Self Destructive Data Security System: Towards an Improved Platform for Data Protection

Akpan Abasiama G, Umeakuka Chinelo Victoria

Abstract


Today’s technical and legal landscape presents formidable challenges to personal data privacy. Data protection attempts to ensure the security of computer-processed data from unauthorized access, from destructive user actions and from computer failure. This paper validates a self destructive data security system using files of different formats and a secure server to make an improvement on the existing system. All the data and their copies become destroyed or unreadable when an attempt to copy the file from the secure server is made. This is implemented using php programming language and a prototype methodology. The performance evaluation of the system shows a faster way to upload and download data to be stored and encrypted on the server.

Full Text:

PDF

References


Alexander C. and Goldberg I. (2007). An Online Journal on Improved user authentication in off-the- record messaging. In UPES. 5 – 7 accessed 7/5/2015.

Pearlman C. (2005). The Ephemerizer: Making data disappear. Journal of Information System Security, 1(1), 45-78.

Srivatsa M. and Liu C. (2004). An online journal on vulnerabilities and security threats in structured over lay networks: A quantitive analysis. In Proc. Of Annual Computer Security Applications Conference. Vol. 5, 3- 4.

Wolchok M., Hofmann C. Heninger E., Felten H., Halderman A., Rossbach J. Waters M., and Witchel H. (2010). A Journal on Defecting Vanish with low-cost Sybil attacks against large DHEs ӀӀ in Proc. Network and Distributed System Security Symposium, 2345-340. 30/11/2015

Rabin O. (2005). Provably unbreakable hyper-encryption in the limited access model. In IEEE information Theory workshop on theory and practice in information-Theoretic security. Vol.1, 23-32.

Alexander C. and Goldberg I. (2007). An Online Journal on Improved user authentication in off-the-record messaging. In WPES. 5-7 accessed 7/5/2015.

Sit E. and Morris C. (2002). Security considerations for peer-to-peer distributed hash table. In proceeding of IPTPS. Vol. 7, 11-30.

¬[8] Drew H. and Arash F. (2007). “An online Journal About Dropbox.” 1-4, 16/8/15




DOI: https://doi.org/10.23956/ijarcsse.v9i4.982

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.