International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 223

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10


     

A Survey on Self-Destruction of Data Using Active Storage

Avinash P. Khadse, Prof. Pravin D. Soni


Abstract: With the development of cloud based application, cloud services are becoming more and more important for peoples life. People are requested to submit or post some personal private information to the Cloud by the Internet. When people do this, they thought that service provider let secure their private data. By emerging cloud technology maximum applications are using cloud interface, and people usually trust all the cloud services, users generally stores their personal information on cloud. Later that information can be cached, copy, archived by the CSPs (Cloud Service Provider). Self destructing data is considering as spy proof future of the internet, by using this data is like a time bomb on the network, it means that after certain time interval. Primarily self destruction of data was introduced on DHT (Distributed Hash Table), since low cost Sybil attack on DHT are the problems. Self destructing data is now on active storage framework (SeDas) because it giving higher security and performance. Also uploading and downloading of the file having very poor performance especially with the large files. This paper is going to address these two problems so that privacy can be achieved in public network.


Keywords: Self Destruction of Data, Cryptography, Active Storage


Edition: Volume 3 Issue 12, December 2014


Pages: 1034 - 1037



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Avinash P. Khadse, Prof. Pravin D. Soni, "A Survey on Self-Destruction of Data Using Active Storage", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1034-1037, https://www.ijsr.net/getabstract.php?paperid=25111408

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1362 - 1373

Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article
Top