ISSN 1000-1239 CN 11-1777/TP

• 信息安全 •

基于区块链的云数据删除验证协议

1. 1(桂林电子科技大学计算机与信息安全学院 广西桂林 541004);2(广州大学数学与信息科学学院 广州 510006) (ynliu@guet.edu.cn)
• 出版日期: 2018-10-01
• 基金资助:
国家自然科学基金项目(61662016, 61772147);广东自然科学基金基础研究重大项目(2015A030308016);广东教育厅科研团队项目(2015KCXTD014);广州市教育局协同创新重大项目(1201610005);国家密码发展基金(MMJJ20170117);桂林电子科技大学优秀研究生论文培优计划(16YJPYSS14);桂林电子科技大学研究生创新项目(2018YJCX50)

Blockchain-Based Verification Scheme for Deletion Operation in Cloud

Liu Yining1, Zhou Yuanjian1, Lan Rushi1, Tang Chunming2

1. 1(School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi 541004);2(School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006)
• Online: 2018-10-01

Abstract: Nowadays, more and more users upload their data to the cloud server, since the cloud can provide the service for users any time and at any place. Therefore, the cloud service facilitates the data usability and reduces the cost. However, the information leakage accidents have been reported frequently over the world, that is to say the cloud server is not fully trusted, and the security issue in cloud service must be paid enough attention. For example, illegal user may want to access the cloud server, and perhaps the cloud server does not delete the data according the user’s requirement. In order to address these concerns, a verification scheme for deletion operation in cloud is presented using block-chain technology, which can make the deletion operation more transparent. In our scheme, the user calls the smart contract to prove his identity to the cloud server, and creates the request transaction for data deletion; then the cloud server deletes the data and generates a block chain with the evidence (evidence chain). Even if the cloud server is dishonest, the user can still verify the data deletion result. Moreover, the proposed scheme is analyzed to really achieve the public verification of data without the third-party trusted organization, the impersonation attacks resistance, and the eavesdropping attacks resistance, etc.