International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 178 - Issue 4 |
Published: Nov 2017 |
Authors: Mohammadi Kamplee, Babruvan Solunke |
![]() |
Mohammadi Kamplee, Babruvan Solunke . Data Sharing and Self-Destruction Scheme in Cloud. International Journal of Computer Applications. 178, 4 (Nov 2017), 41-45. DOI=10.5120/ijca2017915817
@article{ 10.5120/ijca2017915817, author = { Mohammadi Kamplee,Babruvan Solunke }, title = { Data Sharing and Self-Destruction Scheme in Cloud }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 178 }, number = { 4 }, pages = { 41-45 }, doi = { 10.5120/ijca2017915817 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Mohammadi Kamplee %A Babruvan Solunke %T Data Sharing and Self-Destruction Scheme in Cloud%T %J International Journal of Computer Applications %V 178 %N 4 %P 41-45 %R 10.5120/ijca2017915817 %I Foundation of Computer Science (FCS), NY, USA
There is a huge use of cloud services in our day today life e.g. Google Drive, Dropbox, SharePoint etc. Sharing data within friends might consist of sensitive/personal information. It’s always the users responsibility to safeguard own data while sharing and avoid misuse of it. It becomes a challenge for user to protect self-data on cloud network, to overcome this scenario it is important to design and allocate self-destruct period assigned by the user and access control to the data until the expiry period. The shared data should be self-destructed after the user-defined expiration time. With the help of KPABE (Key-policy ABE) and where can apply time interval to each attribute in the form of decryption attributes. In the KP-TSABE scheme, every cipher text is labeled with a time interval while private key is associated with a time instant. Deletion of data in a secure way is the task of deleting data irrecoverably from a physical storage medium. In this digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces.