|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 178 - Issue 4 |
| Published: Nov 2017 |
| Authors: Mohammadi Kamplee, Babruvan Solunke |
10.5120/ijca2017915817
|
Mohammadi Kamplee, Babruvan Solunke . Data Sharing and Self-Destruction Scheme in Cloud. International Journal of Computer Applications. 178, 4 (Nov 2017), 41-45. DOI=10.5120/ijca2017915817
@article{ 10.5120/ijca2017915817,
author = { Mohammadi Kamplee,Babruvan Solunke },
title = { Data Sharing and Self-Destruction Scheme in Cloud },
journal = { International Journal of Computer Applications },
year = { 2017 },
volume = { 178 },
number = { 4 },
pages = { 41-45 },
doi = { 10.5120/ijca2017915817 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2017
%A Mohammadi Kamplee
%A Babruvan Solunke
%T Data Sharing and Self-Destruction Scheme in Cloud%T
%J International Journal of Computer Applications
%V 178
%N 4
%P 41-45
%R 10.5120/ijca2017915817
%I Foundation of Computer Science (FCS), NY, USA
There is a huge use of cloud services in our day today life e.g. Google Drive, Dropbox, SharePoint etc. Sharing data within friends might consist of sensitive/personal information. It’s always the users responsibility to safeguard own data while sharing and avoid misuse of it. It becomes a challenge for user to protect self-data on cloud network, to overcome this scenario it is important to design and allocate self-destruct period assigned by the user and access control to the data until the expiry period. The shared data should be self-destructed after the user-defined expiration time. With the help of KPABE (Key-policy ABE) and where can apply time interval to each attribute in the form of decryption attributes. In the KP-TSABE scheme, every cipher text is labeled with a time interval while private key is associated with a time instant. Deletion of data in a secure way is the task of deleting data irrecoverably from a physical storage medium. In this digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces.