MUMBAI, India, Feb. 27 -- Intellectual Property India has published a patent application (202641017020 A) filed by Dr. N. G. P. Institute Of Technology, Coimbatore, Tamil Nadu, on Feb. 16, for 'cloud security using crypto-shedding for secure data deletion.'

Inventor(s) include Dr. Rajalakshmi Somasundaram; Dr. Gokulraj Sundhararajan; Mr. Selvakumar Nagaraj; Ms. Darshana Ravi; Mr. Gowtham Raja; and Ms. Thevi Varshaa Manova Diamond.

The application for the patent was published on Feb. 27, under issue no. 09/2026.

According to the abstract released by the Intellectual Property India: "Cloud Security Using Crypto-Shedding for Secure Data Deletion 2.Abstract Cloud computing has become a dominant platform for data storage, processing, and management due to its scalability, flexibility, and cost-effectiveness. Organizations and individuals increasingly rely on cloud service providers to handle sensitive and large-scale data. However, secure data deletion remains a critical concern in cloud environments because users do not have direct physical control over storage infrastructure. Even after users delete their files, data remnants may continue to exist in backup systems, replicated servers, or residual storage blocks.Traditional data deletion techniques, such as overwriting or physical destruction, are difficult to implement effectively in distributed cloud systems. Multi-tenancy, virtualization, and data replication further complicate secure erasure. As a result, deleted data may still be recoverable using forensic recovery tools, posing significant risks to privacy and confidentiality. This challenge becomes even more serious when dealing with regulatory requirements such as data protection laws and the right to be forgotten.Crypto-shredding offers an efficient and reliable solution to this problem. Instead of physically deleting data, the method encrypts all stored information and ensures that secure deletion is achieved by permanently destroying the corresponding encryption keys. Once the cryptographic keys are erased, the encrypted data becomes unreadable and computationally infeasible to recover. This approach ensures effective data destruction without requiring direct access to physical storage devices.The architecture of crypto-shredding includes strong encryption algorithms, secure key generation mechanisms, and robust key management systems. Proper key lifecycle management including creation, storage, rotation, and destruction is essential to maintain security. When a deletion request is initiated, the system securely destroys the encryption keys, ensuring irreversible data loss.Crypto-shredding provides multiple advantages such as improved scalability, reduced operational cost, enhanced compliance with data protection regulations, and faster deletion processes. It supports secure multi-tenant cloud environments and strengthens overall data confidentiality and integrity. By integrating encryption and secure key destruction, crypto-shredding establishes a practical framework for ensuring verifiable and secure data deletion in modern cloud infrastructures. Keywords Cloud Security, Crypto-Shredding, Secure Data Deletion, Encryption Key Management, Data Privacy, Cloud Computing."

Disclaimer: Curated by HT Syndication.