Special Issue Article
SEDAS: A Self Destruction for Protecting Data Privacy in Cloud Storage As A Service Model
|Lalitha K1, Sasi Devi J2
|Related article at Pubmed, Scholar Google|
In Cloud computing focuses on maximizing the effectiveness of the sharing of resources. It is not only shared by multiple users but can also dynamically reallocating as per demand. Personal data stored in the cloud may contain account number, password, notes and other important information that could be used and misused by a miscreant, a competitor or a court of law. These data are cached, copied and archived by Cloud Service Providers (CSPs), often without user authorization and control. To overcome this problem to propose a Self Destruction method is protecting the user data privacy through Shamir Secret sharing algorithm, which can generate a pair of keys. Self Destruction method is associated with Time to Live (TTL) property to specify the life time of the keys. TTL trigger the Self Destruction operation, then the keys becomes destructed or unreadable after a user specified period. User can decrypt after timeout, either the user give correct keys. Shamir algorithm generates new keys to the user. Self Destruction mechanism reduces the overhead during upload and download file in the cloud. The result demonstrates that Self Destruction is practical to use and meet all privacy preserving goals.