Open Access   Article Go Back

A Survey on Assured Data Deletion in Cloud Storage

Seema B. Joshi1 , Shaileshkumar D. Panchal2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 548-553, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.548553

Online published on Jun 30, 2019

Copyright © Seema B. Joshi, Shaileshkumar D. Panchal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Seema B. Joshi, Shaileshkumar D. Panchal, “A Survey on Assured Data Deletion in Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.548-553, 2019.

MLA Style Citation: Seema B. Joshi, Shaileshkumar D. Panchal "A Survey on Assured Data Deletion in Cloud Storage." International Journal of Computer Sciences and Engineering 7.6 (2019): 548-553.

APA Style Citation: Seema B. Joshi, Shaileshkumar D. Panchal, (2019). A Survey on Assured Data Deletion in Cloud Storage. International Journal of Computer Sciences and Engineering, 7(6), 548-553.

BibTex Style Citation:
@article{Joshi_2019,
author = {Seema B. Joshi, Shaileshkumar D. Panchal},
title = {A Survey on Assured Data Deletion in Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {548-553},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4589},
doi = {https://doi.org/10.26438/ijcse/v7i6.548553}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.548553}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4589
TI - A Survey on Assured Data Deletion in Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Seema B. Joshi, Shaileshkumar D. Panchal
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 548-553
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
332 327 downloads 109 downloads
  
  
           

Abstract

With the rapid growth of cloud computing technology, more and more users store and share their data through cloud storage. Major concern is the inadvertent exposure of sensitive data of potential cloud users. Sometimes the cloud server may not delete the data honestly for financial intensives so that data deletion becomes a security challenge. Sometimes unintended disclosure leads to heavy financial penalties and reputational damage. The traditional approach to this problem is encryption of the data before outsourcing and destruction of the encryption key when detecting. Moreover, most of the existing methods can be summarized with the one-bit-return protocol. In which, cloud storage server deletes the data and returns one-bit as a result either 0 or 1 means failure/success. Sometimes this result misguides the user, but user has to believe the returned result because user can not verify it. As userslose their direct control over their data in cloud storage. Hence, assured data deletion is highly required in cloudstorage. In this paper, we aim to analyze assured deletion methods for the cloud, identifying the cloud features that pose a threat to assured deletion and described various assured deletion challenges.

Key-Words / Index Term

Assured data deletion, User assurance, Cloud storage, Cloud security

References

[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology”, NIST Special Publication, Vol. 145, pp. 7, 2011.
[2] G. Edition, “The Changing Face of Data Security 2019 Thales Data Threat Report”, 2019.
[3] P. Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory”, 6th USENIX Security Symposium Proceedings, pp. 22-25 July, 1996, San Jose, California, 1996.
[4] Mather, Tim and Kumaraswamy, Subra and Latif, Shahed, “Cloud security and privacy: an enterprise perspective on risks and compliance”, O`Reilly Media, Inc., Sebastopol, CA, 2009.
[5] Garfinkel, S.L., Shelat, A., “Remembrance of data passed: A study of disk sanitization practices”, IEEE Security and Privacy, Vol. 1(1), pp. 17-27, 2003.
[6] T. Waizenegger, F. Wagner, “SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store”, Proc. 20th International Conference on Extending Database Technology (EDBT), ISBN 978-3-89318-073-8, pp. 550–553, 2017.
[7] K. M. Ramokapane and J. M. Such, “Assured Deletion in the Cloud: Requirements, Challenges and Future Directions”,Proceedings of the 2016 ACM on Cloud Computing Security Workshop, pp. 97-108, NY, USA, 2016.
[8] Y. Luo and D. Wang, “Enabling Assured Deletion in the Cloud Storage by Overwriting”, Proceedings of the 4th ACM International Workshop on Security in Cloud Computing,pp. 17–23, NY, USA, 2016.
[9] F. Hao, D. Clarke, and A. F. Zorzo, “Deleting Secret Data with Public Verifiability,”IEEE Transactions on Dependable and Secure Computing, vol. 13, Issue. 6, pp. 617-628, 2015.
[10] S. Renuga, S. S. K. Jagetheeshwari, “Efficient Privacy-Preserving DataSanitization over Cloud Using Optimal GSA Algorithm”,The Computer Journal, Vol. 61, Issue 10, pp. 1577–1588, 2018.
[11] B. Chen, S. Jia, L. Xia, and P. Liu, “Sanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media”,Proceedings of the 32nd Annual Conference on Computer Security Applications, ISBN: 978-1-4503-4771-6,pp. 496-507, California, USA, 2016.
[12] C. Y. B, J. Wang, X. Tao, and X. Chen, “Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage”, Information and Communications Security, Springer International Publishing, pp 445-458, Vol. 11149, 2018.
[13] C. Cachin, “Policy-based Secure Deletion”, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 259-270, Berlin, Germany, 2013.
[14] J. Reardon and H. Ritzdorf, “Secure Data Deletion from Persistent Media”,Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 271-284, Berlin, Germany, 2013.
[15] N. P. Karvelas and A. Kiayias, “Efficient Proofs of Secure Erasure”, Security and Cryptography for Networks, Springer Cham, pp. 520-537, Vol. 8642, 2014.
[16] M. Miao, J. Wang, J. Ma, and W. Susilo, “Publicly verifiable databases with efficient insertion / deletion operations”Journal of Computer and System Sciences archive, Vol. 86, Issue C, pp. 49-58, 2017.
[17] J. Reardon, D. Basin, and S. Capkun, “SoK : Secure Data Deletion”, 2013 IEEE Symposium on Security and Privacy, IEEE, pp. 1-15, Berkeley, CA, USA, 2013.
[18] J. Xiong et al., “A secure data self-destructing scheme in cloud computing”, IEEE Transactions on Cloud Computing, Vol. 2, Issue: 4, pp. 448-458, 2014.
[19] S. Ahmad and M. M. Afzal, “A Review of Assured Data Deletion Mechanism in Cloud Computing”, International Journal of Engineering & Technology, Vol. 7, pp. 329–332, 2018.
[20] H. Mu and Y. Li, “An assured deletion scheme for encrypted data in Internet of Things”, Advances in Mechanical Engineering, Vol. 11, No. 2, pp. 1–11, 2019.
[21] F. Shan et al., “An Attribute-Based Assured Deletion Scheme in Cloud Computing”, International Journal of Information Technology and Web Engineering (IJITWE), Vol.14, no. 2, pp. 74–91, 2019.
[22] A. Bentajer, M. Hedabou, K. Abouelmehdi, and S. El Fezazi, “An IBE-based design forassured deletion in cloud storage”, Journal Cryptologia, Taylor and Francis,Vol. 43, Issue. 3, pp. 1-12, 2019.
[23] D. Zhong, S. P. Liang, H. Xinfeng, D. U. Ruizhong, S. H. I. Pengliang, and H. E. Xinfeng, “Cloud data assured deletion scheme based on overwrite verification”,Journal on Communications, Vol. 40, Issue: 1,pp. 130-140, 2019.
[24] S. M. Diesburg and A. A. Wang, “A Survey of Confidential Data Storage and Deletion Methods”, ACM Computing Surveys (CSUR) Surveys, Vol. 43, Issue: 1, 2010.
[25] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Vol. 2014, Volume 2014, Article ID 190903, 2014.
[26] L. Xue, Y. Yu, Y. Li, M. H. Au, X. Du, and B. Yang, “Efficient Attribute-based Encryptionwith Attribute Revocation for Assured Data Deletion”,Information Sciences, Vol. 479, pp. 640-650, 2018.
[27] Yang, X. Chen, and Y. Xiang, “Blockchain-Based Publicly Verifiable Deletion Scheme for Cloud Storage”, Journal of Network and Computer Applications, Vol. 103, pp. 185-193, 2018.