FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table

被引:1
|
作者
Zhu, Yan [1 ]
Yang, Shuai [1 ]
Chu, William Cheng-Chung [2 ]
Feng, Rongquan [3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Tunghai Univ, Dept Comp Sci, Taichung, Taiwan
[3] Peking Univ, Sch Math Sci, Beijing, Peoples R China
关键词
data privacy; data self destructing; secret sharing; hash collision; data sanitization; SELF-DESTRUCTING SCHEME;
D O I
10.1109/SCC.2019.00026
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Today's extensive use of Internet creates huge volumes of data by users in both client and server sides. Normally users don't want to store all the data in local as well as keep archive in the server. For some unwanted data, such as trash, cache and private data, needs to be deleted periodically. Explicit deletion could be applied to the local data, while it is a troublesome job. But there is no transparency to users on the personal data stored in the server. Since we have no knowledge of whether they're cached, copied and archived by the third parties, or sold by the service provider. Our research seeks to provide an automatic data sanitization system to make data could be self-destructing. Specifically, we give data a life cycle, which would be erased automatically when at the end of its life, and the destroyed data cannot be recovered by any effort. In this paper, we present FlashGhost, which is a system that meets this challenge through a novel integration of cryptography techniques with the frequent colliding hash table. In this system, data will be unreadable and rendered unrecoverable by overwriting multiple times after its validity period has expired. Besides, the system reliability is enhanced by threshold cryptography. We also present a mathematical model and verify it by a number of experiments, which demonstrate theoretically and experimentally our system is practical to use and meet the data auto-sanitization goal described above.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 50 条
  • [1] Privacy Protection System of EMR Based on Hash Chain
    Dang Ying
    Zhang Jiangxiao
    Dang Wei
    Dai Xulei
    Li Ruiyu
    Li Yue
    Li Meng
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY, MANAGEMENT AND HUMANITIES SCIENCE (ETMHS 2017), 2017, : 10 - 13
  • [2] Frequent Items Mining on Data Stream Using Hash-Table and Heap
    Shan, Zhang
    Ling, Chen
    Li, Tu
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009, : 141 - +
  • [3] Robust and lossless data privacy preservation: optimal key based data sanitization
    G. K. Shailaja
    C. V. Guru Rao
    [J]. Evolutionary Intelligence, 2022, 15 : 1123 - 1134
  • [4] Robust and lossless data privacy preservation: optimal key based data sanitization
    Shailaja, G. K.
    Rao, C. V. Guru
    [J]. EVOLUTIONARY INTELLIGENCE, 2022, 15 (02) : 1123 - 1134
  • [5] A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
    Ming-Tai, Jimmy
    Lin, Jerry Chun-Wei
    Djenouri, Youcef
    Fournier-Viger, Philippe
    Zhang, Yuyu
    [J]. 2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2019, : 1461 - 1467
  • [6] A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
    Zhang, Yongxiong
    You, Yucong
    Wang, Liangming
    Yi, Luxia
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 254 - 257
  • [7] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [8] Image encryption algorithm based on lattice hash function and privacy protection
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Lu, Tianyu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) : 18251 - 18277
  • [9] Image encryption algorithm based on lattice hash function and privacy protection
    Yu Wang
    Liquan Chen
    Kunliang Yu
    Tianyu Lu
    [J]. Multimedia Tools and Applications, 2022, 81 : 18251 - 18277
  • [10] ERASE- EntRopy-based SAnitization of SEnsitive Data for Privacy Preservation
    Medsger, Jeffrey
    Srinivasan, Avinash
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 427 - 432