Efficient cloud security practices with privacy preserving access control schemes and secure outsourced data deletion
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The proliferation of cloud computing technology has led to a
newlinegrowing trend among organizations and users to utilize cloud storage for the
newlinepurpose of simple data storage and sharing. Nevertheless, the privacy and
newlinesecurity of data may be exposed when it is stored within a third-party cloud
newlinestorage service provider. The practice of outsourcing data to cloud servers
newline(CS) has the potential to greatly diminish the administrative costs and storage
newlineresponsibilities faced by both people and business ventures.
newlineEnsuring the secure deletion of sensitive data stored in the cloud is
newlinea crucial necessity when such data is no longer required. The ensured deletion
newlineof data in cloud storage is faced with numerous challenges due to several
newlineprominent characteristics, including virtualization, multi-tenancy, high
newlineavailability, and platform complexity. These challenges must be effectively
newlineaddressed in order to ensure the successful deletion of data. Consumers have
newlinean expectation that when they initiate a deletion request for their data, the data
newlinewould become permanently unreachable.
newlineHowever, consumers are uncertain about the capability of the
newlineCloud Service Provider (CSP) to effectively execute the deletion process to
newlineprevent any potential data leakage. Hence, despite the encryption of data as
newlineciphertext within the CSP, an inherent risk remains that cannot be avoided. As
newlinean illustration, the CSP may opt to transfer data to various cloud storage
newlineservers in order to guarantee a promising level of accessibility.
newlineemove all existing backups of the data.