Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cloud Storage Assured Deletion: Considerations and Schemes


Affiliations
1 Computer Science Department, St. Mary’s University, San Antonio, Texas, United States
     

   Subscribe/Renew Journal


The assured deletion problem was realized with the introduction of cloud data storage. An exemplar of the broader set of cloud services, assured deletion is poorly understood by customers and complicates the work of forensic professionals. Over the last ten years, schemes that solve the assured deletion problem have been proposed. Proposed solutions have improved on each other to mitigate scaling overhead, trusted third parties, bottlenecks, single points of failure, and other inefficiencies. Cloud service providers have an opportunity to provide customers verifiable proof of deletion. In this work, we focus on the problem of how cloud data storage customers can be assured that when they attempt to delete data from the cloud, it is not retrievable. Just as CSP’s offer technologies that simplify storage operations, providing an assured deletion service could serve as a differentiator.

Keywords

Assured Deletion, Cloud Computing, Cloud Storage, Provable Data Deletion, Secure Deletion.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Y. Luo, M. Xu, S. Fu, and D. Wang, “Enabling assured deletion in the cloud storage by overwriting,” in Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (SCC’16), Xi’an, China, pp. 17-23, May 2016.
  • Z. Mo, Q. Xiao, Y. Zhou and S. Chen, “On deletion of outsourced data in cloud computing,” 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, pp. 344-351, 2014.
  • A. Pichan, M. Lazarescu, and S. T. Soh, “Cloud forensics: Technical challenges, solutions and comparative analysis,” Digital Investigation, vol. 13, pp. 38-57, 2015.
  • J. Reardon, D. Basin and S. Capkun, “SoK: Secure data deletion,” 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 301-315, 2013.
  • K. M. Ramokapane, A. Rashid, and J. M. Such, “Assured deletion in the cloud: Requirements, challenges and future directions,” in Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW’16), Vienna, Austria, pp. 97-108, October 2016.
  • Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, November-December 2012.
  • S. Tanimoto, M. Hiramoto, M. Iwashita, H. Sato, and A. Kanai, “Risk management on the security problem in cloud computing,” 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, Jeju Island, pp. 147-152, 2011.
  • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in M. Backes, and P. Ning (eds.), Computer Security - ESORICS 2009, ESORICS 2009, Lecture Notes in Computer Science, vol. 5789, Springer, Berlin, Heidelberg, 2009.
  • P. Mell, and T. Grance, “Draft NIST working definition of cloud computing,” 2009. Available: http://csrc.nist.gov/groups/SNS/cloud-computing/index.html

Abstract Views: 177

PDF Views: 1




  • Cloud Storage Assured Deletion: Considerations and Schemes

Abstract Views: 177  |  PDF Views: 1

Authors

Richard Thames
Computer Science Department, St. Mary’s University, San Antonio, Texas, United States
Ayad Barsoum
Computer Science Department, St. Mary’s University, San Antonio, Texas, United States

Abstract


The assured deletion problem was realized with the introduction of cloud data storage. An exemplar of the broader set of cloud services, assured deletion is poorly understood by customers and complicates the work of forensic professionals. Over the last ten years, schemes that solve the assured deletion problem have been proposed. Proposed solutions have improved on each other to mitigate scaling overhead, trusted third parties, bottlenecks, single points of failure, and other inefficiencies. Cloud service providers have an opportunity to provide customers verifiable proof of deletion. In this work, we focus on the problem of how cloud data storage customers can be assured that when they attempt to delete data from the cloud, it is not retrievable. Just as CSP’s offer technologies that simplify storage operations, providing an assured deletion service could serve as a differentiator.

Keywords


Assured Deletion, Cloud Computing, Cloud Storage, Provable Data Deletion, Secure Deletion.

References