X., Jiang, T., Li, K.C., Castiglione, A., Chen, X.: New publicly verifiable computation for batch matrix multiplication. Inf. Sci. (2017). https://doi.org/10.1016/j.ins.2017.11.063

  31. Zhang, Y., Xiong, J., Li, X., Jin, B., Li, S., Wang, X.A.: A multi-replica associated deleting scheme in cloud. In: 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, 6–8 July 2016, Fukuoka, Japan, pp. 444–448 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwei Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dulin, Zhang, Z., Tan, S., Wang, J., Tao, X. (2018). An Associated Deletion Scheme for Multi-copy in Cloud Storage. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11337. Springer, Cham. https://doi.org/10.1007/978-3-030-05063-4_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05063-4_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05062-7

  • Online ISBN: 978-3-030-05063-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics