Abstracto

Time Constrained Data Destruction in Cloud

S. Christina Suganthi Monica, M.Subasini

Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users’ authorization and control. Time constrained data helps to protect all the data, by destructing it after the specific timeout . In addition, the decryption key is destructed after the user-specified time. In this paper, we present, a time constrained data system that meets this challenge through a novel integration of cryptographic techniques with active storage techniques .Time constrained data system are used to meet all the privacy-preserving goals. Compared to the system without time constrained data mechanism, throughput for uploading and downloading with the proposed timeout data acceptably decreases by less than 72%, while latency for upload/download operations with time constrained data mechanism increases by less than 60%.

Descargo de responsabilidad: este resumen se tradujo utilizando herramientas de inteligencia artificial y aún no ha sido revisado ni verificado.