Publicly verifiable data transfer and deletion scheme for cloud storage
With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as da...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2019-10-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719878999 |
_version_ | 1797766371696705536 |
---|---|
author | Changsong Yang Xiaoling Tao Feng Zhao |
author_facet | Changsong Yang Xiaoling Tao Feng Zhao |
author_sort | Changsong Yang |
collection | DOAJ |
description | With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality. |
first_indexed | 2024-03-12T20:24:21Z |
format | Article |
id | doaj.art-585a77539ac5441dbf480ab1730369f4 |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T20:24:21Z |
publishDate | 2019-10-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-585a77539ac5441dbf480ab1730369f42023-08-02T00:38:04ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-10-011510.1177/1550147719878999Publicly verifiable data transfer and deletion scheme for cloud storageChangsong Yang0Xiaoling Tao1Feng Zhao2School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, ChinaThe State Key Laboratory of Integrated Services Network (ISN), Xidian University, Xi’an, ChinaSchool of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, ChinaWith the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality.https://doi.org/10.1177/1550147719878999 |
spellingShingle | Changsong Yang Xiaoling Tao Feng Zhao Publicly verifiable data transfer and deletion scheme for cloud storage International Journal of Distributed Sensor Networks |
title | Publicly verifiable data transfer and deletion scheme for cloud storage |
title_full | Publicly verifiable data transfer and deletion scheme for cloud storage |
title_fullStr | Publicly verifiable data transfer and deletion scheme for cloud storage |
title_full_unstemmed | Publicly verifiable data transfer and deletion scheme for cloud storage |
title_short | Publicly verifiable data transfer and deletion scheme for cloud storage |
title_sort | publicly verifiable data transfer and deletion scheme for cloud storage |
url | https://doi.org/10.1177/1550147719878999 |
work_keys_str_mv | AT changsongyang publiclyverifiabledatatransferanddeletionschemeforcloudstorage AT xiaolingtao publiclyverifiabledatatransferanddeletionschemeforcloudstorage AT fengzhao publiclyverifiabledatatransferanddeletionschemeforcloudstorage |