Download now Free registration required
This paper describes the problem of securing data by making it disappear after some time limit, making it impossible for it to be recovered by an unauthorized party. This method is in response to the need to keep the data secured and to protect the privacy of archived data on the servers, Cloud and Peer-to-Peer architectures. Due to the distributed nature of these architectures, it is impossible to destroy the data completely. So, the authors store the data by applying encryption and then manage the key, which is easier to do as the key is small and it can be hidden in the DHT (Distributed Hash Table).
- Format: PDF
- Size: 601.93 KB