• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.
Citation: Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.

Lifetime Privacy and Self-Destruction of Data in the Cloud

More Information
  • Published Date: July 14, 2011
  • Data privacy protection is one of the primary concerns and major challenges for online services, such as cloud computing and outsourced data center. The concern is getting serious with the computing practices shifting towards cloud computing. Once user data is uploaded, end users are hard to guarantee that the data is protected and can be completely destructed by any means. Users can only rely on blind trust on the online service vendors. However, the privacy of user data can be compromised in multiple ways including careless operations of cloud administrators, bugs and vulnerabilities inside cloud infrastructure and even malicious cloud vendors. In this research, we seek to provide users with a concrete way to protect or destroy uploaded data. We utilize the technique of trusted computing as the trusted root in the hardware layer, and the hypervisor as the trusted agent in the software layer. The trusted hypervisor is responsible for protecting sensitive user data or destructing them at users command. Even administrators of the cloud cannot bypass the protection. This paper presents Dissolver, a novel system that keeps the data privacy in the whole life-time and ensures the destruction at the users command. Performance evaluation shows that the prototype system imposes reasonably low runtime overhead.
  • Related Articles

    [1]Wang Xianghai, Zhang Wenya, Xing Junyu, Lü Fang, Mu Zhenhua. High-order Caputo Fractional Order Differential Operator and Its Application in Image Enhancement[J]. Journal of Computer Research and Development, 2023, 60(2): 448-464. DOI: 10.7544/issn1000-1239.202110942
    [2]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [3]Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju. Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Zhou Yucong, Liu Yi, Wang Rui. Training Deep Neural Networks for Image Applications with Noisy Labels by Complementary Learning[J]. Journal of Computer Research and Development, 2017, 54(12): 2649-2659. DOI: 10.7544/issn1000-1239.2017.20170637
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Ye Jianhong, Song Wen, Sun Shixin. Operating and Analyzing the Reproducibility of Empty Marking Nets[J]. Journal of Computer Research and Development, 2009, 46(8): 1378-1385.
    [8]Bai Chenggang, Su Liang, Zhao Yingchun, Guo Junhong, and Cai Kaiyuan. Is the Reliability of Web Services Related to the Change Rate of Operational Profiles[J]. Journal of Computer Research and Development, 2008, 45(12): 2044-2051.
    [9]Zheng Qingfang, Gao Wen. Adaptive Skin Detection in JPEG Compressed Images[J]. Journal of Computer Research and Development, 2006, 43(7): 1194-1200.
    [10]Bao Fumin, Li Aiguo, Qin Zheng. Image Fusion Using SGNN[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1104) PDF downloads (912) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return