Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Highly Secure Data Self-destructing Scheme in CLOUD COMPUTING

Author : Keerthana.A 1 Mounica Chandrasekhar 2 Pruthvi Sai 3

Date of Publication :7th August 2015

Abstract: The utilisation of cloud services in today’s technological field is booming. People increasingly use cloud services for the purpose of sharing data. Hence there is a need to secure the sensitive data that is being shared through cloud servers. Providing a full life-cycle privacy security is not feasible, as it does not allow for access control. In order to provide a solution for this problem we put forward ‘key-policy attribute-based encryption with time specified attribute’- a secure data self destructing scheme which can be implemented in cloud servers so as to provide complete security to the sensitive data that is being transferred via cloud services. In this scheme, every cipher-text is associated with a time interval while private key is associated with a time instant.It is possible to decrypt the cipher-text only if both the time instant is within the specified time interval and the attributes associated satisfy the access structure of the key. The major advantage of this scheme over others is that it supports user-defined authorisation period and provides a fine-grained access control. The sensitive data gets self-destructed when the user specified time gets expires.

Reference :

    1. B. Wang, B. Li, and H. Li, “Oruta: Privacypreserving public auditingfor shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–56, 2014
    2. J. Xiong, F. Li, J. Ma, X. Liu, Z. Yao, and P. S. Chen, “A full lifecycle privacy protection scheme for sensitive data in cloud computing,” Peerto-Peer Networking and Applications
    3. X. Liu, J. Ma, J. Xiong, and G. Liu, “Ciphertextpolicy hierarchical attribute-based encryption for fine-grained access control of encryption data,” International Journal of Network Security, vol. 16, no. 4, pp. 351–357, 2014.
    4. K. G. Paterson and E. A. Quaglia, “Time-specific encryption,” in Security and Cryptography for Networks. Springer, 2010, pp. 1–16
    5. J. Reardon, D. Basin, and S. Capkun, “Sok: Secure data deletion,” in Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE, 2013, pp. 1–15
    6. J. Xiong, Z. Yao, J. Ma, F. Li, and X. Liu, “A secure selfdestruction scheme with ibe for the internet content privacy,” Chinese Journal of Computers, vol. 37, no. 1, pp. 139–150, 2014.

Recent Article