Skip to main content
Log in

Efficient data transfer supporting provable data deletion for secure cloud storage

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for saving local cost. Due to the great market prospect, a large quantity of enterprises provide cloud storage services, which are equipped with different prices, reliability, security, and so on. Hence, outsourced data transfer has become a fundamental requirement for tenants to flexibly change cloud service providers (CSPs) to enjoy more suitable services. Nevertheless, how to guarantee the data integrity when the data are transferred from a cloud data center to another is a concern of tenants. To solve this concern, we design a new validation data structure, namely, counting Bloom filter tree (CBFT), which can be viewed as a specific binary tree based on CBF. Then, we present an efficient outsourced data transfer scheme supporting provable data deletion, in which tenants can flexibly change CSPs and transfer their outsourced data blocks from a cloud data center to another without retrieving them. At the same time, after the data are successfully transferred, tenants can validate the transferred data integrity and usability on the new cloud data center and permanently delete the transferred data from the old cloud data center. Moreover, the formal security analysis proves that our new solution can achieve all of the anticipant security goals without interaction with a third party. At last, we develop a prototype system and implement our new solution, thus providing accurate performance evaluation, which intuitively presents the high efficiency and practicality of our new solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability statement

Data availability depends upon the request of the researchers.

Notes

  1. Generally speaking, we assume that the elements will be equally divided into two parts according to the original order.

References

Download references

Acknowledgements

This work is supported by Guilin University of Electronic Technology, Guilin, China. At the same time, the authors would like to sincerely thank the anonymous referees for their very valuable time.

Funding

This work is supported by the Science and Technology Program of Guangxi(Project No.: AD20297028), the Natural Science Foundation of Guangxi(Project No.: 2020GXNSFBA297132), the Guangxi Key Laboratory of Cryptography and Information Security(Project No.: GCIS202128), the National Key R& D Program of China(Project No.: 2020YFB1006003), the National Natural Science Foundation of China(Project No.: 61772150) and the Guangdong Key R &D Program(Project No.: 2020B0101090002).

Author information

Authors and Affiliations

Authors

Contributions

All of the authors contribute to this manuscript; then, the detail contributions are as follows. Changsong Yang took part in conceptualization, methodology, software, writing—original draft preparation, visualization, investigation, writing—reviewing and editing; Yueling Liu involved in data curation; Yong Ding took part in supervision.

Corresponding author

Correspondence to Changsong Yang.

Ethics declarations

Conflict of interests

The authors declared that there is no conflict of interest. At the same time, the authors declared that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part.

Informed consent

All authors have read this manuscript and are willing to process it for publication.

Ethical approval

There is no need for ethical approval while conducting the study in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, C., Liu, Y. & Ding, Y. Efficient data transfer supporting provable data deletion for secure cloud storage. Soft Comput 26, 6463–6479 (2022). https://doi.org/10.1007/s00500-022-07116-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-07116-6

Keywords

Navigation