International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 7.839

A SELF-RELIANT APPROACH TO SECURE DATA DELECTION IN CLOUD COMPUTING

  • Version
  • Download 3
  • File Size 432.32 KB
  • File Count 1
  • Create Date 23 May 2025
  • Last Updated 23 May 2025

A SELF-RELIANT APPROACH TO SECURE DATA DELECTION IN CLOUD COMPUTING

Authors:

Dr. N. Chandrakala1, Miskin Naveen Kumar2, Mangu Madhav3, Mayani Prakash4, P. Chandra Shekar Azad5

 1-5 Department of CSE & TKR College of Engineering and Technology

1-5 c B. Tech Students

Abstract - With the rapid growth of cloud computing, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques provide data confidentiality but fail to guarantee complete data removal when necessary. A secure data self-destructing scheme in cloud computing addresses this limitation by enabling the automatic and irreversible destruction of sensitive data after a predefined condition is met. This scheme ensures that both the encrypted data and the decryption keys become permanently inaccessible, preventing unauthorized access even if the cloud infrastructure is compromised.

The proposed scheme integrates time-based, policy-based, or event-driven mechanisms to trigger data self-destruction. By leveraging advanced cryptographic techniques such as ephemeral key management, attribute-based encryption, and secure key dispersion, the scheme ensures that no retrievable copies of the data or decryption keys remain after the self-destruction process. Additionally, block-chain and smart contracts can be incorporated to enhance transparency and verifiability, ensuring that the self-destruction process is executed as intended without external interference.

This approach significantly improves data privacy, compliance with data retention policies, and protection against insider and outsider threats. It is particularly beneficial for applications requiring strict confidentiality, such as military intelligence, financial transactions, and healthcare records. By implementing a secure data self-destructing scheme, cloud service users can have greater control over their sensitive information while mitigating risks associated with unauthorized data persistence.

Key Words: Data Self-Destruction, Cloud Computing, Ephemeral Key Management, Attribute-Based Encryption, Block-chain.


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More