• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
Citation: Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436

Blockchain-Based Verification Scheme for Deletion Operation in Cloud

More Information
  • Published Date: September 30, 2018
  • Nowadays, more and more users upload their data to the cloud server, since the cloud can provide the service for users any time and at any place. Therefore, the cloud service facilitates the data usability and reduces the cost. However, the information leakage accidents have been reported frequently over the world, that is to say the cloud server is not fully trusted, and the security issue in cloud service must be paid enough attention. For example, illegal user may want to access the cloud server, and perhaps the cloud server does not delete the data according the user’s requirement. In order to address these concerns, a verification scheme for deletion operation in cloud is presented using block-chain technology, which can make the deletion operation more transparent. In our scheme, the user calls the smart contract to prove his identity to the cloud server, and creates the request transaction for data deletion; then the cloud server deletes the data and generates a block chain with the evidence (evidence chain). Even if the cloud server is dishonest, the user can still verify the data deletion result. Moreover, the proposed scheme is analyzed to really achieve the public verification of data without the third-party trusted organization, the impersonation attacks resistance, and the eavesdropping attacks resistance, etc.
  • Related Articles

    [1]Song Shuwei, Ni Xiaoze, Chen Ting. Gas Optimization for Smart Contracts: A Survey[J]. Journal of Computer Research and Development, 2023, 60(2): 311-325. DOI: 10.7544/issn1000-1239.202220887
    [2]Ma Xiaoxiao, Yang Fan, Wang Zhan, Yuan Guojun, An Xuejun. Survey on Smart Network Interface Card[J]. Journal of Computer Research and Development, 2022, 59(1): 1-21. DOI: 10.7544/issn1000-1239.20200629
    [3]Huang Qianyi, Li Zhiyang, Xie Wentao, Zhang Qian. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development, 2020, 57(9): 1800-1809. DOI: 10.7544/issn1000-1239.2020.20200253
    [4]Meng Yan, Li Shaofeng, Zhang Yichi, Zhu Haojin, Zhang Xinpeng. Cyber Physical System Security of Smart Home Platform[J]. Journal of Computer Research and Development, 2019, 56(11): 2349-2364. DOI: 10.7544/issn1000-1239.2019.20190412
    [5]Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing. Survey of Smart Home Security[J]. Journal of Computer Research and Development, 2018, 55(10): 2111-2124. DOI: 10.7544/issn1000-1239.2018.20180585
    [6]Liu Qiang, Li Tong, Yu Yang, Cai Zhiping, Zhou Tongqing. Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey[J]. Journal of Computer Research and Development, 2018, 55(1): 14-29. DOI: 10.7544/issn1000-1239.2018.20160765
    [7]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [8]Wang Juanjuan, Wang Hongan. Multi-Agent Multi-Criticality Scheduling Based Self-Healing System of Power Grid[J]. Journal of Computer Research and Development, 2017, 54(4): 720-730. DOI: 10.7544/issn1000-1239.2017.20161026
    [9]Li Bin, Dong Dezun, Wu Ji, Xia Jun. P-SMART: An Energy-Efficient NoC Router Based on SMART[J]. Journal of Computer Research and Development, 2016, 53(7): 1447-1453. DOI: 10.7544/issn1000-1239.2016.20160150
    [10]Zhu Junmao, Yang Shoubao, Fan Jianping, Chen Mingyu. A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803.
  • Cited by

    Periodical cited type(6)

    1. 屠要峰,韩银俊,金浩,陈正华,陈兵. UStore:面向新型硬件的统一存储系统. 计算机研究与发展. 2023(03): 525-538 . 本站查看
    2. 杨阔,李海涛,张雪梅. 基于可信云计算的非集中式元数据存储结构优化. 计算技术与自动化. 2023(01): 183-187 .
    3. 杨锋,张旭东,焦彦华,李上群,童胜昌. 基于遗传算法的业务标签优先级排序系统. 电子设计工程. 2023(11): 36-40 .
    4. 李可成. 基于嵌入式软PLC分布式控制系统设计. 计算机测量与控制. 2023(08): 110-115 .
    5. 马潇潇,杨帆,王展,元国军,安学军. 智能网卡综述. 计算机研究与发展. 2022(01): 1-21 . 本站查看
    6. 郑涛,林亮景,邓永强. 动态加权聚类算法在多媒体信息融合中的应用. 现代计算机. 2021(20): 1-7 .

    Other cited types(1)

Catalog

    Article views (1730) PDF downloads (848) Cited by(7)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return