Abstract

With the rapid development of cloud storage, more data owners store their data on the remote cloud to reduce the heavy local storage overhead. Cloud storage provides clients with a storage space that they may outsource and use on a pay-as-you-go basis. Due to data ownership separation and management, local data owners lose control over their data. Hence, all the operations over the outsourced data such as data transfer, update, and deletion, will be executed by the remote cloud server. As a result of that, various security challenges appear in terms of data privacy and integrity. In addition to data deletion that becomes an important security challenge, once a cloud user intends to delete his data, it must be sure that data is deleted from all cloud storage sources and prevent the cloud server from reserving the data maliciously for economic interests. In this paper, we present and discuss several types of research that use different technologies to solve assured deletion problems and verification the deletion result. The paper also presents a thorough analysis of the surveyed protocols in terms of fine-grained, security, performance, and requirements of remote cloud storage design.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.