YANG Changsong, TAO Xiaoling, ZHAO Feng, WANG Yong. Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing[J]. Chinese Journal of Electronics, 2020, 29(2): 273-280. doi: 10.1049/cje.2020.02.015
Citation: YANG Changsong, TAO Xiaoling, ZHAO Feng, WANG Yong. Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing[J]. Chinese Journal of Electronics, 2020, 29(2): 273-280. doi: 10.1049/cje.2020.02.015

Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing

doi: 10.1049/cje.2020.02.015
Funds:  This work is supported by the Science and Technology Program of Guangxi (No.AB17195045), the National Natural Science Foundation of China (No.61962015), and the Natural Science Foundation of Guangxi (No.2016GXNSFAA380098).
  • Received Date: 2019-05-05
  • Rev Recd Date: 2019-08-29
  • Publish Date: 2020-03-10
  • With the rapid development of cloud storage, an increasing number of data owners prefer to outsource their data to the cloud server, which can greatly reduce the local storage overhead. Because different cloud service providers offer distinct quality of data storage service, e.g., security, reliability, access speed and prices, cloud data transfer has become a fundamental requirement of the data owner to change the cloud service providers. Hence, how to securely migrate the data from one cloud to another and permanently delete the transferred data from the original cloud becomes a primary concern of data owners. To solve this problem, we construct a new counting Bloom filter-based scheme in this paper. The proposed scheme not only can achieve secure data transfer but also can realize permanent data deletion. Additionally, the proposed scheme can satisfy the public verifiability without requiring any trusted third party. Finally, we also develop a simulation implementation that demonstrates the practicality and efficiency of our proposal.
  • loading
  • C. Yang and J. Ye, “Secure and efficient fine-grained data access control scheme in cloud computing”, Journal of High Speed Networks, Vol.21, No.4, pp.259-271, 2015.
    X. Chen, J. Li, J. Ma, et al., “New algorithms for secure outsourcing of modular exponentiations”, IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.9, pp.2386-2396, 2014.
    P. Li, J. Li, Z. Huang, et al., “Privacy-preserving outsourced classification in cloud computing”, Cluster Computing, Vol.21, No.1, pp.277-286, 2018.
    B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions”, Future Generation Computer Systems, Vol.79, pp.849-861, 2018.
    W. Shen, J. Qin, J. Yu, et al., “Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage”, IEEE Transactions on Information Forensics and Security, Vol.14, No.2, pp.331-346, 2019.
    R. Kaur, I. Chana and J. Bhattacharya J, “Data deduplication techniques for efficient cloud storage management: A systematic review”, The Journal of Supercomputing, Vol.74, No.5, pp.2035-2085, 2018.
    Cisco, “Cisco global cloud index: Forecast and methodology, 2014-2019”, available at: https://www.cisco.com/c/en/us-/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.pdf, 2019-5-5.
    Cloudsfer, “Migrate & backup your files from any cloud to any cloud”, available at: https://www.cloudsfer.com/, 2019-5-5.
    Y. Liu, S. Xiao, H. Wang, et al., “New provable data transfer from provable data possession and deletion for secure cloud storage”, International Journal of Distributed Sensor Networks, Vol.15, No.4, pp.1-12, 2019.
    Y. Wang, X. Tao, J. Ni, et al., “Data integrity checking with reliable data transfer for secure cloud storage”, International Journal of Web and Grid Services, Vol.14, No.1, pp.106-121, 2018.
    Y. Luo, M. Xu, S. Fu, et al., “Enabling assured deletion in the cloud storage by overwriting”, Proc. of the 4th ACM International Workshop on Security in Cloud Computing, Xi'an, China, pp.17-23, 2016.
    C. Yang and X. Tao, “New publicly verifiable cloud data deletion scheme with efficient tracking”, Proc. of the 2th International Conference on Security with Intelligent Computing and Big-data Services, Guilin, China, pp.359-372, 2018.
    Y. Tang, P.P Lee, J.C. Lui, et al., “Secure overlay cloud storage with access control and assured deletion”, IEEE Transactions on Dependable and Secure Computing, Vol.9, No.6, pp.903-916, 2012.
    Y. Tang, P.P.C. Lee, J.C.S. Lui, et al., “FADE: Secure overlay cloud storage with file assured deletion”, Proc. of the 6th International Conference on Security and Privacy in Communication Systems, Springer, pp.380-397, 2010.
    Z. Mo, Y. Qiao and S. Chen, “Two-party fine-grained assured deletion of outsourced data in cloud systems”, Proc. of the 34th International Conference on Distributed Computing Systems, Madrid, Spain, pp.308-317, 2014.
    M. Paul and A. Saxena, “Proof of erasability for ensuring comprehensive data deletion in cloud computing”, Proc. of the International Conference on Network Security and Applications, Chennai, India, pp.340-348, 2010.
    A. Rahumed, H.C.H. Chen, Y. Tang, et al., “A secure cloud backup system with assured deletion and version control”, Proc. of the 40th International Conference on Parallel Processing Workshops, Taipei City, Taiwan, pp.160-167, 2011.
    B. Hall and M. Govindarasu, “An assured deletion technique for cloud-based IoT”, Proc. of the 27th International Conference on Computer Communication and Networks, Hangzhou, China, pp.1-8, 2018.
    L. Xue, Y. Yu, Y. Li, et al., “Efficient attributebased encryption with attribute revocation for assured data deletion”, Information Sciences, Vol.479, pp.640-650, 2019.
    L. Du, Z. Zhang, S. Tan, et al., “An Associated Deletion Scheme for Multi-copy in Cloud Storage”, Proc. of the 18th International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, pp.511-526, 2018.
    C. Yang, X. Chen and Y. Xiang, “Blockchain-based publicly verifiable data deletion scheme for cloud storage”, Journal of Network and Computer Applications, Vol.103, pp.185-193, 2018.
    Y. Yu, J. Ni, W. Wu, et al., “Provable data possession supporting secure data transfer for cloud storage”, Proc. of 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications(BWCCA 2015), Krakow, Poland, pp.38-42, 2015.
    J. Ni, X. Lin, K. Zhang, et al., “Secure outsourced data transfer with integrity verification in cloud storage”, Proc. of 2016 IEEE/CIC International Conference on Communications in China, Chengdu, China, pp.1-6, 2016.
    L. Xue, J. Ni, Y. Li, et al., “Provable data transfer from provable data possession and deletion in cloud storage”, Computer Standards & Interfaces, Vol.54, pp.46-54, 2017.
    Y. Liu, X. Wang, Y. Cao, et al., “Improved provable data transfer from provable data possession and deletion in cloud storage”, Proc. of Conference on Intelligent Networking and Collaborative Systems, Bratislava, Slovakia, pp.445-452, 2018.
    C. Yang, J. Wang, X. Tao, et al., “Publicly verifiable data transfer and deletion scheme for cloud storage”, Proc. of the 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France, pp.445-458, 2018.
    B.H. Bloom, “Space/time trade-offs in hash coding with allowable errors”, Communications of the ACM, Vol.13, No.7, pp.422-426, 1970.
    A. Broder and M. Mitzenmacher, “Network applications of bloom filters: A survey”, Internet Mathematics, Vol.1, No.4, pp.485-509, 2004.
    J. Wang, X. Chen, X. Huang, et al., “Verifiable auditing for outsourced database in cloud computing”, IEEE transactions on computers, Vol.64, No.11, pp.3293-3303, 2015
    L. Fan, P. Cao, J. Almeida, et al., “Summary cache: A scalable wide-area web cache sharing protocol”, IEEE/ACM Transactions on Networking, Vol.8, No.3, pp.281-293, 2000.
    O. Rottenstreich, Y. Kanizo and I. Keslassy, “The variableincrement counting Bloom filter”, IEEE/ACM Transactions on Networking, Vol.22, No.4, pp.1092-1105, 2014.
    F. Hao, D. Clarke and A. F. Zorzo, “Deleting secret data with public verifiability”, IEEE Transactions on Dependable and Secure Computing, Vol.13, No.6, pp.617-629, 2015
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (800) PDF downloads(414) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint