Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The strategic point of data assured deletion in cloud storage is how to avoid unauthorized users accessing or backing up data. The main choice for this issue is how to improve the data access strategy or how to manage the encryption keys better. However, these methods are still put whole encrypted data in the cloud. In case that the encryption key is pick up by an attacker, the data is not secure. A new scheme named AD-IHSE is proposed in this paper. In this method, the bit stream of encrypted data will be divided into two parts. Big part of encrypted data is uploaded to the cloud directly, while the small part of encrypted data is embedded in the carrier and then uploaded to the cloud after secondary encryption with logistic chaotic sequence encryption. This method can even guarantee the security of the data when the encryption key is lost. In addition, the scheme does not bring other third parties to lessen the risk of data leakage. Both safety certificates and experimental results show that it not only realizes the certainty of the cloud data assured deletion but also has good security.

Cite

CITATION STYLE

APA

Chen, Y., & Yao, W. (2018). Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 252, pp. 613–623). Springer Verlag. https://doi.org/10.1007/978-3-030-00916-8_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free