Open Access   Article Go Back

SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion

R.Aishwarya 1 , S.Ramya 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 145-151, Jan-2015

Online published on Jan 31, 2015

Copyright © R.Aishwarya , S.Ramya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Aishwarya , S.Ramya , “SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.145-151, 2015.

MLA Style Citation: R.Aishwarya , S.Ramya "SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion." International Journal of Computer Sciences and Engineering 3.1 (2015): 145-151.

APA Style Citation: R.Aishwarya , S.Ramya , (2015). SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion. International Journal of Computer Sciences and Engineering, 3(1), 145-151.

BibTex Style Citation:
@article{_2015,
author = {R.Aishwarya , S.Ramya },
title = {SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {145-151},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=380},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=380
TI - SEDAS: Self - Destruction Facts Scheme Aimed At Circulated Thing Founded Dynamic Packing Frame Exertion
T2 - International Journal of Computer Sciences and Engineering
AU - R.Aishwarya , S.Ramya
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 145-151
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2390 2305 downloads 2529 downloads
  
  
           

Abstract

Today’s technical then lawful landscape gifts formidintelligent trials to distinct facts privacy. Distinct facts deposited in the rainraincloud may cover explanation numbers, passwords, notes, then extra important info thon could be used then misused via a miscreant, a competitor, or a court of law. These facts are cached, copied, then archived via rainraincloud facility providers (csps), regularly without users’ authorization then control. In practical self-destructing facts systems thon safe subtle facts meanwhile disclosure in our really mobile, social-networked, cloud-devious world. Self-destructing facts largely purposes on defensive the operator data’s privacy. All the facts then their replicas grow destructed or unreadintelligent afterward a user-stated time, without around operator intervention. In addition, the decryption key is destructed afterward the user-stated time. In this paper, we prereferred sedas, a scheme thon come crosswise this examination complete a single addition of unequal key means with dynamic packing means founded on t10 osd standard. Related to the scheme without selfdestructing facts mechanism, amount aimed at uploading then transferring with the planned sedas adequately decreases via fewer than 72%, smooth nevertheless dormancy aimed at upload/downloadvertisement events with self-destructing facts maneuver upsurges via fewer than 60%.

Key-Words / Index Term

Dynamic Storage, Rainraincloud Computing, Facts Privacy, Self-Destructing Data

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.
[8] Iyengar, A. ; Res. Div., IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA,” Scalability of dynamic storage allocation algorithms”, Published in: Frontiers of Massively Parallel Computing, 1996. Proceedings Frontiers '96., Sixth Symposium on the Date of Conference: 27-31 Oct 1996 Page(s): 223 – 232.
[9] Krish, K.R. ; Khasymski, A. ; Butt, A.R. ; Tiwari, S.” AptStore: Dynamic Storage Management for Hadoop”, Published in: Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Volume:1 ) Date of Conference: 2-5 Dec. 2013 Page(s): 33 – 41.
[10] Krish, K.R. ; Virginia Tech, Blacksburg, VA, USA ; Khasymski, A. ; Butt, A.R. ; Tiwari, S.” AptStore: Dynamic storage management for hadoop”, Published in: Cluster Computing (CLUSTER), 2013 IEEE International Conference on Date of Conference: 23-27 Sept. 2013 Page(s): 1 – 5.
[11] Bouguettaya, A.R.A. ; Virginia Tech ; Eltoweissy, M.Y.” Privacy on the Web: facts, challenges, and solutions”, Published in: Security & Privacy, IEEE (Volume:1 , Issue: 6 ) Page(s): 40 – 49.
[12] Ningning Cheng ; Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA ; Xinlei Wang ; Wei Cheng ; Mohapatra, P.” Characterizing privacy leakage of public WiFi networks for users on travel”, Published in: INFOCOM, 2013 Proceedings IEEE Date of Conference: 14-19 April 2013 Page(s): 2769 – 2777.
[13] Shokri, R. ; LCA, EPFL, Lausanne, Switzerland ; Theodorakopoulos, G. ; Le Boudec, J.-Y. ; Hubaux, J.-P.” Quantifying Location Privacy”, Published in: Security and Privacy (SP), 2011 IEEE Symposium on Date of Conference: 22-25 May 2011 Page(s): 247 – 262.
[14] Tao Shu ; Dept. of CSE, Oakland Univ., Rochester, NY, USA ; Yingying Chen ; Jie Yang ; Williams, A.” Multi-lateral privacy-preserving localization in pervasive environments”, Published in: INFOCOM, 2014 Proceedings IEEE Date of Conference: April 27 2014-May 2 2014 Page(s): 2319 – 2327.
[15] Yanjiang Yang ; Inst. for Infocomm Res., Singapore ; Xiaoxi Han ; Feng Bao ; Deng, R.H.” A smart-card-enabled privacy preserving E-prescription system”, Published in: Information Technology in Biomedicine, IEEE Transactions on (Volume:8 , Issue: 1 ) Page(s): 47 – 58.
[16] Lingfang Zeng ; Wuhan Nat. Lab. for Optoelectron., Huazhong Univ. of Sci. & Technol., Wuhan, China ; Shibin Chen ; Qingsong Wei ; Dan Feng, “SeDas: A Self-Destructing Data System Based on Active Storage Framework”, Published in: Magnetics, IEEE Transactions on (Volume:49 , Issue: 6 ) Page(s): 2548 – 2554.
[17] Fengshun Yue ; Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China ; Guojun Wang ; Qin Liu “A Secure Self-Destructing Scheme for Electronic Data”, Published in: Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on Date of Conference: 11-13 Dec. 2010 Page(s): 651 – 658.
[18] Xiao Fu ; Coll. of Comput. & Inf., Hohai Univ., Nanjing, China ; Zhijian Wang ; Hao Wu ; Jia-qi Yang “How to Send a Self-Destructing Email: A Method of Self-Destructing Email System” Published in: Big Data (BigData Congress), 2014 IEEE International Congress on Date of Conference: June 27 2014-July 2 2014 Page(s): 304 – 309.
[19] Lingfang Zeng ; Wuhan Nat. Lab. for Optoelectron., Huazhong Univ. of Sci. & Technol., Wuhan, China ; Shibin Chen ; Qingsong Wei ; Dan Feng “SeDas: A self-destructing data system based on active storage framework”, Published in: APMRC, 2012 Digest Date of Conference: Oct. 31 2012-Nov. 2 2012 Page(s): 1 – 8.
[20] Lingfang Zeng ; Inf. Storage Div., Huazhong Univ. of Sci. & Technol., Wuhan, China ; Zhan Shi ; Shengjie Xu ; Dan Feng “SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy”, Published in: Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on Date of Conference: Nov. 30 2010-Dec. 3 2010 Page(s): 521 – 528.