Indonesian Journal of Electrical Engineering and Computer Science Vol. 28, No. 2, November 2022, pp. 1174~1183 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v28.i2.pp1174-1183 1174 Journal homepage: http://ijeecs.iaescore.com Assured data deletion in cloud computing: security analysis and requirements Kawa Qambar Aziz 1 , Baban Ahmed Mahmood 2 1 Department of Computer Sciences, University of Kirkuk, College of Computer Sciences and Information Technology, Kirkuk, Iraq 2 Network Department, University of Kirkuk, College of Computer Sciences and Information Technology, Kirkuk, Iraq Article Info ABSTRACT Article history: Received May 12, 2022 Revised Jul 28, 2022 Accepted Aug 30, 2022 With the rapid development of cloud storage, more data owners store their data on the remote cloud to reduce the heavy local storage overhead. Cloud storage provides clients with a storage space that they may outsource and use on a pay-as-you-go basis. Due to data ownership separation and management, local data owners lose control over their data. Hence, all the operations over the outsourced data such as data transfer, update, and deletion, will be executed by the remote cloud server. As a result of that, various security challenges appear in terms of data privacy and integrity. In addition to data deletion that becomes an important security challenge, once a cloud user intends to delete his data, it must be sure that data is deleted from all cloud storage sources and prevent the cloud server from reserving the data maliciously for economic interests. In this paper, we present and discuss several types of research that use different technologies to solve assured deletion problems and verification the deletion result. The paper also presents a thorough analysis of the surveyed protocols in terms of fine- grained, security, performance, and requirements of remote cloud storage design. Keywords: Assured deletion Cloud security Cryptography Deletion verification Overwriting This is an open access article under the CC BY-SA license. Corresponding Author: Baban Ahmed Mahmood Network Department, College of Computer Sciences and Information Technology, University of Kirkuk Kirkuk, Iraq Email: baban.mahmoodjaf@gmail.com 1. INTRODUCTION Cloud computing is an online service model that provides efficient storage, programming tools, computing services, and so on, in a pay-as-you-go manner [1], [2]. Clients and organizations utilize cloud computing programs without having to install or maintain them and store their data remotely to access them from any computer with internet connectivity at any time to lower the cost of data storage and administration [3][5]. With the rapid growth of data due to the development of modern technology, the demand for secure and efficient cloud storage is growing [6], [7]. In spite of the wide acceptance of cloud computing as a promising service model, the inability to control remotely stored data directly caused large concerns before migrating towards the cloud in various data security issues [8], [9]. These security issues can be classified as follows: i) Data confidentiality which is about protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft [10][12]. ii) Data integrity which verifies that data remains unaltered during transmission and storing, and the provider doesn't lose user data due to hardware failure, human mistakes or external intrusion. Integrity is a measure of the validity of stored data [13][15]. iii) Access control is a security technique that regulates what resources can be viewed or used in computing environments and specifies the authorized user to access the stored data [16][18].