Collaborative Computing: Networking, Applications and Worksharing. 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Research Article

Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence

Download
40 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-00916-8_56,
        author={Yijie Chen and Wenbin Yao},
        title={Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11--13, 2017, Proceedings},
        proceedings_a={COLLABORATECOM},
        year={2018},
        month={10},
        keywords={Data assured deletion Bit stream extraction Data hiding Secondary encryption Logistic chaotic mapping},
        doi={10.1007/978-3-030-00916-8_56}
    }
    
  • Yijie Chen
    Wenbin Yao
    Year: 2018
    Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-030-00916-8_56
Yijie Chen1, Wenbin Yao1,*
  • 1: Beijing University of Posts and Telecommunications
*Contact email: yaowenbin_cdc@163.com

Abstract

The strategic point of data assured deletion in cloud storage is how to avoid unauthorized users accessing or backing up data. The main choice for this issue is how to improve the data access strategy or how to manage the encryption keys better. However, these methods are still put whole encrypted data in the cloud. In case that the encryption key is pick up by an attacker, the data is not secure. A new scheme named AD-IHSE is proposed in this paper. In this method, the bit stream of encrypted data will be divided into two parts. Big part of encrypted data is uploaded to the cloud directly, while the small part of encrypted data is embedded in the carrier and then uploaded to the cloud after secondary encryption with logistic chaotic sequence encryption. This method can even guarantee the security of the data when the encryption key is lost. In addition, the scheme does not bring other third parties to lessen the risk of data leakage. Both safety certificates and experimental results show that it not only realizes the certainty of the cloud data assured deletion but also has good security.