Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Self-Destruction System for Protecting Data Privacy using Attribute Based Encryption

Author : Aboli Sarode 1 Shruti Mohod 2 Kavita shelke 3 Shika Deshmukh 4 Prof Shankar Gadhve 5

Date of Publication :7th September 2016

Abstract: In Cloud Storage we store confidential data of particular organization or Software Company. Important information for developing software, and other such information that can be abuse by hackers or unauthorized person. Self-destruction System mainly aims at securing the user confidential data’s privacy. In previous paper there is possibility to leak data to prevent previous sequence. In exiting system system used different technique to encrypt data, but In this paper, we present a system that provide more security for user valuable data and use different algorithm for encrypt data. We implemented automatic deletion performing system through the different methods and different security properties evaluations of this system. In addition to this the data privacy can be given to the system by encode the data. All the data and their copies become unreadable after auserspecifiedtime, without any user intermediates. In addition, the decryption key is destructed after the user-specified time.

Reference :

    1. R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self- destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315.
    2. A. Shamir. Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in Cryptology, pages 47–53. Springer Verlag New York, Inc., 1985.
    3. T. M. John, A. T. Ramani, and J. A. Chandy, “Active storage using object-based devices,” in Proc. IEEE Int. Conf. Cluster Computing, 2008, pp. 472-478.
    4. A. Shamir, ”How to Share a secret”, Commun.ACM, vol.22, no.11, pp.612-613”Dec 2010.
    5. R.Perlman,” File System design with assured delete, “in proc. Third IEEE Int. Security Storage Workshop (SISW), Dec 2009.
    6. S.W.Son, S.Lang, R.Ross, R.Thakur and B.Oziasikyilmaz and K.Liao,”Enabling Active storage On Parallel System” Jan 2012

Recent Article