Modified Secure Storage and Erasure (SSE) Protocol for Deleting Secret Data

Gunagayathri Praseetha*, Sabarinathan E.**
*-** CMS College of Engineering, Namakkal, Tamil Nadu, India, India.
Periodicity:July - December'2021
DOI : https://doi.org/10.26634/jcc.8.2.15218

Abstract

Cloud computing shares data and processing for organizations from remote locations. Though authenticated systems are in place, hackers access secured data and delete or modify it. All current software-based verification can be processed with one-bit-return protocol: the delete sequence achieves data destruction causing revenue loss or system catastrophe. In certain cases, a deleted record in the cloud, could be salvaged by a hacker. This is especially challenging when the deletion database is compressed within a Trusted Platform Module (TPM) and the user does not have access to the private code. This paper, discusses how to clear hidden data using public authentication. The key indication in this proposal is based on a “trust-but-verify” pattern, which is usually relevant to many security glitches but was fundamentally despicable in the area of deleting protected data. The objective is that the deleted record must be purged permanently from the database. Finally, some evidence to determine its feasibility of SSA has also been discussed.

Keywords

Cloud Computing, Secure Storage and Erasure (SSE), Trusted Platform Module (TPM), Cloud Storage Server (CSS).

How to Cite this Article?

Praseetha, G., and Sabarinathan, E. (2021). Modified Secure Storage and Erasure (SSE) Protocol for Deleting Secret Data. i-manager’s Journal on Cloud Computing, 8(2), 18-22. https://doi.org/10.26634/jcc.8.2.15218

References

[1]. Agalya, R. V., & Lekshmi, K. K. (2014). A Verifiable Cloud Storage using Attribute Based Encryption and Outsourced Decryption with Recoverability. International Journal of Engineering and Innovative Technology, 3(10), 259-263.
[2]. Balu, A., & Kuppusamy, K. (2010). Ciphertext policy attribute based encryption with anonymous access policy. International Journal of Peer-to-Peer Networks, 1(1), 1-8. https://doi.org/10.5121/ijp2p.2010.1101
[3]. Hao, F., Clarke, D., & Zorzo, A. F. (2015). Deleting secret data with public verifiability. IEEE Transactions on Dependable and Secure Computing, 13(6), 617-629. https://doi.org/10.1109/TDSC.2015.2423684
[4]. Hsu, C. Y., Lu, C. S., & Pei, S. C. (2011, February). Homomorphic encryption-based secure SIFT for privacypreserving feature extraction. In Media Watermarking, Security, and Forensics III (Vol. 7880, pp. 32-48). SPIE.
[5]. Kleek, M. V., & OHara, K. (2014). The future of social is personal: The potential of the personal data store. In Social Collective Intelligence (pp. 125-158). Springer, Cham.
[6]. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131-143. https://doi.org/10.1109/TPDS.2012.97
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.