Advertisement

Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment

  • Xiao FuEmail author
  • Zhijian Wang
  • Yunfeng Chen
  • Yihua Zhang
  • Hao Wu
Original Research Paper
  • 7 Downloads

Abstract

Blockchain prospers in a second mining fever long after the one that occurred in the 1840s. Assumed to be an ark carrying all the data into the brave new world, blockchain provides limited tickets that all the miners struggled to win. Ultimate resources have been wasted to involve the proof-of-work game in order to dig up bitcoins even in countries of the third world. So we strive to design another storage structure with self-destructing mechanism that can provide high-efficiency concurrency and which is more important security for all the users and all types of data. The data would vanish after expiration that could be set by the user in this structure named Bead Strand Model, and this humanitarian mechanism makes it more acceptable than blockchain by the people who concerned privacy and security in cloud environment.

Keywords

Bead Strand High-efficiency storage Self-destructing Cloud security 

Notes

Acknowledgements

This paper was supported by the Jiangsu Provincial Water Conservancy Science and Technology Project (2018056), the Fundamental Research Funds for the Central Universities (2016B14014), the Six Talent Peaks Project in Jiangsu Province (RJFW-032) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

References

  1. 1.
    Peck ME (2017) Why the biggest bitcoin mines are in China. In: IEEE spectrumGoogle Scholar
  2. 2.
    Wang C (2017) A visit to a bitcoin mining farm in Sichuan. China Reveals Troubles Beyond Regulation. www.bitcoin.com
  3. 3.
    Zhang N, Wang Y, Kang C (2016) Blockchain technique in the energy internet: preliminary research framework and typical applications. Proc Chin Soc Electr Eng 15(36):4011–4022.  https://doi.org/10.13334/j.0258-8013.pcsee.161311 Google Scholar
  4. 4.
    Liu Q, Chen T, Cai J (2012) Enlister: baidu’s recommender system for the biggest Chinese Q and A website. In: ACM conference on recommender systems. ACM, New York, pp 285–288.  https://doi.org/10.1145/2365952.2366016
  5. 5.
    Abkowitz A, Chin J (2016) China launches Baidu probe after the death of a student. Wall Street J 20160502. https://www.wsj.com/articles/china-launches-baidu-probe-after-the-death-of-a-student-1462209685
  6. 6.
    Liu C (2017) Research on the application of block chain technology in the construction of social credit system in China. Credit Ref 8:28–32Google Scholar
  7. 7.
    Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org
  8. 8.
    Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops. IEEE Computer Society, New York, pp 180–184.  https://doi.org/10.1109/SPW.2015.27
  9. 9.
    Kumar S, Paar C, Pelzl J (2006) How to break DES for Euro 8,980. In: 2nd workshop on special-purpose hardware for attacking cryptographic systems, CologneGoogle Scholar
  10. 10.
    Fu X, Wang ZJ, Wu H (2014) How to send a self-destructing email: a method of self-destructing email system. In: IEEE international congress on big data. IEEE Computer Society, New York, pp 304–309.  https://doi.org/10.1109/BigData.Congress.2014.51
  11. 11.
    Leach PJ, Mealling M, Salz R (2005) RFC 4122: a universally unique identifier (UUID) URN namespace. IETF.  https://doi.org/10.17487/RFC4122
  12. 12.
    Berners-Lee T, Connolly D (1995) RFC 1866 hypertext markup language-2.0. IETF.  https://doi.org/10.17487/RFC1866
  13. 13.
    Fielding R, Gettys J, Mogul J (1999) RFC 2616: hypertext transfer protocol—HTTP/1.1. IETF.  https://doi.org/10.17487/RFC2616
  14. 14.
    Geambasu R, Kohno T, Levy AA (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, pp 299–316Google Scholar
  15. 15.
    Wu H, Fu X, Wang ZJ (2015) Self-destructing data method based on privacy cloud. In: International conference on logistics engineering, management and computer science (LEMCS 2015), pp 1207–1211.  https://doi.org/10.2991/lemcs-15.2015.241
  16. 16.
    Freed N, Borenstein N (1996) RFC 2045: multipurpose internet mail extensions (MIME) part one: format of internet message bodies. IETF.  https://doi.org/10.17487/RFC2045
  17. 17.
    Freed N, Borenstein N (1996) RFC 2046: multipurpose internet mail extensions (MIME) part two: media types. IETF.  https://doi.org/10.17487/RFC2046

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.Hohai University and Postdoctoral Work Station of Nanjing Longyuan Micro Electronic Technology Co. Ltd.NanjingPeople’s Republic of China
  2. 2.Hohai UniversityNanjingPeople’s Republic of China

Personalised recommendations