Provable data deletion from efficient data integrity auditing and insertion in cloud storage

被引:20
|
作者
Yang, Changsong [1 ,2 ]
Liu, Yueling [3 ]
Zhao, Feng [2 ]
Zhang, Shubin [4 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin 541004, Peoples R China
[3] Guilin Univ Elect Technol, Business Sch, Guilin 541004, Peoples R China
[4] Zhejiang Univ Technol, Sch Comp Sci & Technol, Hangzhou 310000, Peoples R China
关键词
Cloud storage; Data integrity auditing; Provable data deletion; Efficient data insertion; NR-MHT; DATA POSSESSION SCHEME; DYNAMIC DATA POSSESSION; ASSURED DATA DELETION; ACCESS-CONTROL; SECURITY;
D O I
10.1016/j.csi.2022.103629
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread popularity of cloud storage, a growing number of data owners are willing to outsource their massive data to remote cloud servers, thus effectively avoiding the heavy burden of storing and managing the massive data by themselves in local physical storage mediums. Despite the tremendous advantages, cloud storage inescapably suffers from some severe security challenges resulting from the separation of outsourced data management and its ownership, such as data integrity, data deletion, and data insertion. In this paper, we aim to deal with the problems of integrity auditing, dynamic insertion and provable deletion over outsourced data. Specifically, we design a novel authentication data structure, namely, number-rank-based Merkle hash tree (NRMHT), which can achieve data dynamic operations. Meanwhile, NR-MHT can maintain many data blocks in each leaf node, thus effectively solving the problem of the height indefinitely increases with the total number of data blocks. Subsequently, we adopt NR-MHT to propose a new provable data deletion scheme based on efficient data integrity auditing and dynamic data insertion. In our presented scheme, the data owner can not only permanently delete the unnecessary outsourced data blocks to save storage expenditures but also efficiently insert new data blocks to dynamically update the outsourced data set. Meanwhile, we analyze the security to formally demonstrate that our presented scheme can satisfy all of the expected security requirements without interacting with a third party auditor. Finally, we also develop a prototype implementation of our presented scheme and provide an accurate efficiency evaluation. The numerical analysis and experimental results show that compared with the existing schemes, our presented scheme is more attractive in efficiency and practicability.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Certificateless Public Auditing for Data Integrity in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    Li, Fenghua
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 136 - 144
  • [42] A method for achieving provable data integrity in cloud computing
    Aiping Li
    Shuang Tan
    Yan Jia
    The Journal of Supercomputing, 2019, 75 : 92 - 108
  • [43] Fine-grained data deletion supporting dynamic data insertion for cloud storage
    Yang, Changsong
    Liu, Yueling
    Ding, Yong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (01) : 1 - 16
  • [44] A method for achieving provable data integrity in cloud computing
    Li, Aiping
    Tan, Shuang
    Jia, Yan
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 92 - 108
  • [45] Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    He, Debiao
    Huang, Xinyi
    Xiang, Yang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02): : 161 - 173
  • [46] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [47] Data integrity auditing for secure cloud storage using user behavior prediction
    Tian, Junfeng
    Wang, Haoning
    Wang, Meng
    COMPUTERS & SECURITY, 2021, 105
  • [48] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [49] Code-based Provable Data Possession Scheme for Integrity Verification in Cloud Storage
    Ye, Junyao
    Wang, Yanhong
    Liu, Kening
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 207 - 212
  • [50] Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
    Han, Chunxia
    Wang, Linjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022