Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2022

22-04-2022

Cloud data assured deletion scheme based on dynamic sliding window

Authors: Junfeng Tian, Ziwei Wang

Published in: Peer-to-Peer Networking and Applications | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of cloud storage technology, cloud data assured deletion has undergone significant research and progress. In this paper, we propose an assured deletion scheme based on a dynamic sliding window. In the proposed scheme, multilevel security ideas and dynamic sliding window technology are used to achieve more fine-grained access control. The attribute encryption method based on the ciphertext policy is employed to realize data encryption and decryption. Data deletion is achieved by re-encrypting the access control policy in the ciphertext, and data deletion proof is achieved by using the Merkle hash tree structure. Theoretical analysis and experimental results show that this scheme can meet the requirements of assured data deletion in the cloud, improve the granularity of data access control and increase the security of the system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee K (2020) Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption.” IEEE Trans Cloud Comput 8(4):1299–1300CrossRef Lee K (2020) Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption.” IEEE Trans Cloud Comput 8(4):1299–1300CrossRef
2.
go back to reference Singh B, Carminati B, Ferrari E (2021) Privacy-aware Personal Data Storage (P-PDS): Learning how to protect user privacy from external applications. IEEE Trans Dependable Secure Comput 18(2):889–903CrossRef Singh B, Carminati B, Ferrari E (2021) Privacy-aware Personal Data Storage (P-PDS): Learning how to protect user privacy from external applications. IEEE Trans Dependable Secure Comput 18(2):889–903CrossRef
3.
go back to reference Wang Q, Zhou F, Xu J, Xu Z (2021) Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener Comput Syst 115:553–567CrossRef Wang Q, Zhou F, Xu J, Xu Z (2021) Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener Comput Syst 115:553–567CrossRef
4.
go back to reference Zheng D, Xue L, Yu C, Li Y, Yu Y (2020) Toward assured data deletion in cloud storage. IEEE Netw 34(3):101–107CrossRef Zheng D, Xue L, Yu C, Li Y, Yu Y (2020) Toward assured data deletion in cloud storage. IEEE Netw 34(3):101–107CrossRef
5.
go back to reference Berenjian S, Shajari M, Farshid N, Hatamian M (2019) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. 8th IEEE International Conference on Intelligent Systems. IEEE. Sofia, Bulgaria, p 709–714 Berenjian S, Shajari M, Farshid N, Hatamian M (2019) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. 8th IEEE International Conference on Intelligent Systems. IEEE. Sofia, Bulgaria, p 709–714
6.
go back to reference Naghizadeh A, Berenjian S, Meamari E, Atani R (2015) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29(3):602–619CrossRef Naghizadeh A, Berenjian S, Meamari E, Atani R (2015) Structural-based tunneling: preserving mutual anonymity for circular P2P networks. Int J Commun Syst 29(3):602–619CrossRef
8.
go back to reference Hao F, Clarke D, Zorzo A (2016) Deleting secret data with public verifiability. IEEE Trans Dependable Secure Comput 13(6):617–629CrossRef Hao F, Clarke D, Zorzo A (2016) Deleting secret data with public verifiability. IEEE Trans Dependable Secure Comput 13(6):617–629CrossRef
9.
go back to reference Miao Y, Liu X, Choo K, Deng R, Li J, Li H, Ma J (2021) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput 18(3):1080–1094CrossRef Miao Y, Liu X, Choo K, Deng R, Li J, Li H, Ma J (2021) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput 18(3):1080–1094CrossRef
10.
go back to reference Xiong J, Lei C, Bhuiyan MZ, Cao C, Wang MY, Luo E (2020) A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener Comput Syst 111:741–753CrossRef Xiong J, Lei C, Bhuiyan MZ, Cao C, Wang MY, Luo E (2020) A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener Comput Syst 111:741–753CrossRef
11.
go back to reference Xue Y, Xue K, Gai N, Hong J, Wei D, Hong P (2019) An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans Inf Forensics Secur 14(11):2927–2942CrossRef Xue Y, Xue K, Gai N, Hong J, Wei D, Hong P (2019) An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans Inf Forensics Secur 14(11):2927–2942CrossRef
13.
go back to reference Ma S, Lai J, Deng R, Ding X (2017) Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21:6191–6200CrossRef Ma S, Lai J, Deng R, Ding X (2017) Adaptable key-policy attribute-based encryption with time interval. Soft Comput 21:6191–6200CrossRef
14.
go back to reference Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen P (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458CrossRef Xiong J, Liu X, Yao Z, Ma J, Li Q, Geng K, Chen P (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448–458CrossRef
15.
go back to reference Wang G, Yue F, Liu Q (2013) A secure self-destructing scheme for electronic data. J Comput Syst Sci 79(2):279–290MathSciNetCrossRef Wang G, Yue F, Liu Q (2013) A secure self-destructing scheme for electronic data. J Comput Syst Sci 79(2):279–290MathSciNetCrossRef
16.
go back to reference Ahmed B, Mustapha H, Karim A, Zakaria I, Said E (2019) An IBE-based design for assured deletion in cloud storage. Cryptologia 43(3):254–265CrossRef Ahmed B, Mustapha H, Karim A, Zakaria I, Said E (2019) An IBE-based design for assured deletion in cloud storage. Cryptologia 43(3):254–265CrossRef
17.
go back to reference Xue L, Yu Y, Li Y, Man H, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650CrossRef Xue L, Yu Y, Li Y, Man H, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650CrossRef
18.
go back to reference Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B (2018) Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans Ind Inf 14(10):4538–4547CrossRef Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B (2018) Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans Ind Inf 14(10):4538–4547CrossRef
19.
go back to reference Perlman R (2005) File System Design with Assured Delete. 3rd International IEEE}Security in Storage Workshop. IEEE Computer Society, San Francisco, California, p 6–88 Perlman R (2005) File System Design with Assured Delete. 3rd International IEEE}Security in Storage Workshop. IEEE Computer Society, San Francisco, California, p 6–88
20.
go back to reference Geambasu R, Kohno T, Levy A, Levy H (2009) Vanish: Increasing Data Privacy with Self-Destructing Data. 18th {USENIX} Security Symposium. {USENIX} Association, Montreal, Canada, p 299–316 Geambasu R, Kohno T, Levy A, Levy H (2009) Vanish: Increasing Data Privacy with Self-Destructing Data. 18th {USENIX} Security Symposium. {USENIX} Association, Montreal, Canada, p 299–316
22.
go back to reference Xiong J, Yao Z, Ma J, Li F, Liu X (2014) A secure self-destruct scheme based on identity encryption for network content privacy. Chin J Comput 37(01):139–150 Xiong J, Yao Z, Ma J, Li F, Liu X (2014) A secure self-destruct scheme based on identity encryption for network content privacy. Chin J Comput 37(01):139–150
23.
go back to reference Boneh D, Franklin M (2003) Identity-Based Encryption from the Weil Pairing. J Comput 32(3):586–615MathSciNetMATH Boneh D, Franklin M (2003) Identity-Based Encryption from the Weil Pairing. J Comput 32(3):586–615MathSciNetMATH
24.
go back to reference Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int J Distrib Sens Netw 16(9) Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int J Distrib Sens Netw 16(9)
25.
go back to reference Tian Y, Shao T, Li Z (2021) An Efficient Scheme of Cloud Data Assured Deletion. Mobile Netw Appl 26(4):1597–1608CrossRef Tian Y, Shao T, Li Z (2021) An Efficient Scheme of Cloud Data Assured Deletion. Mobile Netw Appl 26(4):1597–1608CrossRef
26.
go back to reference Cachin C, Haralambiev K, Hsiao H, Sorniotti A (2013) {ACM} {SIGSAC} Conference on Computer and Communications Security. {ACM}, Berlin, Germany, p. 259–270 Cachin C, Haralambiev K, Hsiao H, Sorniotti A (2013) {ACM} {SIGSAC} Conference on Computer and Communications Security. {ACM}, Berlin, Germany, p. 259–270
27.
go back to reference Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution. Int J Pure Appl Math 76–90 Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution. Int J Pure Appl Math 76–90
28.
go back to reference Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193CrossRef Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193CrossRef
29.
go back to reference Hao J, Liu J, Wu W, Tang F, Xian M (2020) Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. {IEEE} Internet Things J 7(2):1140–1153 Hao J, Liu J, Wu W, Tang F, Xian M (2020) Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. {IEEE} Internet Things J 7(2):1140–1153
30.
go back to reference Tian J, Wang Z (2020) Fine-grained Assured Data Deletion Scheme Based on Attribute Association. Comput Secur 96:101936CrossRef Tian J, Wang Z (2020) Fine-grained Assured Data Deletion Scheme Based on Attribute Association. Comput Secur 96:101936CrossRef
31.
go back to reference Ma J, Wang M, Xiong J, Hu Y (2021) CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. Secur Commun Netw 8855341:1–8855341:14 Ma J, Wang M, Xiong J, Hu Y (2021) CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. Secur Commun Netw 8855341:1–8855341:14
32.
go back to reference Gupta S, Gupta B (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput 7(3):1–43 Gupta S, Gupta B (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput 7(3):1–43
33.
go back to reference Tripathi S, Gupta B, Almonmani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle Distributed Denial of Service (DDoS) Attacks. J Inf Secur 4(3):150–164 Tripathi S, Gupta B, Almonmani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle Distributed Denial of Service (DDoS) Attacks. J Inf Secur 4(3):150–164
34.
go back to reference Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. Identity Theft: Breakthroughs in Research and Practice. In I. Manage Assoc 221–247 Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. Identity Theft: Breakthroughs in Research and Practice. In I. Manage Assoc 221–247
35.
go back to reference John B, Amit S, Brent W (2007) Ciphertext-Policy Attribute-Based Encryption. 2007 {IEEE} Symposium on Security and Privacy. Computer Society, Oakland, California, p. 321–334 John B, Amit S, Brent W (2007) Ciphertext-Policy Attribute-Based Encryption. 2007 {IEEE} Symposium on Security and Privacy. Computer Society, Oakland, California,  p. 321–334
Metadata
Title
Cloud data assured deletion scheme based on dynamic sliding window
Authors
Junfeng Tian
Ziwei Wang
Publication date
22-04-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01318-3

Other articles of this Issue 4/2022

Peer-to-Peer Networking and Applications 4/2022 Go to the issue

Premium Partner