Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Supporting dynamic update scheme for assured deletion based-multi-copy association tree

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud storage services provide storage resources for resource-constrained users, which reduces their local overhead and computing cost. As an extension of cloud computing, fog computing introduces a fog layer between the cloud and users to deploy computing, storage, and other types of equipment, allowing users to operate outsourced data conveniently. Although cloud storage brings many conveniences to users, assured data deletion is still one of the crucial security challenges. This paper proposes an efficient and secure cloud data deletion scheme (SDUS-AD) that supports dynamic data updates in multi-copy scenarios. In this scheme, a new dynamic structure called Multi-Copy Association Tree is designed to realize the dynamic update of outsourced data efficiently and safely. A cloud-fog-user layer structure is used to meet the needs of resource-constrained users to update data and ensure the confidentiality of data privacy. Detailed performance analysis and simulation experiments show that SDUS-AD is efficient, safe, and feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig.12
Fig.13
Fig.14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Data availability

The data sets supporting the results of this article are included within the article and its additional files.

References

  1. Dhal, K., Pattnaik, P.K., Rai, S.C.: RACC: an efficient and revocable fine grained access control model for cloud storage. Int. J. Knowl.-Based Intell. Eng. Syst. 23(1), 21–32 (2019)

    Google Scholar 

  2. Zhang, J., Wang, B., He, D., Wang, X.: Improved secure fuzzy auditing protocol for cloud data storage. Soft. Comput. 23(10), 3411–3422 (2019)

    Article  Google Scholar 

  3. Yang, T., Li, J., Yu, B.: A secure ciphertext self-destruction scheme with attribute-based encryption. Math. Probl. Eng. 2015, 1–8 (2015)

    MathSciNet  Google Scholar 

  4. Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. Wirel. Algorithms Syst. Appl. 2015, 685–695 (2015)

    Google Scholar 

  5. Guo, R., Zhuang, C., Shi, H., Zhang, Y., Zheng, D.: A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distrib. Sens. Netw. 16(2), 155014772090679 (2020)

    Article  Google Scholar 

  6. Jiang, J., Tang, L., Gu, K., Jia, W.: Secure computing resource allocation framework for open fog computing. Comput. J. 63(4), 567–592 (2020)

    Article  MathSciNet  Google Scholar 

  7. Shahid, M., Hameed, A., Islam, S., Khattak, H., Din, I., Rodrigues, J.: Energy and delay efficient fog computing using caching mechanism. Comput. Commun. 154, 534–541 (2020)

    Article  Google Scholar 

  8. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)

    Article  Google Scholar 

  9. Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991–3005 (2016)

    Article  Google Scholar 

  10. Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L.: Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6), 568–581 (2014)

    Article  Google Scholar 

  11. Choo, K., Domingo-Ferrer, J., Zhang, L.: Cloud cryptography: theory, practice and future research directions. Futur. Gener. Comput. Syst. 62, 51–53 (2016)

    Article  Google Scholar 

  12. BBC.: Data on 540 million Facebook users exposed. https://www.bbc.com/news/tec-hnology-47812470 (2019). Accessed 5 Oct 2019

  13. ISC.: 2019 cloud security report. https://www.isc2.org/Resource-Center/Reports/Clo-ud-Security-Report (2019). Accessed 7 Mar 2020

  14. Wang, Q., Zhou, F., Peng, S., Xu, Z.: Verifiable outsourced computation with full delegation. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP 2018, pp. 270–287 (2018)

  15. Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.: Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113–124 (2018)

    Article  Google Scholar 

  16. Miao, M., Wang, J., Ma, J.: New publicly verifiable databases supporting insertion operation. In: Proceedings of the 18th International Conference on Network-Based Information Systems, pp. 2–4. IEEE, New York, Taipei, Taiwan (2015)

  17. Tian, J., Chang, F.: Trusted cloud platform management model based on TPM alliance. J. Commun. 37(2), 1–10 (2016)

    Google Scholar 

  18. Hughes, G., Coughlin, T., Commins, D.: Disposal of disk and tape data by secure sanitization. IEEE Secur. Priv. Mag. 7(4), 29–34 (2009)

    Article  Google Scholar 

  19. Paul, M., Saxena, A.: Proof of erasability for ensuring comprehensive data deletion in cloud computing. In: Proceedings of the Recent Trends in Network Security and Applications, pp. 340–348. CNSA (2010)

  20. Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Proceedings of the 15th European Symposium on Research in Computer Security, pp. 643–662. ESORICS (2010)

  21. Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing. SCC '16, pp.17–23. ACM, New York, NY, USA (2016)

  22. Tang, Y., Lee, P., Liu, J., Perlman, R.: Fade: secure overlay cloud storage with file assured deletion. Security and privacy in communication networks. SecureComm 2010, 380–397 (2010)

    Google Scholar 

  23. Tian, J., Zhang, T.: Secure and effective assured deletion scheme with orderly overwriting for cloud data. J. Super Comput. 78, 9326–9354 (2022)

    Article  Google Scholar 

  24. Li, H., Sun, W., Ll, F., Wang, B.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014)

    Google Scholar 

  25. Boneh, D., Lipton, R.: A revocable backup system. In: Proceedings of the sixth USENIX Security Symposium. San Jose, CA, USA, pp. 91–96 (1996)

  26. Perlman, R.: File system design with assured delete. In: Proceedings of the Third IEEE International Security in Storage Workshop. SISW'05. San Francisco, CA, USA, pp. 83–88 (2005)

  27. Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: Proceedings of the IEEE 7th International Conference on Cloud Computing, pp. 344–351 (2014)

  28. Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2018)

    Article  Google Scholar 

  29. Dulin., Zhang, Z., Tan, S., Wang, J., Tao, X.: An associated deletion scheme for multi-copy in cloud storage. In: Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing. ICA3PP, pp. 511–526 (2018)

  30. Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)

    Article  Google Scholar 

  31. Yang, C., Liu, Y., Tao, X.: Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int. J. Distrib. Sens. Netw. 16(9), 155014772095829 (2020)

    Article  Google Scholar 

  32. Miao, M., Ma, J., Huang, X., Wang, Q.: Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions. IEEE Trans. Inf. Forensics Secur. 13(2), 511–520 (2018)

    Article  Google Scholar 

  33. Wang, Q., Zhou, F., Xu, J., Xu, Z.: Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener. Comput. Syst. 115, 553–567 (2021)

    Article  Google Scholar 

  34. Merkle, R.: A certified digital signature. In: Proceedings of the Conference on the Theory and Application of Cryptology. CRYPTO, pp. 218–238. New York, NY (1989)

  35. ANSI X9.62, FIPS 186-2: Elliptic Curve Digital Signature Algorithm (1998)

  36. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A., et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. The Thirteenth EuroSys Conference. EuroSys '18, pp. 1–15. ACM, New York, NY, USA (2018)

Download references

Acknowledgements

This work was supported by the Natural Science Foundation of Hebei Province (F2021201049) and the Key Project of Natural Science Foundation of Hebei Province (F2016201244).

Funding

This work was supported by the Natural Science Foundation of Hebei Province (F2021201049) and the Key Project of Natural Science Foundation of Hebei Province (F2016201244).

Author information

Authors and Affiliations

Authors

Contributions

JT: Conceptualization, Project administration, Funding acquisition, Supervision. RB: Writing-Original draft preparation, Conceptualization, Methodology, Software, Formal analysis, Investigation. TZ: Conceptualization, Methodology, Formal analysis, Investigation.

Corresponding author

Correspondence to Ruxin Bai.

Ethics declarations

Competing interests

The authors declare that they have no conflict of interest.

Ethical approval

Not applicable.

Research involving human and animal rights

Not applicable.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tian, J., Bai, R. & Zhang, T. Supporting dynamic update scheme for assured deletion based-multi-copy association tree. Cluster Comput 27, 1983–2001 (2024). https://doi.org/10.1007/s10586-023-04019-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04019-5

Keywords