Enhancing Security in Cloud by Self Destruction Mechanism
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)Publication Date: 2015-01-05
Authors : Kshama D. Bothra; Sudipta Giri;
Page : 523-525
Keywords : Cloud computing; self-destruction; Active Storage Object; Time to live ttl; data privacy;
Abstract
Cloud computing, a recent computing technology entirely changed the IT industry. Large amount of data can be stored in cloud storage system. Security is the prime concern for this large amount of data. Without, knowledge of authorized client, data can be viewed by other user. This data contain personal information like, account number, password and notes. All the data and their copies become self-destructed after user specified time, without any user intervention. Shamir secret sharing algorithm is used, which generates a pair of keys. Self-destruction method is consociated with time to live (TTL) property to specify the life time of the keys. After user specified time (TTL) data and its keys becomes destructed or unreadable. Self-destruction mechanism helps reducing overhead during upload and download process in cloud.
Other Latest Articles
- Multi-Focus Medical Image Fusion using Tetrolet Transform based on Global Thresholding Approach
- Accident Prevention System for Public Transport Vehicles
- A Novel Approach in Surgical Management, for Anesthesia Controlling
- Clinicoradiological Outcome of Short Segment Fusion in Thoracolumbar Vertebral Fractures' - A Study of 20 Cases
- Performance of BER Using IA Based Precoding in SISO-OFDM System
Last modified: 2021-06-30 21:20:16