A Review of Assured Data Deletion Security Techniques in Cloud Storage

Authors

  • Sozan Mohammed Khudaier Department of Computer Science, College of Computer Science and Information Technology, Kirkuk University, Kirkuk, Iraq https://orcid.org/0000-0001-6578-1002
  • Baban Ahmed Mahmood Department of Networks, College of Computer Science and Information Technology, Kirkuk University, Kirkuk, Iraq

DOI:

https://doi.org/10.24996/ijs.2023.64.5.33

Keywords:

Cloud Computing, Cloud Storage, Assured And Secure Data Deletion, Provable Data Deletion

Abstract

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storage has grown in popularity, and the problem of ensured deletion has been solved. Several schemes to overcome the assured deletion problem have been proposed over the last few years. The proposed solutions have addressed the scaling overhead, trusted third parties, delays, single points of failure, and other inefficiencies. Customers had the option of receiving verifiable proof of deletion from cloud service providers. This article focuses on the issue of how cloud data storage clients may be confident that the deleted data from the cloud cannot be recovered. Furthermore, it discusses the practice of secure deletion. Moreover, the paper explores currently used methods to achieve the security of assuring the deletion of data faced by cloud entities such as cloud service providers, data owners, and cloud users. After that, the paper analyzes techniques to find the pros and cons of assured deletion and the problems that were solved by these techniques. Finally, the paper identifies some future directions for the development of assured deletion of cloud storage.

Downloads

Published

2023-05-30

Issue

Section

Computer Science

How to Cite

A Review of Assured Data Deletion Security Techniques in Cloud Storage. (2023). Iraqi Journal of Science, 64(5), 2492-2511. https://doi.org/10.24996/ijs.2023.64.5.33

Similar Articles

11-20 of 1033

You may also start an advanced similarity search for this article.