Open Access Open Access  Restricted Access Subscription Access

Application of Data Self-Destructing System Online


 

Fast growing Internet leads to the question of security of information uploaded or stored online. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSP's), often without users authorization and control. Aim of self-destructing data is to protect private personal data. All the data and their copies become scribbled after a user-specified time, without any user intervention. In this system we are using a shamir's secret share algorithm for making the system more effective for the privacy purpose. The shamir algorithm splits the session key generated and passes that key to server and the client. In this system any type of information transfer is not done. So the user's data privacy is maintained. Active storage framework is used to store this data so the system is called SEDAS (self destructing data storage using active storage framework).

Through functionality and security properties evaluations of the SeDas prototype, the results demonstrate that SeDas is practical to use and meets all the privacy- preserving goals described. Compared to the system with self-destructing data mechanism.

 


Keywords

privacy, CSP (Cloud Service Providers), prototype, SeDas
User
Notifications
Font Size

Abstract Views: 177

PDF Views: 0




  • Application of Data Self-Destructing System Online

Abstract Views: 177  |  PDF Views: 0

Authors

Abstract


Fast growing Internet leads to the question of security of information uploaded or stored online. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSP's), often without users authorization and control. Aim of self-destructing data is to protect private personal data. All the data and their copies become scribbled after a user-specified time, without any user intervention. In this system we are using a shamir's secret share algorithm for making the system more effective for the privacy purpose. The shamir algorithm splits the session key generated and passes that key to server and the client. In this system any type of information transfer is not done. So the user's data privacy is maintained. Active storage framework is used to store this data so the system is called SEDAS (self destructing data storage using active storage framework).

Through functionality and security properties evaluations of the SeDas prototype, the results demonstrate that SeDas is practical to use and meets all the privacy- preserving goals described. Compared to the system with self-destructing data mechanism.

 


Keywords


privacy, CSP (Cloud Service Providers), prototype, SeDas