Skip to main content

Advertisement

Log in

Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment

  • Original Research Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

Blockchain prospers in a second mining fever long after the one that occurred in the 1840s. Assumed to be an ark carrying all the data into the brave new world, blockchain provides limited tickets that all the miners struggled to win. Ultimate resources have been wasted to involve the proof-of-work game in order to dig up bitcoins even in countries of the third world. So we strive to design another storage structure with self-destructing mechanism that can provide high-efficiency concurrency and which is more important security for all the users and all types of data. The data would vanish after expiration that could be set by the user in this structure named Bead Strand Model, and this humanitarian mechanism makes it more acceptable than blockchain by the people who concerned privacy and security in cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Peck ME (2017) Why the biggest bitcoin mines are in China. In: IEEE spectrum

  2. Wang C (2017) A visit to a bitcoin mining farm in Sichuan. China Reveals Troubles Beyond Regulation. www.bitcoin.com

  3. Zhang N, Wang Y, Kang C (2016) Blockchain technique in the energy internet: preliminary research framework and typical applications. Proc Chin Soc Electr Eng 15(36):4011–4022. https://doi.org/10.13334/j.0258-8013.pcsee.161311

    Google Scholar 

  4. Liu Q, Chen T, Cai J (2012) Enlister: baidu’s recommender system for the biggest Chinese Q and A website. In: ACM conference on recommender systems. ACM, New York, pp 285–288. https://doi.org/10.1145/2365952.2366016

  5. Abkowitz A, Chin J (2016) China launches Baidu probe after the death of a student. Wall Street J 20160502. https://www.wsj.com/articles/china-launches-baidu-probe-after-the-death-of-a-student-1462209685

  6. Liu C (2017) Research on the application of block chain technology in the construction of social credit system in China. Credit Ref 8:28–32

    Google Scholar 

  7. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org

  8. Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops. IEEE Computer Society, New York, pp 180–184. https://doi.org/10.1109/SPW.2015.27

  9. Kumar S, Paar C, Pelzl J (2006) How to break DES for Euro 8,980. In: 2nd workshop on special-purpose hardware for attacking cryptographic systems, Cologne

  10. Fu X, Wang ZJ, Wu H (2014) How to send a self-destructing email: a method of self-destructing email system. In: IEEE international congress on big data. IEEE Computer Society, New York, pp 304–309. https://doi.org/10.1109/BigData.Congress.2014.51

  11. Leach PJ, Mealling M, Salz R (2005) RFC 4122: a universally unique identifier (UUID) URN namespace. IETF. https://doi.org/10.17487/RFC4122

  12. Berners-Lee T, Connolly D (1995) RFC 1866 hypertext markup language-2.0. IETF. https://doi.org/10.17487/RFC1866

  13. Fielding R, Gettys J, Mogul J (1999) RFC 2616: hypertext transfer protocol—HTTP/1.1. IETF. https://doi.org/10.17487/RFC2616

  14. Geambasu R, Kohno T, Levy AA (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, pp 299–316

  15. Wu H, Fu X, Wang ZJ (2015) Self-destructing data method based on privacy cloud. In: International conference on logistics engineering, management and computer science (LEMCS 2015), pp 1207–1211. https://doi.org/10.2991/lemcs-15.2015.241

  16. Freed N, Borenstein N (1996) RFC 2045: multipurpose internet mail extensions (MIME) part one: format of internet message bodies. IETF. https://doi.org/10.17487/RFC2045

  17. Freed N, Borenstein N (1996) RFC 2046: multipurpose internet mail extensions (MIME) part two: media types. IETF. https://doi.org/10.17487/RFC2046

Download references

Acknowledgements

This paper was supported by the Jiangsu Provincial Water Conservancy Science and Technology Project (2018056), the Fundamental Research Funds for the Central Universities (2016B14014), the Six Talent Peaks Project in Jiangsu Province (RJFW-032) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Fu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fu, X., Wang, Z., Chen, Y. et al. Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment. SOCA 13, 95–103 (2019). https://doi.org/10.1007/s11761-019-00258-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-019-00258-w

Keywords

Navigation