Assured data deletion in cloud computing: security analysis and requirements
نویسندگان
چکیده
With the rapid development of cloud storage, more data owners store their on remote to reduce heavy local storage overhead. Cloud provides clients with a space that they may outsource and use pay-as-you-go basis. Due ownership separation management, lose control over data. Hence, all operations outsourced such as transfer, update, deletion, will be executed by server. As result that, various security challenges appear in terms privacy integrity. In addition deletion becomes an important challenge, once user intends delete his data, it must sure is deleted from sources prevent server reserving maliciously for economic interests. this paper, we present discuss several types research different technologies solve assured problems verification result. The paper also presents thorough analysis surveyed protocols fine-grained, security, performance, requirements design.
منابع مشابه
Data Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملData Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملData Security Issues & Requirements in Cloud Computing
The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...
متن کاملAssured Cloud-Based Data Analysis with ClusterBFT
The shift to cloud technologies is a paradigm change that offers considerable financial and administrative gains. However governmental and business institutions wanting to tap into these gains are concerned with security issues. The cloud presents new vulnerabilities and is dominated by new kinds of applications, which calls for new security solutions. Intuitively, Byzantine fault tolerant (BFT...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v28.i2.pp1174-1183