Абстрактный

Time Constrained Data Destruction in Cloud

S. Christina Suganthi Monica, M.Subasini

Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users’ authorization and control. Time constrained data helps to protect all the data, by destructing it after the specific timeout . In addition, the decryption key is destructed after the user-specified time. In this paper, we present, a time constrained data system that meets this challenge through a novel integration of cryptographic techniques with active storage techniques .Time constrained data system are used to meet all the privacy-preserving goals. Compared to the system without time constrained data mechanism, throughput for uploading and downloading with the proposed timeout data acceptably decreases by less than 72%, while latency for upload/download operations with time constrained data mechanism increases by less than 60%.

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше