Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment

  • Xiao FuEmail author
  • Zhijian Wang
  • Yunfeng Chen
  • Yihua Zhang
  • Hao Wu
Original Research Paper


Blockchain prospers in a second mining fever long after the one that occurred in the 1840s. Assumed to be an ark carrying all the data into the brave new world, blockchain provides limited tickets that all the miners struggled to win. Ultimate resources have been wasted to involve the proof-of-work game in order to dig up bitcoins even in countries of the third world. So we strive to design another storage structure with self-destructing mechanism that can provide high-efficiency concurrency and which is more important security for all the users and all types of data. The data would vanish after expiration that could be set by the user in this structure named Bead Strand Model, and this humanitarian mechanism makes it more acceptable than blockchain by the people who concerned privacy and security in cloud environment.


Bead Strand High-efficiency storage Self-destructing Cloud security 



This paper was supported by the Jiangsu Provincial Water Conservancy Science and Technology Project (2018056), the Fundamental Research Funds for the Central Universities (2016B14014), the Six Talent Peaks Project in Jiangsu Province (RJFW-032) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).


  1. 1.
    Peck ME (2017) Why the biggest bitcoin mines are in China. In: IEEE spectrumGoogle Scholar
  2. 2.
    Wang C (2017) A visit to a bitcoin mining farm in Sichuan. China Reveals Troubles Beyond Regulation.
  3. 3.
    Zhang N, Wang Y, Kang C (2016) Blockchain technique in the energy internet: preliminary research framework and typical applications. Proc Chin Soc Electr Eng 15(36):4011–4022. Google Scholar
  4. 4.
    Liu Q, Chen T, Cai J (2012) Enlister: baidu’s recommender system for the biggest Chinese Q and A website. In: ACM conference on recommender systems. ACM, New York, pp 285–288.
  5. 5.
    Abkowitz A, Chin J (2016) China launches Baidu probe after the death of a student. Wall Street J 20160502.
  6. 6.
    Liu C (2017) Research on the application of block chain technology in the construction of social credit system in China. Credit Ref 8:28–32Google Scholar
  7. 7.
    Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system.
  8. 8.
    Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops. IEEE Computer Society, New York, pp 180–184.
  9. 9.
    Kumar S, Paar C, Pelzl J (2006) How to break DES for Euro 8,980. In: 2nd workshop on special-purpose hardware for attacking cryptographic systems, CologneGoogle Scholar
  10. 10.
    Fu X, Wang ZJ, Wu H (2014) How to send a self-destructing email: a method of self-destructing email system. In: IEEE international congress on big data. IEEE Computer Society, New York, pp 304–309.
  11. 11.
    Leach PJ, Mealling M, Salz R (2005) RFC 4122: a universally unique identifier (UUID) URN namespace. IETF.
  12. 12.
    Berners-Lee T, Connolly D (1995) RFC 1866 hypertext markup language-2.0. IETF.
  13. 13.
    Fielding R, Gettys J, Mogul J (1999) RFC 2616: hypertext transfer protocol—HTTP/1.1. IETF.
  14. 14.
    Geambasu R, Kohno T, Levy AA (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, pp 299–316Google Scholar
  15. 15.
    Wu H, Fu X, Wang ZJ (2015) Self-destructing data method based on privacy cloud. In: International conference on logistics engineering, management and computer science (LEMCS 2015), pp 1207–1211.
  16. 16.
    Freed N, Borenstein N (1996) RFC 2045: multipurpose internet mail extensions (MIME) part one: format of internet message bodies. IETF.
  17. 17.
    Freed N, Borenstein N (1996) RFC 2046: multipurpose internet mail extensions (MIME) part two: media types. IETF.

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.Hohai University and Postdoctoral Work Station of Nanjing Longyuan Micro Electronic Technology Co. Ltd.NanjingPeople’s Republic of China
  2. 2.Hohai UniversityNanjingPeople’s Republic of China

Personalised recommendations