Secure data deletion in cloud storage: a survey Online publication date: Thu, 19-Mar-2020
by Minyao Hua; Yinyuan Zhao; Tao Jiang
International Journal of Embedded Systems (IJES), Vol. 12, No. 2, 2020
Abstract: With the rapid development of cloud computing, individual people, firms, industries and governments are moving their data to clouds to meet the data explosion challenge. Secure data deletion is becoming a hot issue in cloud storage research. Different from traditional data deletion, the securely deleted data should be non-recoverable. In this paper, we present a survey of current secure data deletion technologies and make comparisons of them for both private cloud storage and public cloud storage. For private cloud storage, we introduce two main deletion methods: physical destruction and disk replication. For public cloud storage, we analyse the existing deletion methods such as balanced-tree-based, trusted-third-parties-based, policy-based secure data deletion methods and so on, in accordance with the two aspects of verifiable secure data deletion and verifiable non-recoverability of data. Finally, we analyse the deficiencies among current researches and propose some future directions for improvement in secure data deletion.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Embedded Systems (IJES):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com