{"id":755,"date":"2011-10-25T09:46:06","date_gmt":"2011-10-25T09:46:06","guid":{"rendered":"http:\/\/www.syslog.cl.cam.ac.uk\/?p=755"},"modified":"2011-10-25T09:46:41","modified_gmt":"2011-10-25T09:46:41","slug":"proof-of-deletion","status":"publish","type":"post","link":"https:\/\/www.syslog.cl.cam.ac.uk\/2011\/10\/25\/proof-of-deletion\/","title":{"rendered":"proof of deletion"},"content":{"rendered":"

in between reading SOSP liveblogging notes, I'm still trying to think up how one might implement a \"proof of deletion\" service for cloud storage - here's the latest<\/p>\n

a user stores data in the cloud - the data is encrypted so cloud provder cannot simply read it, but is amenable to privacy preserving queries on some keys.<\/p>\n

the user wants to delete a record, contacts a third party (the grim reaper?), and gives then the keys of records. the third party tells the cloud service to delete the data. and then, using an anonymous service (via TOR etc) queries the record - they should get a 404 response.<\/p>\n

of course, the cloud provider can squirrel data away but not in any useful way, as the TTP can do the query at any time<\/p>\n

why ot just let the user run the query? well they might want to go away, and rely on the TTP who might also be persistent and might have bigger TOR guns....<\/p>\n","protected":false},"excerpt":{"rendered":"

in between reading SOSP liveblogging notes, I’m still trying to think up how one might implement a “proof of deletion” service for cloud storage – here’s the latest a user stores data in the cloud – the data is encrypted so cloud provder cannot simply read it, but is amenable to privacy preserving queries on […]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[28,1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/755"}],"collection":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/comments?post=755"}],"version-history":[{"count":2,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/755\/revisions"}],"predecessor-version":[{"id":757,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/755\/revisions\/757"}],"wp:attachment":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/media?parent=755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/categories?post=755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/tags?post=755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}