Published November 1, 2022 | Version v1
Journal article Open

Assured data deletion in cloud computing: security analysis and requirements

  • 1. Department of Computer Sciences, University of Kirkuk, College of Computer Sciences and Information Technology, Kirkuk, Iraq
  • 2. Network Department, University of Kirkuk, College of Computer Sciences and Information Technology, Kirkuk, Iraq

Description

With the rapid development of cloud storage, more data owners store their data on the remote cloud to reduce the heavy local storage overhead. Cloud storage provides clients with a storage space that they may outsource and use on a pay-as-you-go basis. Due to data ownership separation and management, local data owners lose control over their data. Hence, all the operations over the outsourced data such as data transfer, update, and deletion, will be executed by the remote cloud server. As a result of that, various security challenges appear in terms of data privacy and integrity. In addition to data deletion that becomes an important security challenge, once a cloud user intends to delete his data, it must be sure that data is deleted from all cloud storage sources and prevent the cloud server from reserving the data maliciously for economic interests. In this paper, we present and discuss several types of research that use different technologies to solve assured deletion problems and verification the deletion result. The paper also presents a thorough analysis of the surveyed protocols in terms of finegrained, security, performance, and requirements of remote cloud storage design.

Files

62 28730 v28i2 Nov22.pdf

Files (242.6 kB)

Name Size Download all
md5:1f0a1d68a1de550e97e5be2008b6b449
242.6 kB Preview Download