Journal on Communications ›› 2016, Vol. 37 ›› Issue (8): 167-184.doi: 10.11959/j.issn.1000-436x.2016167

• Comprehensive Review • Previous Articles     Next Articles

Research progress on cloud data assured deletion based on cryptography

Jin-bo XIONG1,2,Feng-hua LI1,Yan-chao WANG1,Jian-feng MA3,Zhi-qiang YAO2   

  1. 1.State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;2.Faculty of Software,Fujian Normal University,Fuzhou 350117,China;3.School of Computer Science and Technology,Xidian University,Xi'an 710071,China
    1 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 Faculty of Software,Fujian Normal University,Fuzhou 350117,China
    3 School of Computer Science and Technology,Xidian University,Xi'an 710071,China
  • Online:2016-08-25 Published:2016-09-01
  • Supported by:
    The National High Technology Research and Development Program(863Progam);The National Natural Science Foundation of China;The National Natural Science Foundation of China;No.2015J05120;Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund;Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province

Abstract:

The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.

Key words: cloud data security, assured deletion, privacy protection, key management,access control

No Suggested Reading articles found!