Abstract
As more and more data is outsourced to the cloud, data owners lose direct control of their data. When clients delete their data, it is important to prevent illegal users from visiting the deleted or backup data. The mainstream method of this problem is to encrypt the data in advance, and then protect the decryption key without being sent to unauthorized users. However, if we remain the full encrypted data in the cloud, once the decryption key is stolen by attackers, the data is unsafe. Especially, it is important to protect the privacy of cloud pictures, videos and other multimedia files which contain plenty of private information. In this paper, a new scheme named ADBST is presented for cloud multimedia files. In this method, the bit stream of multimedia files will be transformed into a new one by using logistic chaotic mapping before being encrypted in order to make the cloud file be different from the original file. It can even ensure the security of files on the condition of missing the encryption key. Moreover, this scheme does not bring other third parties in order to reduce the risk of data leakage. Compared with other schemes on the same condition, it only brings little time costs in the acceptable range.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Perlman R.: File system design with assured deletion. In: International Security in Storage Workshop, Third IEEE International, pp. 83–88. IEEE (2005)
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16161-2_22
Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Conference on Usenix Security Symposium, pp. 299–316. USENIX Association (2009)
Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)
Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015)
Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014)
Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: International Conference on Cloud Computing, pp. 344–351. IEEE (2014)
Reardon, J., Ritzdorf, H., Basin, D., Capkun, S.: Secure data deletion from persistent media. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 271–284. ACM (2013)
Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755–2765 (2010)
Acknowledgment
This work was partly supported by the NSFC-Guangdong Joint Found (U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China (2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yao, W., Chen, Y., Wang, D. (2017). Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence. In: Ibrahim, S., Choo, KK., Yan, Z., Pedrycz, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2017. Lecture Notes in Computer Science(), vol 10393. Springer, Cham. https://doi.org/10.1007/978-3-319-65482-9_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-65482-9_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65481-2
Online ISBN: 978-3-319-65482-9
eBook Packages: Computer ScienceComputer Science (R0)