|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Tuesday 16 April 2024

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJISR

   
 
 
 

SECURITY STORAGE SYSTEM FOR CLOUD USER USING OSD WITH A SELF-DESTRUCTING DATA


Volume 11, Issue 1, October 2014, Pages 19–26

 SECURITY STORAGE SYSTEM FOR CLOUD USER USING OSD  WITH A SELF-DESTRUCTING DATA

Ms. Punam U. Lambat1, Prof. Mr. Parag Jawarkar2, and Mr. G. Rajesh Babu3

1 Department of Computer Science & Engineering, Tulsiramji Gaikwakd –Patil college of Engineering & technology mohgaon wardha road Nagpur, Maharashtra, India
2 Department of Electronics and Telecommunication, Tulsiramji Gaikwakd –Patil college of Engineering & technology mohgaon wardha road Nagpur, Maharashtra, India
3 Department of Computer Science & Engineering, Tulsiramji Gaikwakd –Patil college of Engineering & technology mohgaon wardha road Nagpur, Maharashtra, India

Original language: English

Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


Cloud computing focuses on maximizing the effectiveness of the sharing of resources. It is not only shared by multiple users but can also dynamically reallocating as per demand. Cloud computing is the notion of outsourcing on-site available services and data storage to an off-site. Personal data stored in the cloud may contain account number, password, notes and other important information that could be used and misused by a miscreant, a competitor or a court of law. These data are cached, copied and archived by Cloud Service Providers (CSPs), often without user authorization and control. To overcome this problem to propose a Self Destruction method is protecting the user data privacy through Shamir Secret sharing algorithm, which can generate a pair of keys. Self Destruction method is associated with Time to Live (TTL) property to specify the life time of the keys. TTL trigger the Self Destruction operation, then the keys becomes destructed or unreadable after a user specified period. User can decrypt after timeout, either the user give correct keys. Shamir algorithm generates new keys to the user. Self Destruction mechanism reduces the overhead during upload and download file in the cloud. The result demonstrates that Self Destruction is practical to use and meet all privacy preserving goals. In this paper, active storage framework provides virtualization environment to run client's application and data is treated as objects to increase the throughput and decrease the latency.

Author Keywords: Cloud Computing, confidential data privacy, object based active storage, Vanishing data, Authentication, Self-estructing Data, Distributed hash table (DHT).


How to Cite this Article


Ms. Punam U. Lambat, Prof. Mr. Parag Jawarkar, and Mr. G. Rajesh Babu, “SECURITY STORAGE SYSTEM FOR CLOUD USER USING OSD WITH A SELF-DESTRUCTING DATA,” International Journal of Innovation and Scientific Research, vol. 11, no. 1, pp. 19–26, October 2014.