Downloads: 121 | Views: 247
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10
A Survey on Self-Destruction of Data Using Active Storage
Avinash P. Khadse, Prof. Pravin D. Soni
Abstract: With the development of cloud based application, cloud services are becoming more and more important for peoples life. People are requested to submit or post some personal private information to the Cloud by the Internet. When people do this, they thought that service provider let secure their private data. By emerging cloud technology maximum applications are using cloud interface, and people usually trust all the cloud services, users generally stores their personal information on cloud. Later that information can be cached, copy, archived by the CSPs (Cloud Service Provider). Self destructing data is considering as spy proof future of the internet, by using this data is like a time bomb on the network, it means that after certain time interval. Primarily self destruction of data was introduced on DHT (Distributed Hash Table), since low cost Sybil attack on DHT are the problems. Self destructing data is now on active storage framework (SeDas) because it giving higher security and performance. Also uploading and downloading of the file having very poor performance especially with the large files. This paper is going to address these two problems so that privacy can be achieved in public network.
Keywords: Self Destruction of Data, Cryptography, Active Storage
Edition: Volume 3 Issue 12, December 2014
Pages: 1034 - 1037
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1362 - 1373Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan