Assured data deletion in cloud computing: security analysis and requirements

نویسندگان

چکیده

With the rapid development of cloud storage, more data owners store their on remote to reduce heavy local storage overhead. Cloud provides clients with a space that they may outsource and use pay-as-you-go basis. Due ownership separation management, lose control over data. Hence, all operations outsourced such as transfer, update, deletion, will be executed by server. As result that, various security challenges appear in terms privacy integrity. In addition deletion becomes an important challenge, once user intends delete his data, it must sure is deleted from sources prevent server reserving maliciously for economic interests. this paper, we present discuss several types research different technologies solve assured problems verification result. The paper also presents thorough analysis surveyed protocols fine-grained, security, performance, requirements design.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Security Issues & Requirements in Cloud Computing

The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...

متن کامل

Data Security Issues & Requirements in Cloud Computing

The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...

متن کامل

Data Security Issues & Requirements in Cloud Computing

The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on management and ownership of data. To establish the client’s trust in cloud services, we stil...

متن کامل

Assured Cloud-Based Data Analysis with ClusterBFT

The shift to cloud technologies is a paradigm change that offers considerable financial and administrative gains. However governmental and business institutions wanting to tap into these gains are concerned with security issues. The cloud presents new vulnerabilities and is dominated by new kinds of applications, which calls for new security solutions. Intuitively, Byzantine fault tolerant (BFT...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v28.i2.pp1174-1183