Skip to main content

2017 | OriginalPaper | Buchkapitel

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence

verfasst von : Wenbin Yao, Yijie Chen, Dongbin Wang

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As more and more data is outsourced to the cloud, data owners lose direct control of their data. When clients delete their data, it is important to prevent illegal users from visiting the deleted or backup data. The mainstream method of this problem is to encrypt the data in advance, and then protect the decryption key without being sent to unauthorized users. However, if we remain the full encrypted data in the cloud, once the decryption key is stolen by attackers, the data is unsafe. Especially, it is important to protect the privacy of cloud pictures, videos and other multimedia files which contain plenty of private information. In this paper, a new scheme named ADBST is presented for cloud multimedia files. In this method, the bit stream of multimedia files will be transformed into a new one by using logistic chaotic mapping before being encrypted in order to make the cloud file be different from the original file. It can even ensure the security of files on the condition of missing the encryption key. Moreover, this scheme does not bring other third parties in order to reduce the risk of data leakage. Compared with other schemes on the same condition, it only brings little time costs in the acceptable range.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Perlman R.: File system design with assured deletion. In: International Security in Storage Workshop, Third IEEE International, pp. 83–88. IEEE (2005) Perlman R.: File system design with assured deletion. In: International Security in Storage Workshop, Third IEEE International, pp. 83–88. IEEE (2005)
2.
Zurück zum Zitat Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16161-2_22 CrossRef Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-16161-2_​22 CrossRef
3.
Zurück zum Zitat Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Conference on Usenix Security Symposium, pp. 299–316. USENIX Association (2009) Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Conference on Usenix Security Symposium, pp. 299–316. USENIX Association (2009)
4.
Zurück zum Zitat Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)MathSciNetCrossRef Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)MathSciNetCrossRef
5.
Zurück zum Zitat Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015) Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108–111 (2015)
6.
Zurück zum Zitat Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014) Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308–317. IEEE (2014)
7.
Zurück zum Zitat Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: International Conference on Cloud Computing, pp. 344–351. IEEE (2014) Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: International Conference on Cloud Computing, pp. 344–351. IEEE (2014)
8.
Zurück zum Zitat Reardon, J., Ritzdorf, H., Basin, D., Capkun, S.: Secure data deletion from persistent media. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 271–284. ACM (2013) Reardon, J., Ritzdorf, H., Basin, D., Capkun, S.: Secure data deletion from persistent media. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 271–284. ACM (2013)
9.
Zurück zum Zitat Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755–2765 (2010)MathSciNetCrossRefMATH Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755–2765 (2010)MathSciNetCrossRefMATH
Metadaten
Titel
Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence
verfasst von
Wenbin Yao
Yijie Chen
Dongbin Wang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-65482-9_31