A Review of Assured Data Deletion Mechanism in Cloud Computing

  • Authors

    • Sultan Ahmad
    • Dr. Mohammad Mazhar Afza
    2018-09-22
    https://doi.org/10.14419/ijet.v7i4.5.20101
  • Cloud Computing, Data Security, Data Deletion, Data sanitization, Assured Deletion, Data Retrival.
  • As Cloud Computing has become a new way to store information remotely. It makes possible for many companies to become paperless. IT people and companies can outsource their huge data by using this emerging technology. The major important characteristics of cloud computing are on-demand self-service, broad network access, resource pooling, rapid elasticity and measured services. These cloud computing characteristics are helpful for organizations to become agile. Also there are few serious problems like security, scalability, availability and interoperability which are associated with the above cloud computing characteristics. Providing a secure and efficient access and retrieval of the valuable data is a main concern of cloud computing technologies. It is very important to protect data and credentials of cloud client on the internet. Apart from these security issues of data, the deletion of data on cloud storage is also a very serious issue nowadays.  Once a cloud user wants to delete his data, it must be sure that data actually deleted from all cloud storage sources and there should not be remain any copy of data exist at anywhere in cloud storage anyway. In this paper, different existing data deletion and retrieval methods are studied, observed and analyzed. The importance and related challenges to assured data deletion on the cloud storage are explored.

     

     

  • References

    1. [1] P. Mell and T. Grance, “The NIST definition of cloud computing,†2011; http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

      [2] J. Reardon, D. Basin, and S. Capkun, “Sok: Secure data deletion,†in Security and Privacy (SP), IEEE Symposium on pages 301-315, 2013.

      [3] J. Reardon, H. Ritzdorf, D. Basin, and S. Capkun, “Secure data deletion from persistent media,†in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 271 - 284, 2013.

      [4] P. Gutmann, “Secure deletion of data from magnetic and solid state memory,†in Proc. Of USENIX security Symposium, 1996.

      [5] Junping Liu, ke Zhou, Liping Pang, Zhilum wang, Yuhui Deng and Den Feng, “ A novel cost effective scrubbing scheme,†in Fifth International joint conference on INC, ISM and ISC 2009.

      [6] R. Perlman, “ File system design with assured delete,†in Security in Storage Workshop, 2005. SISW '05, Third IEEE International, 2005.

      [7] Y. Tang, P. P. Lee, J. C. Lui, and R. Perlman, “ Fade:Secure overlay cloud storage with file assured deletion,†in Security and Privacy in Communication Networks, pages 380-397. Springer, 2010.

      [8] Rahumed, H. Chen, Y. Tang, P. Lee, and J. Lui, “ A secure cloud backup system with assured deletion and version controlâ€, in Parallel Processing Workshops (ICPPW), 2011, 40th International Conference on, pages 160–167, 2011.

      [9] Cachin, K. Haralambiev, H.-C. Hsiao, and A. Sorniotti, “ Policy-based secure deletion,†in Proceedings of the 2013, ACM SIGSAC Conference on Computer & Communications Security, CCS ’2013, pages 259–270, New York, NY, USA, 2013.

      [10] R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self-destructing data,†in USENIX Security Symposium, pages 299–316, 2009.

      [11] Z. Mo, Y. Qiao, and S. Chen, “Two-party fine-grained assured deletion of outsourced data in cloud system,†in Distributed Computing Systems (ICDCS), 2014, IEEE 34th International Conference on, pages 308–317, 2014.

      [12] M. Barhamgi, A. K. Bandara, Y. Yu, K. Belhajjame,and B. Nuseibeh, "Protecting privacy in the cloud: Current practices, future directions" in IEEE Computer, 2016.

      [13] Digital Ocean. Data leakage, 2013 (accessed Dec 19, 2017).

      [14] https://www.digitalocean.com/company/blog/ resolved-lvm-data-issue/

      [15] OpenStack. Data privacy concerns, 2017 (accessed December, 2017)

      [16] https://docs.openstack.org/security-guide/tenant-data/data-privacy-concerns.html.

      [17] Amazon Simple Storage Service (S3) (accessed Dec, 2017)

      [18] https://aws.amazon.com/s3/faqs/#storage-management (accessed December, 2017)

      [19] The National Cyber Security Centre, Guidance on Secure sanitization of storage media (accessed Dec, 2017) https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media.

  • Downloads

  • How to Cite

    Ahmad, S., & Mohammad Mazhar Afza, D. (2018). A Review of Assured Data Deletion Mechanism in Cloud Computing. International Journal of Engineering & Technology, 7(4.5), 329-332. https://doi.org/10.14419/ijet.v7i4.5.20101