2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) 2017
DOI: 10.1109/wits.2017.7934624
|View full text |Cite
|
Sign up to set email alerts
|

Survey on data remanence in Cloud Computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Data remanence may be discovered by computer forensics and other various techniques. In addition, it is possible to find and recover files that might have been removed from a computer [103]. Cloud providers have not fully addressed data remanence, and this issue is even ignored by some cloud providers, even though it is one of the most critical issues.…”
Section: Open Challengesmentioning
confidence: 99%
“…Data remanence may be discovered by computer forensics and other various techniques. In addition, it is possible to find and recover files that might have been removed from a computer [103]. Cloud providers have not fully addressed data remanence, and this issue is even ignored by some cloud providers, even though it is one of the most critical issues.…”
Section: Open Challengesmentioning
confidence: 99%
“…When one of these operations is carried out, there is a risk that the data are still resident in memory, and thus can be retrieved even after it appears that the data has been deleted or moved from the system. This can lead to the data falling in the hands of a malicious user [23]. In addition, data are typically stored in backup servers, so when data are deleted from the primary cloud server, CPSs must intentionally execute a delete operation on the data stored in the backup server so as to delete copies of the data [5].…”
Section: Data Remanence From Deletion and Movement Of Datamentioning
confidence: 99%
“…• Data sanitization is used for preventing data remanence (leakage) that might occur from the data deletion or from data movement [23].…”
Section: Key Takeaways From a Cloud Security Standpointmentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers may be able to retrieve the residual data from servers. The data remanance is the major threat for sensitive data in cloud the cloud providers doesn't widely concentrate on the secure data deletion due to huge cost and time [2].…”
Section: Data Remanancementioning
confidence: 99%