A Time-Controlled Data Destruction Model Adapted for Cloud Storage

With the progress of cloud storage technology, its data security is threatened and its time of data destruction is limited in its life cycle in the cloud storage environment. Based on object storage technology, cryptography and data rewrite technology, a time-controlled data destruction model is proposed under the cloud storage environment to protect user’s data security in its whole life cycle. The model is processed by the function transformation to generate the ciphertext and avoid the complex key management. To improve the controllability of data destruction, a time-controllable self-destructing data object is designed so that any illegal access to expired data will trigger a data rewrite program to execute assured deletion of self-destructing data objects. Finally, the analysis and experimental results show that the scheme can enhance the flexibility and controllability of data destruction and reduce the performance cost, while protecting the data safely and more efficiently.

[1]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[2]  Radia J. Perlman,et al.  File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[3]  Xu Xiaolong,et al.  Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents , 2016 .

[4]  Jie Zhu,et al.  Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[5]  Ronald L. Rivest,et al.  All-or-Nothing Encryption and the Package Transform , 1997, FSE.

[6]  Randal C. Burns,et al.  Secure deletion for a versioning file system , 2005, FAST'05.

[7]  Radia Perlman,et al.  The ephemerizer: making data disappear , 2005 .

[8]  Shen Weiwei,et al.  Assured Deletion Scheme for Electronic Files Based on Life Cycle Control , 2016 .

[9]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[10]  Xiong Jin A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy , 2014 .

[11]  Dan Feng,et al.  SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  Алексей Вячеславович Бердник Проблемы безопасности облачных вычислений. Анализ методов защиты облаков от cloud Security Alliance , 2013 .

[13]  Xu Xiaoping,et al.  Research on Cloud Computing Security Platform , 2012, 2012 Fourth International Conference on Computational and Information Sciences.

[14]  Zahir Tari,et al.  Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.

[15]  Dong Yong-feng A Data Assured Deletion Approach Adapted for Cloud Storage , 2012 .