Provable data deletion from efficient data integrity auditing and insertion in cloud storage

被引:20
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Zhao, Feng [2 ]
Zhang, Shubin [4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310000, Peoples R China
关键词
Cloud storage; Data integrity auditing; Provable data deletion; Efficient data insertion; NR-MHT; DATA POSSESSION SCHEME; DYNAMIC DATA POSSESSION; ASSURED DATA DELETION; ACCESS-CONTROL; SECURITY;
D O I
10.1016/j.csi.2022.103629
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread popularity of cloud storage, a growing number of data owners are willing to outsource their massive data to remote cloud servers, thus effectively avoiding the heavy burden of storing and managing the massive data by themselves in local physical storage mediums. Despite the tremendous advantages, cloud storage inescapably suffers from some severe security challenges resulting from the separation of outsourced data management and its ownership, such as data integrity, data deletion, and data insertion. In this paper, we aim to deal with the problems of integrity auditing, dynamic insertion and provable deletion over outsourced data. Specifically, we design a novel authentication data structure, namely, number-rank-based Merkle hash tree (NRMHT), which can achieve data dynamic operations. Meanwhile, NR-MHT can maintain many data blocks in each leaf node, thus effectively solving the problem of the height indefinitely increases with the total number of data blocks. Subsequently, we adopt NR-MHT to propose a new provable data deletion scheme based on efficient data integrity auditing and dynamic data insertion. In our presented scheme, the data owner can not only permanently delete the unnecessary outsourced data blocks to save storage expenditures but also efficiently insert new data blocks to dynamically update the outsourced data set. Meanwhile, we analyze the security to formally demonstrate that our presented scheme can satisfy all of the expected security requirements without interacting with a third party auditor. Finally, we also develop a prototype implementation of our presented scheme and provide an accurate efficiency evaluation. The numerical analysis and experimental results show that compared with the existing schemes, our presented scheme is more attractive in efficiency and practicability.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [32] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [33] An Efficient Provable Data Possession based on Elliptic Curves in Cloud Storage
    Wang, Hongyuan
    Zhu, Liehuang
    Wang, Feng
    Lilong, Yijia
    Chen, Yu
    Liu, Chang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 97 - 108
  • [34] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [35] Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 2019 - 2032
  • [36] Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage
    Jaya Rao Gudeme
    Syam Kumar Pasupuleti
    Ramesh Kandukuri
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 2019 - 2032
  • [37] Secure Data Deduplication and Efficient Storage Utilization in Cloud Servers Using Encryption, Compression and Integrity Auditing
    Nair, Arya S.
    Radhakrishnan, B.
    Jayakrishnan, R. P.
    Kanthan, Padma Suresh Lekshmi
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 326 - 334
  • [38] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [39] Range Query Integrity in Cloud Data Streams with Efficient Insertion
    Buccafurri, Francesco
    Lax, Gianluca
    Nicolazzo, Serena
    Nocera, Antonino
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 719 - 724
  • [40] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844