The International Journal of Innovative Research in Computer and Communication Engineering
Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control. Time constrained data helps to protect all the data, by destructing it after the specific timeout. In addition, the decryption key is destructed after the user-specified time.