International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128

Survey Paper | Information Technology | India | Volume 4 Issue 1, January 2015


Enhancing Security in Cloud by Self Destruction Mechanism

Kshama D. Bothra | Sudipta Giri


Abstract: Cloud computing, a recent computing technology entirely changed the IT industry. Large amount of data can be stored in cloud storage system. Security is the prime concern for this large amount of data. Without, knowledge of authorized client, data can be viewed by other user. This data contain personal information like, account number, password and notes. All the data and their copies become self-destructed after user specified time, without any user intervention. Shamir secret sharing algorithm is used, which generates a pair of keys. Self-destruction method is consociated with time to live (TTL) property to specify the life time of the keys. After user specified time (TTL) data and its keys becomes destructed or unreadable. Self-destruction mechanism helps reducing overhead during upload and download process in cloud.


Keywords: Cloud computing, self-destruction, Active Storage Object, Time to live ttl, data privacy


Edition: Volume 4 Issue 1, January 2015,


Pages: 523 - 525


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kshama D. Bothra, Sudipta Giri, "Enhancing Security in Cloud by Self Destruction Mechanism", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 523-525, https://www.ijsr.net/get_abstract.php?paper_id=SUB15209

Similar Articles with Keyword 'Cloud computing'

Downloads: 0

Analysis Study Research Paper, Information Technology, United States of America, Volume 13 Issue 2, February 2024

Pages: 494 - 500

Evolving Trends in Open-Source RDBMS: Performance, Scalability and Security Insights

Naresh Kumar Miryala

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Information Technology, Zimbabwe, Volume 11 Issue 2, February 2022

Pages: 133 - 136

A Comparative Model for Predicting Customer Churn using Supervised Machine Learning

Muchatibaya Adrin | David Fadaralika

Share this Article
Top