Publicly verifiable data transfer and deletion scheme for cloud storage

With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as da...

Full description

Bibliographic Details
Main Authors: Changsong Yang, Xiaoling Tao, Feng Zhao
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2019-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719878999
_version_ 1797766371696705536
author Changsong Yang
Xiaoling Tao
Feng Zhao
author_facet Changsong Yang
Xiaoling Tao
Feng Zhao
author_sort Changsong Yang
collection DOAJ
description With the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality.
first_indexed 2024-03-12T20:24:21Z
format Article
id doaj.art-585a77539ac5441dbf480ab1730369f4
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T20:24:21Z
publishDate 2019-10-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-585a77539ac5441dbf480ab1730369f42023-08-02T00:38:04ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-10-011510.1177/1550147719878999Publicly verifiable data transfer and deletion scheme for cloud storageChangsong Yang0Xiaoling Tao1Feng Zhao2School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, ChinaThe State Key Laboratory of Integrated Services Network (ISN), Xidian University, Xi’an, ChinaSchool of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, ChinaWith the rapid development of cloud storage, more and more resource-constraint data owners can employ cloud storage services to reduce the heavy local storage overhead. However, the local data owners lose the direct control over their data, and all the operations over the outsourced data, such as data transfer and deletion, will be executed by the remote cloud server. As a result, the data transfer and deletion have become two security issues because the selfish remote cloud server might not honestly execute these operations for economic benefits. In this article, we design a scheme that aims to make the data transfer and the transferred data deletion operations more transparent and publicly verifiable. Our proposed scheme is based on vector commitment (VC), which is used to deal with the problem of public verification during the data transfer and deletion. More specifically, our new scheme can provide the data owner with the ability to verify the data transfer and deletion results. In addition, by using the advantages of VC, our proposed scheme does not require any trusted third party. Finally, we prove that the proposed scheme not only can reach the expected security goals but also can satisfy the efficiency and practicality.https://doi.org/10.1177/1550147719878999
spellingShingle Changsong Yang
Xiaoling Tao
Feng Zhao
Publicly verifiable data transfer and deletion scheme for cloud storage
International Journal of Distributed Sensor Networks
title Publicly verifiable data transfer and deletion scheme for cloud storage
title_full Publicly verifiable data transfer and deletion scheme for cloud storage
title_fullStr Publicly verifiable data transfer and deletion scheme for cloud storage
title_full_unstemmed Publicly verifiable data transfer and deletion scheme for cloud storage
title_short Publicly verifiable data transfer and deletion scheme for cloud storage
title_sort publicly verifiable data transfer and deletion scheme for cloud storage
url https://doi.org/10.1177/1550147719878999
work_keys_str_mv AT changsongyang publiclyverifiabledatatransferanddeletionschemeforcloudstorage
AT xiaolingtao publiclyverifiabledatatransferanddeletionschemeforcloudstorage
AT fengzhao publiclyverifiabledatatransferanddeletionschemeforcloudstorage