Font Size: a A A

Research Of Data Self-destruct Based On Distributed Object Storage System

Posted on:2013-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:S B ChenFull Text:PDF
GTID:2248330392457816Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With development of Internet technology and popularization of mobile Internet,computer technology and Internet technology is being more and more important forpeople’s life. However, people take more and more risk of leaking of privacy to storetheirs data in the Internet.On one hand, when data is being processed, transformed andstored by current computer system or network, systems or network must cache, copy orarchive it.These copies are essential for systems and network, but people have noknowledge about them and cannot control them, so they may leak people’s privacy. On theother hand, people’s privacy also can be leaked attributing to service providers’ negligence,hackers’ intrusion or some legal means. These problems present formidable challenges toprotect people’s privacy.Pioneering study of theVanish data self-destruct supplies a new idea for sharing andprotecting privacy.Except some special attacksto characteristics ofP2P are challenges oftheVanish system, uncontrolled of how long the key can survival is also one of thedisadvantages of the Vanish system.Aim at these disadvantages, this paper presents asolution to implement a data self-destruct system based on the active storage technique ina distributed object storage system. Active storage is a technology which expands objectdefinition in the T10draft so that an object in object storage system can perform sometasks with method object, and do some job according to some conditions with a policyobject.The system defines a self-destruct method object, and associates this method objectwith each key share in the object storage system, then defines policy object with survivaltime for each key share in the object storage system. The system can meet requirement ofa data self-destruct system with controllable survival time, at the same user can use thissystem as a usual object storage system.
Keywords/Search Tags:Data Self-Destruct, Active Storage, Storage Security, Cloud Storage
PDF Full Text Request
Related items