Provable data deletion from efficient data integrity auditing and insertion in cloud storage

被引:20
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Zhao, Feng [2 ]
Zhang, Shubin [4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310000, Peoples R China
关键词
Cloud storage; Data integrity auditing; Provable data deletion; Efficient data insertion; NR-MHT; DATA POSSESSION SCHEME; DYNAMIC DATA POSSESSION; ASSURED DATA DELETION; ACCESS-CONTROL; SECURITY;
D O I
10.1016/j.csi.2022.103629
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread popularity of cloud storage, a growing number of data owners are willing to outsource their massive data to remote cloud servers, thus effectively avoiding the heavy burden of storing and managing the massive data by themselves in local physical storage mediums. Despite the tremendous advantages, cloud storage inescapably suffers from some severe security challenges resulting from the separation of outsourced data management and its ownership, such as data integrity, data deletion, and data insertion. In this paper, we aim to deal with the problems of integrity auditing, dynamic insertion and provable deletion over outsourced data. Specifically, we design a novel authentication data structure, namely, number-rank-based Merkle hash tree (NRMHT), which can achieve data dynamic operations. Meanwhile, NR-MHT can maintain many data blocks in each leaf node, thus effectively solving the problem of the height indefinitely increases with the total number of data blocks. Subsequently, we adopt NR-MHT to propose a new provable data deletion scheme based on efficient data integrity auditing and dynamic data insertion. In our presented scheme, the data owner can not only permanently delete the unnecessary outsourced data blocks to save storage expenditures but also efficiently insert new data blocks to dynamically update the outsourced data set. Meanwhile, we analyze the security to formally demonstrate that our presented scheme can satisfy all of the expected security requirements without interacting with a third party auditor. Finally, we also develop a prototype implementation of our presented scheme and provide an accurate efficiency evaluation. The numerical analysis and experimental results show that compared with the existing schemes, our presented scheme is more attractive in efficiency and practicability.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas
    Li, Angtai
    Chen, Yu
    Yan, Zheng
    Zhou, Xiaokang
    Shimizu, Shohei
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (05) : 1428 - 1442
  • [22] A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System
    Huang, Pei
    Fan, Kai
    Yang, Hanzhe
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE ACCESS, 2020, 8 (94780-94794) : 94780 - 94794
  • [23] MHB*T based dynamic data integrity auditing in cloud storage
    Luo, Wei
    Ma, Wenping
    Gao, Juntao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2115 - 2132
  • [24] MHB*T based dynamic data integrity auditing in cloud storage
    Wei Luo
    Wenping Ma
    Juntao Gao
    Cluster Computing, 2021, 24 : 2115 - 2132
  • [25] Self-certified Public Auditing for Data Integrity in Cloud Storage
    Zhang, Jianhong
    Zeng, Weina
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 267 - 273
  • [26] AUDITING OF DATA INTEGRITY OVER DYNAMIC DATA IN CLOUD
    Kumar, P. Santhosh
    Parthiban, Latha
    Jegatheeswari, V.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 43 - 48
  • [27] Multiple-replica integrity auditing schemes for cloud data storage
    Lin, Yangfei
    Li, Jie
    Jia, Xiaohua
    Ren, Kui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [28] An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud
    Arjun, U.
    Vinay, S.
    EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 285 - 291
  • [29] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442
  • [30] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215