Research progress on cloud data assured deletion based on cryptography
The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in clou...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016167/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539208939831296 |
---|---|
author | Jin-bo XIONG Feng-hua LI Yan-chao WANG Jian-feng MA Zhi-qiang YAO |
author_facet | Jin-bo XIONG Feng-hua LI Yan-chao WANG Jian-feng MA Zhi-qiang YAO |
author_sort | Jin-bo XIONG |
collection | DOAJ |
description | The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced. |
format | Article |
id | doaj-art-8233e13d57b74011a57aa2bd73dd4ad5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8233e13d57b74011a57aa2bd73dd4ad52025-01-14T07:25:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-08-013716718459702999Research progress on cloud data assured deletion based on cryptographyJin-bo XIONGFeng-hua LIYan-chao WANGJian-feng MAZhi-qiang YAOThe major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016167/cloud data securityassured deletionprivacy protectionkey management,access control |
spellingShingle | Jin-bo XIONG Feng-hua LI Yan-chao WANG Jian-feng MA Zhi-qiang YAO Research progress on cloud data assured deletion based on cryptography Tongxin xuebao cloud data security assured deletion privacy protection key management,access control |
title | Research progress on cloud data assured deletion based on cryptography |
title_full | Research progress on cloud data assured deletion based on cryptography |
title_fullStr | Research progress on cloud data assured deletion based on cryptography |
title_full_unstemmed | Research progress on cloud data assured deletion based on cryptography |
title_short | Research progress on cloud data assured deletion based on cryptography |
title_sort | research progress on cloud data assured deletion based on cryptography |
topic | cloud data security assured deletion privacy protection key management,access control |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016167/ |
work_keys_str_mv | AT jinboxiong researchprogressonclouddataassureddeletionbasedoncryptography AT fenghuali researchprogressonclouddataassureddeletionbasedoncryptography AT yanchaowang researchprogressonclouddataassureddeletionbasedoncryptography AT jianfengma researchprogressonclouddataassureddeletionbasedoncryptography AT zhiqiangyao researchprogressonclouddataassureddeletionbasedoncryptography |