期刊文献+

基于覆写验证的云数据确定性删除方案 被引量:7

Cloud data assured deletion scheme based on overwrite verification
下载PDF
导出
摘要 云存储中的数据在生命周期结束删除时,大多是采用删除密钥的逻辑删除方式进行处理,数据仍存在泄露风险,为此提出了一种基于密文重加密与覆写验证结合的云数据确定性删除方案(WV-CP-ABE)。当数据拥有者想删除外包数据时,通过重新加密密文改变密文对应的访问控制策略来实现数据细粒度删除操作;其次构建基于脏数据块覆写的可搜索路径散列二叉树(DSMHT),对要删除的数据进行覆写后正确性验证;最终采用更改密文访问控制策略和数据覆写双重机制保障数据确定性删除。实验分析证明,所提方案在数据确定性删除方面比以前的逻辑删除方法细粒度控制更好,安全性更可靠。 At the end of data life cycle, there is still a risk of data leakage, because mostly data which was stored in cloud is removed by logical deletion of the key. Therefore, a cloud data assured deletion scheme (WV-CP-ABE) based on ciphertext re-encrypt and overwrite verification was proposed. When data owner wants to delete the outsourced data, the data fine-grained deletion operation was realized by re-encrypting the ciphertext to change the access control policy. Secondly, a searchable path hash binary tree (DSMHT) based on dirty data block overwrite was built to verify the correctness of the data to be deletion. Finally, the dual mechanism of changing the ciphertext access control policy and data overwriting guarantees the data assured deletion. The experimental analysis proves that the fine-grained control is better and the security is more reliable than the previous logical delete method in the assured deletion of data.
作者 杜瑞忠 石朋亮 何欣枫 DU Ruizhong;SHI Pengliang;HE Xinfeng(Cyberspace Security and Computer College, Hebei University, Baoding 071002, China;Key Lab on High Trusted Information System in Hebei Province, Baoding 071002, China)
出处 《通信学报》 EI CSCD 北大核心 2019年第1期130-140,共11页 Journal on Communications
基金 国家自然科学基金资助项目(No.61572170) 河北省自然科学基金资助项目(No.F2018201153 No.2016205023) 河北省高等学校科学技术研究基金资助项目(No.ZD2016043) 河北省物联网监控工程技术研究中心基金资助项目(No.3142016020)~~
关键词 云存储 密文属性加密 确定性删除 散列二叉树 覆写验证 cloud storage CP-ABE assured deletion Hash binary tree overwrite and verify
  • 相关文献

参考文献8

二级参考文献100

  • 1Xiong J. Yao Z. Ma J. et al. A secure document selfdestruction scheme with identity based encryption/ /Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. Xi/ an , China. 2013: 239-243.
  • 2Goyal V. Pandey O. Sahai A. et al. Attribute-based encryption for fine- grained access control of encrypted datal / Proceedings of the ACM Conference on Computer and Communications Security. Alexandria. USA. 2006: 89-98.
  • 3Perlman R. File system design with assured delete/ /Proceedings of the 3rd IEEE International Security in Storage Workshop. San Francisco. USA. 2005: 83-88.
  • 4Tang Y. Lee P P. Lui J C. et al. FADE: Secure overlay cloud storage with file assured deletion/ /Proceedings of the Security and Privacy in Communication Networks. River Valley. Singapore. 2010: 380-397.
  • 5Nair S K. Dashti M T. Crispo B. et al. A hybrid PKI-IBC based ephemerizer system/ /Proceedings of the International Information Security Conference. Sandton , South Africa. 2007: 241-252.
  • 6Perlman R. The ephernerizer , Making data disappear. Journal of Information Systems Security. 2005. 1(1): 21-32.
  • 7Geambasu R. Kohno T. Levy A. et al. Vanish: Increasing data privacy with self-destructing datal /Proceedings of the 18th USENIX Security Symposium. Montreal. Canada. 2009: 299-315.
  • 8Wang G. Yue F. Liu Q. A secure self-destructing scheme for electronic data. Journal of Computerand System Sciences. 2013.79(2): 279-290.
  • 9Wolchok S. Hofmann 0 S. Heninger N. et al. Defeating vanish with low-cost sybil attacks against large DHTs/ / Proceedings of the 17th Annual Network &. Distributed System Security Conference. San Diego. USA. 2010: 1-15.
  • 10Zeng L, Shi Z. Xu S. et al. SaieVanish , An improved data self-destruction for protecting data privacy/ /Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science. Athens. Greece. 2010: 521-528.

共引文献95

同被引文献55

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部