Skip to main content

A New Outsourced Data Deletion Scheme with Public Verifiability

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud data deletion operation. However, the selfish cloud server might maliciously reserve the data copy for financial interests, and deliberately send a false deletion result to cheat the data owner. In this paper, we design an IBF-based publicly verifiable cloud data deletion scheme. The proposed scheme enables the cloud server to delete the data and return a proof. Then the data owner can check the deletion result by verifying the returned deletion proof. Besides, the proposed scheme can realize public verifiability by applying the primitive of invertible bloom filter. Finally, we can prove that our proposed protocol not only can reach the expected security properties but also can achieve the practicality and high-efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the 6th Conference on USENIX Security Symposium, vol. 6, pp. 91–96 (1996)

    Google Scholar 

  2. Eppstein, D., Goodrich, M.T.: Straggler identification in round-trip data streams via Newton’s identities and invertible Bloom filters. IEEE Trans. Knowl. Data Eng. 23(2), 297–306 (2011)

    Google Scholar 

  3. Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium, vol. 14, pp. 77–89 (1996)

    Google Scholar 

  4. Hall, B., Govindarasu, M.: An assured deletion technique for cloud-based IoT. In: Proceeding of the 27th International Conference on Computer Communication and Networks (ICCCN 2018), pp. 1–9 (2018)

    Google Scholar 

  5. Hao, F., Clarke, D., Zorzo, A.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)

    Google Scholar 

  6. Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, pp. 17–23 (2016)

    Google Scholar 

  7. Miao, M., Wang, J., Ma, J., Susilo, W.: Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86, 49–58 (2017)

    Google Scholar 

  8. Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 340–348. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14478-3_35

    Google Scholar 

  9. Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643–662. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_39

    Google Scholar 

  10. Rahumed, A., Chen, H.C., Tang, Y., Lee, P.P., Lui, J.C.: A secure cloud backup system with assured deletion and version control. In: Proceedings of the 40th International Conference on Parallel Processing Workshops, pp. 160–167 (2011)

    Google Scholar 

  11. Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)

    Google Scholar 

  12. Tian, H., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)

    Google Scholar 

  13. Wei, M.Y.C., Grupp, L.M., Spada, F.E., Swanson, S.: Reliably erasing data from flash-based solid state drives. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST 2011), pp. 105–117 (2011)

    Google Scholar 

  14. Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106–121 (2018)

    Google Scholar 

  15. Xiong, J., et al.: A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)

    Google Scholar 

  16. Xue, L., Ni, J., Li, Y., Shen, J.: Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54, 46–54 (2017)

    Google Scholar 

  17. Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)

    Google Scholar 

  18. Yang, C., Tao, X.: New publicly verifiable cloud data deletion scheme with efficient tracking. In: Yang, C.N., Peng, S.L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 359–372. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_28

    Google Scholar 

  19. Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 445–458. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01950-1_26

    Google Scholar 

  20. Yang, C., Ye, J.: Secure and efficient fine-grained data access control scheme in cloud computing. J. High Speed Netw. 21(4), 259–271 (2015)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Natural Science Foundation of Guangxi (No. 2016GXNSFAA380098) and the Science and Technology Program of Guangxi (No. AB17195045).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoling Tao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, C., Tao, X., Zhao, F., Wang, Y. (2019). A New Outsourced Data Deletion Scheme with Public Verifiability. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics