Skip to main content
Log in

Secure and effective assured deletion scheme with orderly overwriting for cloud data

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Due to the characteristics of distribution and virtualization, cloud storage is providing almost limitless storage services. Many users choose to upload data to the cloud to reduce storage burden, but the confidentiality of data is also at risk. When the cloud data must be deleted, the assured deletion of the data becomes a crucial problem. Assured deletion can preserve the confidentiality of the users data, and it is also an essential component of cloud storage services. In this paper, a secure and effective assured deletion scheme with orderly overwriting (SEAD-OO) is proposed. The scheme uses ciphertext-policy attribute-based encryption to achieve fine-grained access control and data sharing. To solve the problem of ciphertext left in the cloud after deleting the keys, we introduce physical deletion and logical deletion. Blockchain is introduced to ensure the validity and traceability of deletion. By comparing with related schemes, the proposed SEAD-OO is proved to be versatile. Theoretical analysis and experiments show that the scheme is safe and effective, and it provides a practical method for the assured deletion of cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Zheng D, Liang X, Li YuY, Yu Y (2020) Toward Assured Data Deletion in Cloud Storage. IEEE Netw 34:101–107. https://doi.org/10.1109/MNET.011.1900165

    Article  Google Scholar 

  2. Shan F, Li H, Li F, Guo Y, Xiong J (2019) An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int J Inf Technol Web Eng (IJITWE) 14(2):74–91. https://doi.org/10.4018/IJITWE.2019040105

    Article  Google Scholar 

  3. Reyhaneh R, Mahmoud A, Maryam R, Mohammad R (2020) A lightweight identitybased provable data possession supporting users’ identity privacy and traceability. J Inf Secur Appl 51:214–2126. https://doi.org/10.1016/j.jisa.2020.102454

    Article  Google Scholar 

  4. Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12:767–778. https://doi.org/10.1109/TIFS.2016.2615853

    Article  Google Scholar 

  5. Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116. https://doi.org/10.1016/j.ins.2015.09.004

    Article  Google Scholar 

  6. Guo W, Zhang H, Qin SJ et al (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener Comput Syst 95:309–322. https://doi.org/10.1016/j.future.2019.01.009

    Article  Google Scholar 

  7. Yang CS, Chen XF, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193. https://doi.org/10.1016/j.jnca.2017.11.011.175

    Article  Google Scholar 

  8. Kopo M et al. (2016) Assured Deletion in the Cloud: Requirements, Challenges and Future Directions. In: Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW '16) 97–108. https://doi.org/10.1145/2996429.2996434.

  9. Elli A, Artem B et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth Euro Sys Conference (EuroSys '18) Article 30:1–15. https://doi.org/10.1145/3190508.3190538.

  10. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-Policy Attribute-Based Encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07) 321–334. https://doi.org/10.1109/SP.2007.11.

  11. Tian JF, Wang ZD (2020) Fine-grained assured data deletion scheme based on attribute association. Comput Secur 96:101936. https://doi.org/10.1016/j.cose.2020.101936

    Article  Google Scholar 

  12. Luo YH, Xu M, Fu SJ, Wang DS (2016) Enabling Assured Deletion in the Cloud Storage by Overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (SCC '16) 17–23. https://doi.org/10.1145/2898445.2898447.

  13. Zhang M, Zhang H, Yang Y, Shen Q (2019) PTAD: provable and traceable assured deletion in cloud storage. IEEE Symp Comput Commun (ISCC) 2019:1–6. https://doi.org/10.1109/ISCC47284.2019.8969763

    Article  Google Scholar 

  14. Tian YC, Shao T, Li Z (2020) An efficient scheme of cloud data assured deletion. Mobile Netw Appl 26:1597–1608. https://doi.org/10.1007/s11036-019-01497-z

    Article  Google Scholar 

  15. Boneh D, Lipton R (1996) Revocable Backup System. In Usenix Security 91–96.

  16. Mo Z, Xiao Q, Zhou Y, et al (2014) On deletion of outsourced data in cloud computing. In: 2014 IEEE 7th International Conference on Cloud Computing (pp. 344-351). IEEE. https://doi.org/10.1109/CLOUD.2014.54.

  17. Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In: Proceedings of the 18th Conference on USENIX security symposium (SSYM’09) 299–316.

  18. Du L, Zhang Z, Tan S et al (2018) An Associated Deletion Scheme for M-ulti-copy in Cloud Storage. In: Vaidya J, Li J (eds) Algorithms and Architecturesfor Parallel Processing (ICA3PP). Springer International Publishing, Cham. https://doi.org/10.1007/978-3-030-05063-4_38

    Chapter  Google Scholar 

  19. Liang X, Yu Y, Li YN et al (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650. https://doi.org/10.1016/j.ins.2018.02.015

    Article  MATH  Google Scholar 

  20. Xiong JB et al (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2:448–458. https://doi.org/10.1109/TCC.2014.2372758

    Article  Google Scholar 

  21. Suriya PT, Meena V (2019) Integrity Checking of Cloud Data with an Audit-ing Mechanism Using ECC and Merkle Hash Tree. In: Shankar Sriram V, Subramaniyaswamy V, Sasikaladevi N, Zhang L, Batten L, Li G (eds) Applications and Techniques in Information Security. Springer, Singapore. https://doi.org/10.1007/978-981-15-0871-4_9

    Chapter  Google Scholar 

  22. Lu N, Zhang YX, Shi WB et al (2020) A secure and scalable data integrity auditing scheme based on hyper ledger fabric. Comput Secur 92:101741. https://doi.org/10.1016/j.cose.2020.101741

    Article  Google Scholar 

  23. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. https://doi.org/10.1145/359168.359176

    Article  MathSciNet  MATH  Google Scholar 

  24. Cachin C, Haralambiev HK, Sorniotti HC (2013) A Policy-based secure deletion. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security - CCS, 13.

  25. Ma J, Wang MS, Xiong JB et al (2021) CP-ABE-based secure and verifiable data deletion in cloud. Secur Commun Netw 2021:14. https://doi.org/10.1155/2021/8855341

    Article  Google Scholar 

  26. Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion -for outsourced data in cloud computing. Int J Distrib Sens Netw. https://doi.org/10.1177/1550147720958294

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by The Natural Science Foundation of Hebei Province (F2016201244).

Funding

This work is supported by The Natural Science Foundation of Hebei Province (F2016201244).

Author information

Authors and Affiliations

Authors

Contributions

Junfeng Tian involved in conceptualization; supervision; project administration; funding acquisition; Tianfeng Zhang involved in conceptualization; methodology; software; formal analysis; investigation; writing—original draft preparation.

Corresponding author

Correspondence to Tianfeng Zhang.

Ethics declarations

Conflict of interests

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tian, J., Zhang, T. Secure and effective assured deletion scheme with orderly overwriting for cloud data. J Supercomput 78, 9326–9354 (2022). https://doi.org/10.1007/s11227-021-04297-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04297-z

Keywords

Navigation