Abstract
With the rapid development of cloud storage technology, cloud data assured deletion has undergone significant research and progress. In this paper, we propose an assured deletion scheme based on a dynamic sliding window. In the proposed scheme, multilevel security ideas and dynamic sliding window technology are used to achieve more fine-grained access control. The attribute encryption method based on the ciphertext policy is employed to realize data encryption and decryption. Data deletion is achieved by re-encrypting the access control policy in the ciphertext, and data deletion proof is achieved by using the Merkle hash tree structure. Theoretical analysis and experimental results show that this scheme can meet the requirements of assured data deletion in the cloud, improve the granularity of data access control and increase the security of the system.
Similar content being viewed by others
Data availability
All data used to support the findings of this study are available from the corresponding author upon request.
References
Lee K (2020) Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption.” IEEE Trans Cloud Comput 8(4):1299–1300
Singh B, Carminati B, Ferrari E (2021) Privacy-aware Personal Data Storage (P-PDS): Learning how to protect user privacy from external applications. IEEE Trans Dependable Secure Comput 18(2):889–903
Wang Q, Zhou F, Xu J, Xu Z (2021) Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener Comput Syst 115:553–567
Zheng D, Xue L, Yu C, Li Y, Yu Y (2020) Toward assured data deletion in cloud storage. IEEE Netw 34(3):101–107
Berenjian S, Shajari M, Farshid N, Hatamian M (2019) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. 8th IEEE International Conference on Intelligent Systems. IEEE. Sofia, Bulgaria, p 709–714
Naghizadeh A, Berenjian S, Meamari E, Atani R (2015) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29(3):602–619
Berenjian S, Hajizadeh S, Atani R (2019) An incentive security model to provide fairness for peer-to-peer networks. CoRR abs/1906.09355. http://arxiv.org/abs/1906.09355
Hao F, Clarke D, Zorzo A (2016) Deleting secret data with public verifiability. IEEE Trans Dependable Secure Comput 13(6):617–629
Miao Y, Liu X, Choo K, Deng R, Li J, Li H, Ma J (2021) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput 18(3):1080–1094
Xiong J, Lei C, Bhuiyan MZ, Cao C, Wang MY, Luo E (2020) A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener Comput Syst 111:741–753
Xue Y, Xue K, Gai N, Hong J, Wei D, Hong P (2019) An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans Inf Forensics Secur 14(11):2927–2942
Tang Y, Lee P, Lui J, Perlman R (2010) FADE: secure overlay cloud storage with file assured deletion. https://doi.org/10.1007/978-3-642-16161-2_22
Ma S, Lai J, Deng R, Ding X (2017) Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21:6191–6200
Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen P (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458
Wang G, Yue F, Liu Q (2013) A secure self-destructing scheme for electronic data. J Comput Syst Sci 79(2):279–290
Ahmed B, Mustapha H, Karim A, Zakaria I, Said E (2019) An IBE-based design for assured deletion in cloud storage. Cryptologia 43(3):254–265
Xue L, Yu Y, Li Y, Man H, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650
Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B (2018) Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans Ind Inf 14(10):4538–4547
Perlman R (2005) File System Design with Assured Delete. 3rd International IEEE}Security in Storage Workshop. IEEE Computer Society, San Francisco, California, p 6–88
Geambasu R, Kohno T, Levy A, Levy H (2009) Vanish: Increasing Data Privacy with Self-Destructing Data. 18th {USENIX} Security Symposium. {USENIX} Association, Montreal, Canada, p 299–316
Shamir A (1979) How to share a secret. Commun 22(11):612–613
Xiong J, Yao Z, Ma J, Li F, Liu X (2014) A secure self-destruct scheme based on identity encryption for network content privacy. Chin J Comput 37(01):139–150
Boneh D, Franklin M (2003) Identity-Based Encryption from the Weil Pairing. J Comput 32(3):586–615
Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int J Distrib Sens Netw 16(9)
Tian Y, Shao T, Li Z (2021) An Efficient Scheme of Cloud Data Assured Deletion. Mobile Netw Appl 26(4):1597–1608
Cachin C, Haralambiev K, Hsiao H, Sorniotti A (2013) {ACM} {SIGSAC} Conference on Computer and Communications Security. {ACM}, Berlin, Germany, p. 259–270
Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution. Int J Pure Appl Math 76–90
Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193
Hao J, Liu J, Wu W, Tang F, Xian M (2020) Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. {IEEE} Internet Things J 7(2):1140–1153
Tian J, Wang Z (2020) Fine-grained Assured Data Deletion Scheme Based on Attribute Association. Comput Secur 96:101936
Ma J, Wang M, Xiong J, Hu Y (2021) CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. Secur Commun Netw 8855341:1–8855341:14
Gupta S, Gupta B (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput 7(3):1–43
Tripathi S, Gupta B, Almonmani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle Distributed Denial of Service (DDoS) Attacks. J Inf Secur 4(3):150–164
Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. Identity Theft: Breakthroughs in Research and Practice. In I. Manage Assoc 221–247
John B, Amit S, Brent W (2007) Ciphertext-Policy Attribute-Based Encryption. 2007 {IEEE} Symposium on Security and Privacy. Computer Society, Oakland, California, p. 321–334
Acknowledgements
This work was supported by the Natural Science Foundation of Hebei Province (F2016201244).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tian, J., Wang, Z. Cloud data assured deletion scheme based on dynamic sliding window. Peer-to-Peer Netw. Appl. 15, 1817–1833 (2022). https://doi.org/10.1007/s12083-022-01318-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01318-3