By Topic

ADEC: Assured Deletion and Verifiable Version Control for Cloud Storage

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Shin Tezuka ; Grad. Sch. of Sci. & Technol., Keio Univ., Yokohama, Japan ; Ryuya Uda ; Kenichi Okada

Although cloud storage offers a number of attractive features, it also raises various security concerns. In particular, cloud storage of sensitive information, such as medical or trade records, requires measures to be taken not only for privacy protection, but also for assured deletion and verifiable version control. Even though there are methods for realizing both assured deletion and version control in cloud storage, they cannot guarantee the integrity of files and their versioning order. Therefore, we propose a system referred to as ``Assured Deletion and verifiable version Control (ADEC)'', which is implemented as a virtual file system capable of taking snapshots in cloud storage. The main ideas behind ADEC are a scheme for generating chained keys and a scheme for verifiable version control with hysteresis signatures. This method can be used not only for protection of privacy, but also for assured deletion of specific versions and all older versions in a single operation. In addition, the integrity of each file version can be verified with the hysteresis signature scheme, which makes it impossible to implement rollback and reordering attacks.

Published in:

2012 IEEE 26th International Conference on Advanced Information Networking and Applications

Date of Conference:

26-29 March 2012