Efficient cloud security practices with privacy preserving access control schemes and secure outsourced data deletion

Abstract

The proliferation of cloud computing technology has led to a newlinegrowing trend among organizations and users to utilize cloud storage for the newlinepurpose of simple data storage and sharing. Nevertheless, the privacy and newlinesecurity of data may be exposed when it is stored within a third-party cloud newlinestorage service provider. The practice of outsourcing data to cloud servers newline(CS) has the potential to greatly diminish the administrative costs and storage newlineresponsibilities faced by both people and business ventures. newlineEnsuring the secure deletion of sensitive data stored in the cloud is newlinea crucial necessity when such data is no longer required. The ensured deletion newlineof data in cloud storage is faced with numerous challenges due to several newlineprominent characteristics, including virtualization, multi-tenancy, high newlineavailability, and platform complexity. These challenges must be effectively newlineaddressed in order to ensure the successful deletion of data. Consumers have newlinean expectation that when they initiate a deletion request for their data, the data newlinewould become permanently unreachable. newlineHowever, consumers are uncertain about the capability of the newlineCloud Service Provider (CSP) to effectively execute the deletion process to newlineprevent any potential data leakage. Hence, despite the encryption of data as newlineciphertext within the CSP, an inherent risk remains that cannot be avoided. As newlinean illustration, the CSP may opt to transfer data to various cloud storage newlineservers in order to guarantee a promising level of accessibility. newlineemove all existing backups of the data.

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced