Abstract
Blockchain prospers in a second mining fever long after the one that occurred in the 1840s. Assumed to be an ark carrying all the data into the brave new world, blockchain provides limited tickets that all the miners struggled to win. Ultimate resources have been wasted to involve the proof-of-work game in order to dig up bitcoins even in countries of the third world. So we strive to design another storage structure with self-destructing mechanism that can provide high-efficiency concurrency and which is more important security for all the users and all types of data. The data would vanish after expiration that could be set by the user in this structure named Bead Strand Model, and this humanitarian mechanism makes it more acceptable than blockchain by the people who concerned privacy and security in cloud environment.
Similar content being viewed by others
References
Peck ME (2017) Why the biggest bitcoin mines are in China. In: IEEE spectrum
Wang C (2017) A visit to a bitcoin mining farm in Sichuan. China Reveals Troubles Beyond Regulation. www.bitcoin.com
Zhang N, Wang Y, Kang C (2016) Blockchain technique in the energy internet: preliminary research framework and typical applications. Proc Chin Soc Electr Eng 15(36):4011–4022. https://doi.org/10.13334/j.0258-8013.pcsee.161311
Liu Q, Chen T, Cai J (2012) Enlister: baidu’s recommender system for the biggest Chinese Q and A website. In: ACM conference on recommender systems. ACM, New York, pp 285–288. https://doi.org/10.1145/2365952.2366016
Abkowitz A, Chin J (2016) China launches Baidu probe after the death of a student. Wall Street J 20160502. https://www.wsj.com/articles/china-launches-baidu-probe-after-the-death-of-a-student-1462209685
Liu C (2017) Research on the application of block chain technology in the construction of social credit system in China. Credit Ref 8:28–32
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org
Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops. IEEE Computer Society, New York, pp 180–184. https://doi.org/10.1109/SPW.2015.27
Kumar S, Paar C, Pelzl J (2006) How to break DES for Euro 8,980. In: 2nd workshop on special-purpose hardware for attacking cryptographic systems, Cologne
Fu X, Wang ZJ, Wu H (2014) How to send a self-destructing email: a method of self-destructing email system. In: IEEE international congress on big data. IEEE Computer Society, New York, pp 304–309. https://doi.org/10.1109/BigData.Congress.2014.51
Leach PJ, Mealling M, Salz R (2005) RFC 4122: a universally unique identifier (UUID) URN namespace. IETF. https://doi.org/10.17487/RFC4122
Berners-Lee T, Connolly D (1995) RFC 1866 hypertext markup language-2.0. IETF. https://doi.org/10.17487/RFC1866
Fielding R, Gettys J, Mogul J (1999) RFC 2616: hypertext transfer protocol—HTTP/1.1. IETF. https://doi.org/10.17487/RFC2616
Geambasu R, Kohno T, Levy AA (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, pp 299–316
Wu H, Fu X, Wang ZJ (2015) Self-destructing data method based on privacy cloud. In: International conference on logistics engineering, management and computer science (LEMCS 2015), pp 1207–1211. https://doi.org/10.2991/lemcs-15.2015.241
Freed N, Borenstein N (1996) RFC 2045: multipurpose internet mail extensions (MIME) part one: format of internet message bodies. IETF. https://doi.org/10.17487/RFC2045
Freed N, Borenstein N (1996) RFC 2046: multipurpose internet mail extensions (MIME) part two: media types. IETF. https://doi.org/10.17487/RFC2046
Acknowledgements
This paper was supported by the Jiangsu Provincial Water Conservancy Science and Technology Project (2018056), the Fundamental Research Funds for the Central Universities (2016B14014), the Six Talent Peaks Project in Jiangsu Province (RJFW-032) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Fu, X., Wang, Z., Chen, Y. et al. Bead Strand Model: a high-efficiency storage structure for self-destructing data in cloud environment. SOCA 13, 95–103 (2019). https://doi.org/10.1007/s11761-019-00258-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11761-019-00258-w