Skip to main content

2019 | OriginalPaper | Buchkapitel

A Brief History of Self-destructing Data: From 2005 to 2017

verfasst von : Xiao Fu, Zhijian Wang, Yong Chen, Yunfeng Chen, Hao Wu

Erschienen in: Advances on P2P, Parallel, Grid, Cloud and Internet Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

2018 is the 13th anniversary since Radia Perlman has introduced the concept of self-destructing data in 2005. After all the big events committed data leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been made in purpose of inspiring graduate students and researchers to contribute to study in this field.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amazon Web Service: AWS Global Infrastructure. Amazon about Document (2016) Amazon Web Service: AWS Global Infrastructure. Amazon about Document (2016)
2.
Zurück zum Zitat Google Compute Engine: Containers on Google Cloud Platform. Google Compute Engine documentation (2014) Google Compute Engine: Containers on Google Cloud Platform. Google Compute Engine documentation (2014)
3.
Zurück zum Zitat Greenwald, G., MacAskill, E.: Poitras, L.: Revealed: how Microsoft handed the NSA access to encrypted messages. The Guardian, London (2013) Greenwald, G., MacAskill, E.: Poitras, L.: Revealed: how Microsoft handed the NSA access to encrypted messages. The Guardian, London (2013)
4.
Zurück zum Zitat Monnens, D., Armstrong, A., Ruggill, J., et al.: Before It’s Too Late: A Digital Game Preservation White Paper. Lulu, Com (2009) Monnens, D., Armstrong, A., Ruggill, J., et al.: Before It’s Too Late: A Digital Game Preservation White Paper. Lulu, Com (2009)
5.
Zurück zum Zitat Perlman R.: File system design with assured delete. In: Proceedings of the 3rd IEEE International Security in Storage Workshop. San Francisco, pp. 83–88 (2005) Perlman R.: File system design with assured delete. In: Proceedings of the 3rd IEEE International Security in Storage Workshop. San Francisco, pp. 83–88 (2005)
6.
Zurück zum Zitat Perlman R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 21–32 (2005) Perlman R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 21–32 (2005)
7.
Zurück zum Zitat Geambasu R., Kohno T., Levy A.A., et al: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium, pp. 299–316 (2009) Geambasu R., Kohno T., Levy A.A., et al: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium, pp. 299–316 (2009)
8.
Zurück zum Zitat Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. Peer-to-Peer Systems, vol. 5365. Springer, Berlin (2002)MATH Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. Peer-to-Peer Systems, vol. 5365. Springer, Berlin (2002)MATH
10.
Zurück zum Zitat Chen, S.B.: Research of data self-destruct based on distributed object storage system. Huazhong University of Science and Technology, Hubei (2012) Chen, S.B.: Research of data self-destruct based on distributed object storage system. Huazhong University of Science and Technology, Hubei (2012)
11.
Zurück zum Zitat Xiong, J.B., Yao, Z.Q., Ma, J.F., et al.: A secure self-destruction scheme with IBE for the internet content privacy. J. Comput. 37(1), 139–150 (2014) Xiong, J.B., Yao, Z.Q., Ma, J.F., et al.: A secure self-destruction scheme with IBE for the internet content privacy. J. Comput. 37(1), 139–150 (2014)
12.
Zurück zum Zitat Fu X., Wang Z. J., Xu F., Wang Y.: CN102571949A: a network-based data self-destruction method. Beijing (2012) Fu X., Wang Z. J., Xu F., Wang Y.: CN102571949A: a network-based data self-destruction method. Beijing (2012)
13.
Zurück zum Zitat Fu X., Wang Z. J., Wu H., et al: How to send a self-destructing email: a method of self-destructing email system. In: IEEE 3rd International Conference on Big Data 2014. Anchorage, pp. 304–309 (2014) Fu X., Wang Z. J., Wu H., et al: How to send a self-destructing email: a method of self-destructing email system. In: IEEE 3rd International Conference on Big Data 2014. Anchorage, pp. 304–309 (2014)
14.
Zurück zum Zitat Wu H., Fu X., Wang Z. J., et al: Self-destructing data method based on privacy cloud. In: International Conference on Logistics Engineering, Management and Computer Science, pp. 1207–1221 (2015) Wu H., Fu X., Wang Z. J., et al: Self-destructing data method based on privacy cloud. In: International Conference on Logistics Engineering, Management and Computer Science, pp. 1207–1221 (2015)
15.
Zurück zum Zitat Nakamoto S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2008) Nakamoto S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2008)
16.
Zurück zum Zitat Merkle R.C.: Protocols for public key cryptosystems. In: Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society (1980) Merkle R.C.: Protocols for public key cryptosystems. In: Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society (1980)
17.
Zurück zum Zitat Curtis S.: Snapchat hack leaks 4.6 m users’ details. The Telegraph (2014) Curtis S.: Snapchat hack leaks 4.6 m users’ details. The Telegraph (2014)
Metadaten
Titel
A Brief History of Self-destructing Data: From 2005 to 2017
verfasst von
Xiao Fu
Zhijian Wang
Yong Chen
Yunfeng Chen
Hao Wu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02607-3_10

Neuer Inhalt