Open Access Open Access  Restricted Access Subscription or Fee Access

Group Policy based Self-Destruction Data System

Poonam Patel, Amar Buchade

Abstract


Recently, large amount of data is being created every day so people are looking towards new way of storing and processing data. In corporate world every organization, industries or any company needs large capacity of storage to store huge data in low cost. Mostly users store very sensitive and confidential information/data on storage system through network. The sensitive information contains business data, passwords, banking information, information related to finance and user’s secret notes etc. The sensitive data store on storage system for long time generates issue regarding privacy. In proposed system, we provide privacy of data using key sharing algorithm and access control mechanism. We use self-data destruction to destruct data and key from storage after user specified duration. The parameters considered are minimizing the time required to setup the key for cryptographic process and minimize time for uploading and downloading operation time of data.

Keywords


Data Privacy, Self-Destructing Data, Dynamic Environment, Information Security, Distributed System.

Full Text:

PDF

References


N.S Jeyakarthikka, S.Bhaggiaraj, A.Abuthaheer, “Self Destructing Data System Based On Session Key”, International Journal of Scientific & Technology Research Volume 3, ISSUE 2, FEBRUARY 2014, ISSN 2277-8616.

Priya P. Sharma, Chandrakant P. Navdeti “Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution”, ISSN: 0975-9646, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.

Poonam Patel, Amar Buchade, “Survey on Achivey Privacy Preserving using Multi-Key Approach in Cloud Environment”, IJIRIS, 2014.

Seonyoung Park and Youngseok Lee, “Secure Hadoop with Encrypted HDFS”, Chungnam National University, Daejeon, Republic of Korea, Springer Verlag Berlin Heidelberg 2013.

Rajesh Laxman Gaikwad1, Prof. Dhananjay M Dakhane2 and Prof. Ravindra L Pardhi3, “Network Security Enhancement in Hadoop”, international Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 2, Issue 3, March 2013.

L.Zeng, S.Chenting, Q.Wei, D.feng, “SeDas: A Self-Destructing Data System Based on Active Storage Framework”, IEEE TRANSACTIONS ON MAGNETICS, VOL.49, NO.6, JUNE 2013.

Jason croft, Robert signorile, “A self-destructing file distribution system with feedback for peer to peer networks”, Proc. ACM Conf. Computer and Communication Security (CCS), pp. 97-106, 2011.

Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, “Achieving Secure, Scalable, and Fine grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010.

R.Geambasu, T. Konno, A. Levy, H. Levy, “Vanish: Increasing data privacy with self-destructing data”, in Proc. USENIX security Symp, Montreal, Canada, Aug. 2009, pp.299- 315.

S.wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. Alex Harderman, C.J. Rossbach, B. Waters, E. Witchel, “Defeating vanish with low-cost Sybil attacks against large DHEs”, 2009.

J. R. Douceur, “The Sybil attack”, in Proc. IPTPS 01: Revised Papers from the first Int. Workshop on Peer-to-Peer System, 2002.

White, Tom (June 16, 2009), Hadoop: “The Definitive Guide”, (1st Ed.) O. Reilly Media. P. 524. ISBN 0-596-52197-9.

“Running Hadoop on Ubantu Linux (Single Node Cluster)”, Retrieved 6 June 2013.

Yannan Ma, Yu Zhou, YaoYu , Chenglei Peng, Ziqiang Wang, Sidan Du, “A Novel Approach for Improving Security and Storage Efficiency on HDFS”, The 6th International Conference, ELSEVIER, on Ambient Systems, Networks and Technologies(ANT 2015).

“The Big Data Security Gap: Protecting the Hadoop Cluster”, ZETTASET, WHITE PAPER.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.