Professional Documents
Culture Documents
Time Constrained Self-Destructing Data System (Sedas) For Data Privacy
Time Constrained Self-Destructing Data System (Sedas) For Data Privacy
Dr. D. Thilagavathy
PG Scholar
Department of CSE
Adhiyamaan College of
Engineering
Hosur, Tamil Nadu, India
Professor
Department of CSE
Adhiyamaan College of
Engineering
Hosur, Tamil Nadu, India
I. INTRODUCTION
Internet-based development and use of computer technology has
opened up to several trends in the era of cloud computing. The software
as a service (SaaS) computing architecture together with cheaper and
powerful processors has transformed the data centers into pools of
computing service on a huge scale. Services that reside solely on remote
data centers can be accessed with high quality due to increased network
bandwidth and reliable network connections. Moving data into the
cloud offers great convenience to users since they dont have to care
about the complexities of direct hardware management.
Cloud computing vendors like Amazon Simple Storage Service (S3),
Amazon Elastic Compute Cloud (EC2) are well known to all. When
people rely more and more on internet and cloud technology the privacy
of the users must be achieved through an important issue called
security. When data is transformed and processed it is cached and
copied on many systems in the network which is not up to the
knowledge of the users. So there are chances of leaking the private
details of the users via Cloud Service Providers negligence, hackers
intrusion or some legal actions.
193
195
with the help of SeDas. Thus the latency and throughput performance
measures are being improved here in this paper.
V. CONCLUSION
In cloud computing environment many a technique have been used to
provide security for the users data/files. As of the above information
many researchers have given many techniques and ideas for the same.
According to the above analysis many techniques has been taken into
work where the data disappears but without the knowledge of the user.
SeDas makes the sensitive information such as credential details to get
self-destructed without any action on the users part so that the details
are unreadable to anyone after that supported by object-based storage
technique. The Experimental security analysis sheds intuitive
practicableness of the approach. This time-constrained system can
facilitate to produce researchers with any valuable expertise to tell
future of Cloud services.
References
[1] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, Vanish:
[2]
[3]
[4]
[5]
201