Abstract
2018 is the 13th anniversary since Radia Perlman has introduced the concept of self-destructing data in 2005. After all the big events committed data leakage, such as the PRISM and Instagram fappening, big data still maintain its leading position among the internet buzzwords. This paper strives to review and summarize the research process of self-destructing data in the past decade. Comparisons between landmark methods and systems have also been made in purpose of inspiring graduate students and researchers to contribute to study in this field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Amazon Web Service: AWS Global Infrastructure. Amazon about Document (2016)
Google Compute Engine: Containers on Google Cloud Platform. Google Compute Engine documentation (2014)
Greenwald, G., MacAskill, E.: Poitras, L.: Revealed: how Microsoft handed the NSA access to encrypted messages. The Guardian, London (2013)
Monnens, D., Armstrong, A., Ruggill, J., et al.: Before It’s Too Late: A Digital Game Preservation White Paper. Lulu, Com (2009)
Perlman R.: File system design with assured delete. In: Proceedings of the 3rd IEEE International Security in Storage Workshop. San Francisco, pp. 83–88 (2005)
Perlman R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 21–32 (2005)
Geambasu R., Kohno T., Levy A.A., et al: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium, pp. 299–316 (2009)
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. Peer-to-Peer Systems, vol. 5365. Springer, Berlin (2002)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Chen, S.B.: Research of data self-destruct based on distributed object storage system. Huazhong University of Science and Technology, Hubei (2012)
Xiong, J.B., Yao, Z.Q., Ma, J.F., et al.: A secure self-destruction scheme with IBE for the internet content privacy. J. Comput. 37(1), 139–150 (2014)
Fu X., Wang Z. J., Xu F., Wang Y.: CN102571949A: a network-based data self-destruction method. Beijing (2012)
Fu X., Wang Z. J., Wu H., et al: How to send a self-destructing email: a method of self-destructing email system. In: IEEE 3rd International Conference on Big Data 2014. Anchorage, pp. 304–309 (2014)
Wu H., Fu X., Wang Z. J., et al: Self-destructing data method based on privacy cloud. In: International Conference on Logistics Engineering, Management and Computer Science, pp. 1207–1221 (2015)
Nakamoto S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2008)
Merkle R.C.: Protocols for public key cryptosystems. In: Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society (1980)
Curtis S.: Snapchat hack leaks 4.6 m users’ details. The Telegraph (2014)
Acknowledgments
This paper was supported by the Fundamental Research Funds for the Central Universities (2016B14014), the Six Talent Peaks Project in Jiangsu Province (RJFW-032), and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Fu, X., Wang, Z., Chen, Y., Chen, Y., Wu, H. (2019). A Brief History of Self-destructing Data: From 2005 to 2017. In: Xhafa, F., Leu, FY., Ficco, M., Yang, CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-030-02607-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-02607-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02606-6
Online ISBN: 978-3-030-02607-3
eBook Packages: EngineeringEngineering (R0)