Abstract
Due to the characteristics of distribution and virtualization, cloud storage is providing almost limitless storage services. Many users choose to upload data to the cloud to reduce storage burden, but the confidentiality of data is also at risk. When the cloud data must be deleted, the assured deletion of the data becomes a crucial problem. Assured deletion can preserve the confidentiality of the users data, and it is also an essential component of cloud storage services. In this paper, a secure and effective assured deletion scheme with orderly overwriting (SEAD-OO) is proposed. The scheme uses ciphertext-policy attribute-based encryption to achieve fine-grained access control and data sharing. To solve the problem of ciphertext left in the cloud after deleting the keys, we introduce physical deletion and logical deletion. Blockchain is introduced to ensure the validity and traceability of deletion. By comparing with related schemes, the proposed SEAD-OO is proved to be versatile. Theoretical analysis and experiments show that the scheme is safe and effective, and it provides a practical method for the assured deletion of cloud data.
Similar content being viewed by others
References
Zheng D, Liang X, Li YuY, Yu Y (2020) Toward Assured Data Deletion in Cloud Storage. IEEE Netw 34:101–107. https://doi.org/10.1109/MNET.011.1900165
Shan F, Li H, Li F, Guo Y, Xiong J (2019) An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int J Inf Technol Web Eng (IJITWE) 14(2):74–91. https://doi.org/10.4018/IJITWE.2019040105
Reyhaneh R, Mahmoud A, Maryam R, Mohammad R (2020) A lightweight identitybased provable data possession supporting users’ identity privacy and traceability. J Inf Secur Appl 51:214–2126. https://doi.org/10.1016/j.jisa.2020.102454
Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12:767–778. https://doi.org/10.1109/TIFS.2016.2615853
Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101–116. https://doi.org/10.1016/j.ins.2015.09.004
Guo W, Zhang H, Qin SJ et al (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener Comput Syst 95:309–322. https://doi.org/10.1016/j.future.2019.01.009
Yang CS, Chen XF, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185–193. https://doi.org/10.1016/j.jnca.2017.11.011.175
Kopo M et al. (2016) Assured Deletion in the Cloud: Requirements, Challenges and Future Directions. In: Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW '16) 97–108. https://doi.org/10.1145/2996429.2996434.
Elli A, Artem B et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth Euro Sys Conference (EuroSys '18) Article 30:1–15. https://doi.org/10.1145/3190508.3190538.
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-Policy Attribute-Based Encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07) 321–334. https://doi.org/10.1109/SP.2007.11.
Tian JF, Wang ZD (2020) Fine-grained assured data deletion scheme based on attribute association. Comput Secur 96:101936. https://doi.org/10.1016/j.cose.2020.101936
Luo YH, Xu M, Fu SJ, Wang DS (2016) Enabling Assured Deletion in the Cloud Storage by Overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (SCC '16) 17–23. https://doi.org/10.1145/2898445.2898447.
Zhang M, Zhang H, Yang Y, Shen Q (2019) PTAD: provable and traceable assured deletion in cloud storage. IEEE Symp Comput Commun (ISCC) 2019:1–6. https://doi.org/10.1109/ISCC47284.2019.8969763
Tian YC, Shao T, Li Z (2020) An efficient scheme of cloud data assured deletion. Mobile Netw Appl 26:1597–1608. https://doi.org/10.1007/s11036-019-01497-z
Boneh D, Lipton R (1996) Revocable Backup System. In Usenix Security 91–96.
Mo Z, Xiao Q, Zhou Y, et al (2014) On deletion of outsourced data in cloud computing. In: 2014 IEEE 7th International Conference on Cloud Computing (pp. 344-351). IEEE. https://doi.org/10.1109/CLOUD.2014.54.
Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In: Proceedings of the 18th Conference on USENIX security symposium (SSYM’09) 299–316.
Du L, Zhang Z, Tan S et al (2018) An Associated Deletion Scheme for M-ulti-copy in Cloud Storage. In: Vaidya J, Li J (eds) Algorithms and Architecturesfor Parallel Processing (ICA3PP). Springer International Publishing, Cham. https://doi.org/10.1007/978-3-030-05063-4_38
Liang X, Yu Y, Li YN et al (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650. https://doi.org/10.1016/j.ins.2018.02.015
Xiong JB et al (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2:448–458. https://doi.org/10.1109/TCC.2014.2372758
Suriya PT, Meena V (2019) Integrity Checking of Cloud Data with an Audit-ing Mechanism Using ECC and Merkle Hash Tree. In: Shankar Sriram V, Subramaniyaswamy V, Sasikaladevi N, Zhang L, Batten L, Li G (eds) Applications and Techniques in Information Security. Springer, Singapore. https://doi.org/10.1007/978-981-15-0871-4_9
Lu N, Zhang YX, Shi WB et al (2020) A secure and scalable data integrity auditing scheme based on hyper ledger fabric. Comput Secur 92:101741. https://doi.org/10.1016/j.cose.2020.101741
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. https://doi.org/10.1145/359168.359176
Cachin C, Haralambiev HK, Sorniotti HC (2013) A Policy-based secure deletion. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security - CCS, 13.
Ma J, Wang MS, Xiong JB et al (2021) CP-ABE-based secure and verifiable data deletion in cloud. Secur Commun Netw 2021:14. https://doi.org/10.1155/2021/8855341
Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion -for outsourced data in cloud computing. Int J Distrib Sens Netw. https://doi.org/10.1177/1550147720958294
Acknowledgements
This work is supported by The Natural Science Foundation of Hebei Province (F2016201244).
Funding
This work is supported by The Natural Science Foundation of Hebei Province (F2016201244).
Author information
Authors and Affiliations
Contributions
Junfeng Tian involved in conceptualization; supervision; project administration; funding acquisition; Tianfeng Zhang involved in conceptualization; methodology; software; formal analysis; investigation; writing—original draft preparation.
Corresponding author
Ethics declarations
Conflict of interests
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tian, J., Zhang, T. Secure and effective assured deletion scheme with orderly overwriting for cloud data. J Supercomput 78, 9326–9354 (2022). https://doi.org/10.1007/s11227-021-04297-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04297-z