Citation: | YANG Changsong, TAO Xiaoling, ZHAO Feng, et al. “Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing”. Chinese Journal of Electronics, vol. 29 no. 2. doi: 10.1049/cje.2020.02.015 |
C. Yang and J. Ye, “Secure and efficient fine-grained data access control scheme in cloud computing”, Journal of High Speed Networks, Vol.21, No.4, pp.259-271, 2015.
|
X. Chen, J. Li, J. Ma, et al., “New algorithms for secure outsourcing of modular exponentiations”, IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.9, pp.2386-2396, 2014.
|
P. Li, J. Li, Z. Huang, et al., “Privacy-preserving outsourced classification in cloud computing”, Cluster Computing, Vol.21, No.1, pp.277-286, 2018.
|
B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions”, Future Generation Computer Systems, Vol.79, pp.849-861, 2018.
|
W. Shen, J. Qin, J. Yu, et al., “Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage”, IEEE Transactions on Information Forensics and Security, Vol.14, No.2, pp.331-346, 2019.
|
R. Kaur, I. Chana and J. Bhattacharya J, “Data deduplication techniques for efficient cloud storage management: A systematic review”, The Journal of Supercomputing, Vol.74, No.5, pp.2035-2085, 2018.
|
Cisco, “Cisco global cloud index: Forecast and methodology, 2014-2019”, available at: https://www.cisco.com/c/en/us-/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.pdf, 2019-5-5.
|
Cloudsfer, “Migrate & backup your files from any cloud to any cloud”, available at: https://www.cloudsfer.com/, 2019-5-5.
|
Y. Liu, S. Xiao, H. Wang, et al., “New provable data transfer from provable data possession and deletion for secure cloud storage”, International Journal of Distributed Sensor Networks, Vol.15, No.4, pp.1-12, 2019.
|
Y. Wang, X. Tao, J. Ni, et al., “Data integrity checking with reliable data transfer for secure cloud storage”, International Journal of Web and Grid Services, Vol.14, No.1, pp.106-121, 2018.
|
Y. Luo, M. Xu, S. Fu, et al., “Enabling assured deletion in the cloud storage by overwriting”, Proc. of the 4th ACM International Workshop on Security in Cloud Computing, Xi'an, China, pp.17-23, 2016.
|
C. Yang and X. Tao, “New publicly verifiable cloud data deletion scheme with efficient tracking”, Proc. of the 2th International Conference on Security with Intelligent Computing and Big-data Services, Guilin, China, pp.359-372, 2018.
|
Y. Tang, P.P Lee, J.C. Lui, et al., “Secure overlay cloud storage with access control and assured deletion”, IEEE Transactions on Dependable and Secure Computing, Vol.9, No.6, pp.903-916, 2012.
|
Y. Tang, P.P.C. Lee, J.C.S. Lui, et al., “FADE: Secure overlay cloud storage with file assured deletion”, Proc. of the 6th International Conference on Security and Privacy in Communication Systems, Springer, pp.380-397, 2010.
|
Z. Mo, Y. Qiao and S. Chen, “Two-party fine-grained assured deletion of outsourced data in cloud systems”, Proc. of the 34th International Conference on Distributed Computing Systems, Madrid, Spain, pp.308-317, 2014.
|
M. Paul and A. Saxena, “Proof of erasability for ensuring comprehensive data deletion in cloud computing”, Proc. of the International Conference on Network Security and Applications, Chennai, India, pp.340-348, 2010.
|
A. Rahumed, H.C.H. Chen, Y. Tang, et al., “A secure cloud backup system with assured deletion and version control”, Proc. of the 40th International Conference on Parallel Processing Workshops, Taipei City, Taiwan, pp.160-167, 2011.
|
B. Hall and M. Govindarasu, “An assured deletion technique for cloud-based IoT”, Proc. of the 27th International Conference on Computer Communication and Networks, Hangzhou, China, pp.1-8, 2018.
|
L. Xue, Y. Yu, Y. Li, et al., “Efficient attributebased encryption with attribute revocation for assured data deletion”, Information Sciences, Vol.479, pp.640-650, 2019.
|
L. Du, Z. Zhang, S. Tan, et al., “An Associated Deletion Scheme for Multi-copy in Cloud Storage”, Proc. of the 18th International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, pp.511-526, 2018.
|
C. Yang, X. Chen and Y. Xiang, “Blockchain-based publicly verifiable data deletion scheme for cloud storage”, Journal of Network and Computer Applications, Vol.103, pp.185-193, 2018.
|
Y. Yu, J. Ni, W. Wu, et al., “Provable data possession supporting secure data transfer for cloud storage”, Proc. of 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications(BWCCA 2015), Krakow, Poland, pp.38-42, 2015.
|
J. Ni, X. Lin, K. Zhang, et al., “Secure outsourced data transfer with integrity verification in cloud storage”, Proc. of 2016 IEEE/CIC International Conference on Communications in China, Chengdu, China, pp.1-6, 2016.
|
L. Xue, J. Ni, Y. Li, et al., “Provable data transfer from provable data possession and deletion in cloud storage”, Computer Standards & Interfaces, Vol.54, pp.46-54, 2017.
|
Y. Liu, X. Wang, Y. Cao, et al., “Improved provable data transfer from provable data possession and deletion in cloud storage”, Proc. of Conference on Intelligent Networking and Collaborative Systems, Bratislava, Slovakia, pp.445-452, 2018.
|
C. Yang, J. Wang, X. Tao, et al., “Publicly verifiable data transfer and deletion scheme for cloud storage”, Proc. of the 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France, pp.445-458, 2018.
|
B.H. Bloom, “Space/time trade-offs in hash coding with allowable errors”, Communications of the ACM, Vol.13, No.7, pp.422-426, 1970.
|
A. Broder and M. Mitzenmacher, “Network applications of bloom filters: A survey”, Internet Mathematics, Vol.1, No.4, pp.485-509, 2004.
|
J. Wang, X. Chen, X. Huang, et al., “Verifiable auditing for outsourced database in cloud computing”, IEEE transactions on computers, Vol.64, No.11, pp.3293-3303, 2015
|
L. Fan, P. Cao, J. Almeida, et al., “Summary cache: A scalable wide-area web cache sharing protocol”, IEEE/ACM Transactions on Networking, Vol.8, No.3, pp.281-293, 2000.
|
O. Rottenstreich, Y. Kanizo and I. Keslassy, “The variableincrement counting Bloom filter”, IEEE/ACM Transactions on Networking, Vol.22, No.4, pp.1092-1105, 2014.
|
F. Hao, D. Clarke and A. F. Zorzo, “Deleting secret data with public verifiability”, IEEE Transactions on Dependable and Secure Computing, Vol.13, No.6, pp.617-629, 2015
|