Cloud

A Systematic Approach to Cloud Security Using SeDas Platform

Free registration required

Executive Summary

Cloud computing is one of the cutting-edge technologies used by most of the people. Cloud users are requested to submit the personal private information to the cloud by the Internet. When users do this, they hope that Cloud Service Provider (CSPs) will provide the privacy for the data. Self-destructing data mainly aims at providing user's data privacy. All the data and decrypting key will get self-destruct after user specified time without any human intervention. Along with the privacy the authors can also be possible to achieve the confidentiality and integrity.

  • Format: PDF
  • Size: 504.7 KB