What are you looking for ?
Advertise with us
RAIDON

R&D: Review of Assured Data Deletion Security Techniques in Cloud Storage

Paper identifies some future directions for development of assured deletion of cloud storage.

Iraqi Journal of science has published an article written by Sozan Mohammed Khudaier, Department of Computer Science, College of Computer Science and Information Technology, Kirkuk University, Kirkuk, Iraq, and Baban Ahmed Mahmood, Department of Networks, College of Computer Science and Information Technology, Kirkuk University, Kirkuk, Iraq.

Abstract: Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storage has grown in popularity, and the problem of ensured deletion has been solved. Several schemes to overcome the assured deletion problem have been proposed over the last few years. The proposed solutions have addressed the scaling overhead, trusted third parties, delays, single points of failure, and other inefficiencies. Customers had the option of receiving verifiable proof of deletion from cloud service providers. This article focuses on the issue of how cloud data storage clients may be confident that the deleted data from the cloud cannot be recovered. Furthermore, it discusses the practice of secure deletion. Moreover, the paper explores currently used methods to achieve the security of assuring the deletion of data faced by cloud entities such as cloud service providers, data owners, and cloud users. After that, the paper analyzes techniques to find the pros and cons of assured deletion and the problems that were solved by these techniques. Finally, the paper identifies some future directions for the development of assured deletion of cloud storage.

Articles_bottom
ExaGrid
ATTOtarget="_blank"
OPEN-E