Time Constrained Data Destruction in Cloud

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Cloud
Format: PDF
Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control. Time constrained data helps to protect all the data, by destructing it after the specific timeout. In addition, the decryption key is destructed after the user-specified time.
Download Now

Find By Topic