Abstract
During the life cycle of the cloud data, the technique of data deterministic deletion is designed to completely destroy the data and ensures that cloud data that is out of date or backed up in the cloud server is completely deleted or will never be decrypted or accessed. However, the existing scheme simply deletes the key or the cipher text. Once the key or the cloud backup of the cipher text is stolen, data privacy will be threatened. For this reason, this paper proposes a data deletion scheme that is dynamic deletion is based on fragmented cipher text and key. The core of this scheme is to use the dynamic characteristics of DHT network to realize the periodic deletion of fragmented cipher text. Using the idea of fragmented cipher text dynamic deletion, in the unauthorized time even if in the case that the key is leaked, illegal user can not get all the cipher text and key, and can not restore the complete data. The theoretical analysis and experimental results show that the scheme can effectively delete some fragmented cipher texts and key, and has low performance cost, which can meet the requirements for deterministic deletion of excessive data or backup files in cloud storage system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perlman, R.: File system design with assured delete. In: SISW 2005 Proceeding of the Third IEEE International Security in Storage Workshop, pp. 83–88 (2005)
Tang, Y., Lee, P.P.C, Lui, J.C.S., et al.: FADE: secure overlay cloud storage with file assured deletion. In: Proceedings of the SecureComm 2010, pp. 380–397. ACM Press, New York (2010)
Yue, F., Wang, G., Liu, Q.: A secure self-destruct-ing scheme for electronic data. In: Proceedings of EUC 2010, pp. 651–658. IEEE Press, New York (2010)
Zeng, L., Shi, Z., Xu, S., et al.: Safevanish: animproved data self-destruction for protecting data privacy. In: Proceedings of CloudCom 2010, pp. 521–528. IEEE Press, New York (2010)
Zhang, K., Yang, C., Ma, J., Zhang, J.: Study on deterministic deletion of cloud data based on cipher text sampling fragmentation. J. Commun. 11, 108–117 (2015)
Wang, Li-na, Ren, Zheng-wei, Yu, Rong-wei, Han, Feng, Dong, Yong-feng: A method for deterministic data removal for cloud storage. Acta Electr. J. 02, 266–272 (2012)
Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data. In: Proceedings of CCSW 2009, pp. 55–65. ACM Press, New York (2009)
Wei, A.: DHT Network Measurement and Analysis. University of Electronic Science and Technology (2011)
Stoica, I., Morris, R., Karger, D., et al.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the SIGCOMM 2001, pp. 149–160. ACM Press, New York (2001)
Dabek, F.: A Distributed Hash Table. Massachusetts Institute of Technology, Massachusetts (2005)
Huan-ping, L.I.U., Yi-xian, Y.A.N.G.: Generalized (k, n) - threshold scheme. J. Commun. 08, 73–78 (1998)
Acknowledgments
This research was supported by the Postgraduate Education Innovation Projects of Shandong Province of China under Grant No.SDYC15042. In addition, the authors would like to thank the reviewers for their valuable comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, Y., Li, N., Cui, R., Fan, Y. (2018). Data Deterministic Deletion Scheme Based on DHT Network and Fragmentation Deletion. In: Yuan, H., Geng, J., Liu, C., Bian, F., Surapunt, T. (eds) Geo-Spatial Knowledge and Intelligence. GSKI 2017. Communications in Computer and Information Science, vol 848. Springer, Singapore. https://doi.org/10.1007/978-981-13-0893-2_45
Download citation
DOI: https://doi.org/10.1007/978-981-13-0893-2_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0892-5
Online ISBN: 978-981-13-0893-2
eBook Packages: Computer ScienceComputer Science (R0)