Open Access
Subscription Access
Open Access
Subscription Access
Cloud Storage Assured Deletion: Considerations and Schemes
Subscribe/Renew Journal
The assured deletion problem was realized with the introduction of cloud data storage. An exemplar of the broader set of cloud services, assured deletion is poorly understood by customers and complicates the work of forensic professionals. Over the last ten years, schemes that solve the assured deletion problem have been proposed. Proposed solutions have improved on each other to mitigate scaling overhead, trusted third parties, bottlenecks, single points of failure, and other inefficiencies. Cloud service providers have an opportunity to provide customers verifiable proof of deletion. In this work, we focus on the problem of how cloud data storage customers can be assured that when they attempt to delete data from the cloud, it is not retrievable. Just as CSP’s offer technologies that simplify storage operations, providing an assured deletion service could serve as a differentiator.
Keywords
Assured Deletion, Cloud Computing, Cloud Storage, Provable Data Deletion, Secure Deletion.
Subscription
Login to verify subscription
User
Font Size
Information
- Y. Luo, M. Xu, S. Fu, and D. Wang, “Enabling assured deletion in the cloud storage by overwriting,” in Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (SCC’16), Xi’an, China, pp. 17-23, May 2016.
- Z. Mo, Q. Xiao, Y. Zhou and S. Chen, “On deletion of outsourced data in cloud computing,” 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, pp. 344-351, 2014.
- A. Pichan, M. Lazarescu, and S. T. Soh, “Cloud forensics: Technical challenges, solutions and comparative analysis,” Digital Investigation, vol. 13, pp. 38-57, 2015.
- J. Reardon, D. Basin and S. Capkun, “SoK: Secure data deletion,” 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 301-315, 2013.
- K. M. Ramokapane, A. Rashid, and J. M. Such, “Assured deletion in the cloud: Requirements, challenges and future directions,” in Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW’16), Vienna, Austria, pp. 97-108, October 2016.
- Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, November-December 2012.
- S. Tanimoto, M. Hiramoto, M. Iwashita, H. Sato, and A. Kanai, “Risk management on the security problem in cloud computing,” 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, Jeju Island, pp. 147-152, 2011.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in M. Backes, and P. Ning (eds.), Computer Security - ESORICS 2009, ESORICS 2009, Lecture Notes in Computer Science, vol. 5789, Springer, Berlin, Heidelberg, 2009.
- P. Mell, and T. Grance, “Draft NIST working definition of cloud computing,” 2009. Available: http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
Abstract Views: 238
PDF Views: 1