Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing

Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga
{"title":"Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing","authors":"Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga","doi":"10.48175/ijarsct-19314","DOIUrl":null,"url":null,"abstract":"This paper explores the benefits of cloud storage, a fundamental component of cloud computing, which provides users with nearly limitless storage capabilities. Users can substantially decrease their local storage requirements by allowing data to be outsourced to cloud servers. However, the paper also addresses security privacy concerns linked to cloud storage, which stem from data ownership and management division, resulting in users losing direct control over their outsourced data. \nThe authors concentrate on the challenge of verifiable outsourced data deletion, a significant issue that has not been adequately addressed in either industry or academic circles. They present an effective fine-grained outsourced data deletion scheme utilizing the invertible Bloom filter. This solution facilitates both public and private verification of the storage and deletion processes. Suppose the cloud server fails to manage or remove the data accurately and creates the associated evidence. In that case, users can detect any malicious actions by the cloud server with a high likelihood. \nAdditionally, the authors note that within their proposed scheme, the computational complexity of both data deletion and verification of deletion results remains unaffected by the quantity of outsourced data blocks. This property makes the scheme appropriate for extensive data deletion scenarios. \nUltimately, the paper includes a thorough security evaluation and performance assessment, validating the security and practicality of the proposed scheme. This comprehensive method for tackling the issue of verifiable outsourced data deletion in cloud storage represents a notable contribution to the field","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"29 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Science, Communication and Technology","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.48175/ijarsct-19314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper explores the benefits of cloud storage, a fundamental component of cloud computing, which provides users with nearly limitless storage capabilities. Users can substantially decrease their local storage requirements by allowing data to be outsourced to cloud servers. However, the paper also addresses security privacy concerns linked to cloud storage, which stem from data ownership and management division, resulting in users losing direct control over their outsourced data. The authors concentrate on the challenge of verifiable outsourced data deletion, a significant issue that has not been adequately addressed in either industry or academic circles. They present an effective fine-grained outsourced data deletion scheme utilizing the invertible Bloom filter. This solution facilitates both public and private verification of the storage and deletion processes. Suppose the cloud server fails to manage or remove the data accurately and creates the associated evidence. In that case, users can detect any malicious actions by the cloud server with a high likelihood. Additionally, the authors note that within their proposed scheme, the computational complexity of both data deletion and verification of deletion results remains unaffected by the quantity of outsourced data blocks. This property makes the scheme appropriate for extensive data deletion scenarios. Ultimately, the paper includes a thorough security evaluation and performance assessment, validating the security and practicality of the proposed scheme. This comprehensive method for tackling the issue of verifiable outsourced data deletion in cloud storage represents a notable contribution to the field
云计算中可公开验证的高效细粒度数据删除方案
本文探讨了云存储的好处,云存储是云计算的一个基本组成部分,它为用户提供了几乎无限的存储能力。通过将数据外包给云服务器,用户可以大大减少对本地存储的需求。不过,本文也讨论了与云存储相关的安全隐私问题,这些问题源于数据所有权和管理权的分割,导致用户失去对外包数据的直接控制。作者集中探讨了可验证的外包数据删除这一难题,而这一重大问题在业界和学术界都没有得到充分解决。他们提出了一种有效的细粒度外包数据删除方案,利用了可逆 Bloom 过滤器。该方案有助于对存储和删除过程进行公开和私密验证。假设云服务器未能准确管理或删除数据,并创建了相关证据。在这种情况下,用户很有可能发现云服务器的任何恶意行为。此外,作者还指出,在他们提出的方案中,数据删除和删除结果验证的计算复杂度不受外包数据块数量的影响。这一特性使该方案适用于大量数据删除的情况。最后,论文还进行了全面的安全评估和性能评估,验证了所提方案的安全性和实用性。这种解决云存储中可验证的外包数据删除问题的综合方法是对该领域的显著贡献
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信