Skip to main content
Log in

Cloud data assured deletion scheme based on dynamic sliding window

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of cloud storage technology, cloud data assured deletion has undergone significant research and progress. In this paper, we propose an assured deletion scheme based on a dynamic sliding window. In the proposed scheme, multilevel security ideas and dynamic sliding window technology are used to achieve more fine-grained access control. The attribute encryption method based on the ciphertext policy is employed to realize data encryption and decryption. Data deletion is achieved by re-encrypting the access control policy in the ciphertext, and data deletion proof is achieved by using the Merkle hash tree structure. Theoretical analysis and experimental results show that this scheme can meet the requirements of assured data deletion in the cloud, improve the granularity of data access control and increase the security of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

All data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Lee K (2020) Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption.” IEEE Trans Cloud Comput 8(4):1299–1300

    Article  Google Scholar 

  2. Singh B, Carminati B, Ferrari E (2021) Privacy-aware Personal Data Storage (P-PDS): Learning how to protect user privacy from external applications. IEEE Trans Dependable Secure Comput 18(2):889–903

    Article  Google Scholar 

  3. Wang Q, Zhou F, Xu J, Xu Z (2021) Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener Comput Syst 115:553–567

    Article  Google Scholar 

  4. Zheng D, Xue L, Yu C, Li Y, Yu Y (2020) Toward assured data deletion in cloud storage. IEEE Netw 34(3):101–107

    Article  Google Scholar 

  5. Berenjian S, Shajari M, Farshid N, Hatamian M (2019) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. 8th IEEE International Conference on Intelligent Systems. IEEE. Sofia, Bulgaria, p 709–714

  6. Naghizadeh A, Berenjian S, Meamari E, Atani R (2015) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29(3):602–619

    Article  Google Scholar 

  7. Berenjian S, Hajizadeh S, Atani R (2019) An incentive security model to provide fairness for peer-to-peer networks. CoRR abs/1906.09355. http://arxiv.org/abs/1906.09355

  8. Hao F, Clarke D, Zorzo A (2016) Deleting secret data with public verifiability. IEEE Trans Dependable Secure Comput 13(6):617–629

    Article  Google Scholar 

  9. Miao Y, Liu X, Choo K, Deng R, Li J, Li H, Ma J (2021) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput 18(3):1080–1094

    Article  Google Scholar 

  10. Xiong J, Lei C, Bhuiyan MZ, Cao C, Wang MY, Luo E (2020) A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener Comput Syst 111:741–753

    Article  Google Scholar 

  11. Xue Y, Xue K, Gai N, Hong J, Wei D, Hong P (2019) An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans Inf Forensics Secur 14(11):2927–2942

    Article  Google Scholar 

  12. Tang Y, Lee P, Lui J, Perlman R (2010) FADE: secure overlay cloud storage with file assured deletion. https://doi.org/10.1007/978-3-642-16161-2_22

  13. Ma S, Lai J, Deng R, Ding X (2017) Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21:6191–6200

    Article  Google Scholar 

  14. Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen P (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458

    Article  Google Scholar 

  15. Wang G, Yue F, Liu Q (2013) A secure self-destructing scheme for electronic data. J Comput Syst Sci 79(2):279–290

    Article  MathSciNet  Google Scholar 

  16. Ahmed B, Mustapha H, Karim A, Zakaria I, Said E (2019) An IBE-based design for assured deletion in cloud storage. Cryptologia 43(3):254–265

    Article  Google Scholar 

  17. Xue L, Yu Y, Li Y, Man H, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650

    Article  Google Scholar 

  18. Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B (2018) Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans Ind Inf 14(10):4538–4547

    Article  Google Scholar 

  19. Perlman R (2005) File System Design with Assured Delete. 3rd International IEEE}Security in Storage Workshop. IEEE Computer Society, San Francisco, California, p 6–88

  20. Geambasu R, Kohno T, Levy A, Levy H (2009) Vanish: Increasing Data Privacy with Self-Destructing Data. 18th {USENIX} Security Symposium. {USENIX} Association, Montreal, Canada, p 299–316

  21. Shamir A (1979) How to share a secret. Commun 22(11):612–613

    MathSciNet  MATH  Google Scholar 

  22. Xiong J, Yao Z, Ma J, Li F, Liu X (2014) A secure self-destruct scheme based on identity encryption for network content privacy. Chin J Comput 37(01):139–150

    Google Scholar 

  23. Boneh D, Franklin M (2003) Identity-Based Encryption from the Weil Pairing. J Comput 32(3):586–615

    MathSciNet  MATH  Google Scholar 

  24. Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int J Distrib Sens Netw 16(9)

  25. Tian Y, Shao T, Li Z (2021) An Efficient Scheme of Cloud Data Assured Deletion. Mobile Netw Appl 26(4):1597–1608

    Article  Google Scholar 

  26. Cachin C, Haralambiev K, Hsiao H, Sorniotti A (2013) {ACM} {SIGSAC} Conference on Computer and Communications Security. {ACM}, Berlin, Germany, p. 259–270

  27. Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution. Int J Pure Appl Math 76–90

  28. Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193

    Article  Google Scholar 

  29. Hao J, Liu J, Wu W, Tang F, Xian M (2020) Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. {IEEE} Internet Things J 7(2):1140–1153

  30. Tian J, Wang Z (2020) Fine-grained Assured Data Deletion Scheme Based on Attribute Association. Comput Secur 96:101936

    Article  Google Scholar 

  31. Ma J, Wang M, Xiong J, Hu Y (2021) CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. Secur Commun Netw 8855341:1–8855341:14

  32. Gupta S, Gupta B (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput 7(3):1–43

    Google Scholar 

  33. Tripathi S, Gupta B, Almonmani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle Distributed Denial of Service (DDoS) Attacks. J Inf Secur 4(3):150–164

    Google Scholar 

  34. Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. Identity Theft: Breakthroughs in Research and Practice. In I. Manage Assoc 221–247

  35. John B, Amit S, Brent W (2007) Ciphertext-Policy Attribute-Based Encryption. 2007 {IEEE} Symposium on Security and Privacy. Computer Society, Oakland, California,  p. 321–334

Download references

Acknowledgements

This work was supported by the Natural Science Foundation of Hebei Province (F2016201244).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ziwei Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tian, J., Wang, Z. Cloud data assured deletion scheme based on dynamic sliding window. Peer-to-Peer Netw. Appl. 15, 1817–1833 (2022). https://doi.org/10.1007/s12083-022-01318-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01318-3

Keywords

Navigation