UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1905630


Registration ID:
209861

Page Number

189-191

Share This Article


Jetir RMS

Title

Deletion of Private Data in Cloud Computing

Abstract

Cloud Computing has been shows their importance in the next-generation architecture of IT Enterprise. It gives centralized large data centers with collection of application software and databases, but in which services offered by the cloud providers may not be fully trustworthy. This leads about many security issues, which gives a challenging work to researcher. Till the date researcher still working to give solutions to such security challenges raised in cloud computing environment. One of the challenge is having confirmation about deleted data. In the traditional cloud environment clients storing the data in the cloud servers and paying as per the agreement did for only the time they use. After the data uploaded in the cloud servers, the client which are the data owners can see the data are properly stored or not in the cloud servers. It is also makes important that data stored in the cloud will be in encrypted format because either public cloud service providers or the other users storing data on the same server are not trusted. With the encryption of data now a days a new problems arises about the deletion of data. As user deletion will work with one-bit-return protocol: deletion program delete the data and comes with one bit answer as success or failure. This one-bit-return protocol turns the system as black box, where user needs to trust on cloud provider about deletion of data. In this paper we are presenting the data deletion process more transparent, secure and verifiable. In our proposed system we will ensure that faithful deletion of data. We also proposed the correct implementation of the data with ensured deletion of all related keys.

Key Words

Cloud Service Provider, faithful deletion, verifiability, encryption

Cite This Article

"Deletion of Private Data in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.189-191, May-2019, Available :http://www.jetir.org/papers/JETIR1905630.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Deletion of Private Data in Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp189-191, May-2019, Available at : http://www.jetir.org/papers/JETIR1905630.pdf

Publication Details

Published Paper ID: JETIR1905630
Registration ID: 209861
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 189-191
Country: Nashik, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002950

Print This Page

Current Call For Paper

Jetir RMS