Threshold estimation in self-destructing scheme using regression analysis

Young Ki Kim, Choong Seon Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As technologies and services that leverage cloud computing evolve, more and more businesses or individuals are using them. However, as users increasingly use and store personal information in cloud storage, research on privacy protection models in the cloud environment is becoming more important. A self-destructing scheme has been proposed to prevent the decryption of encrypted user data after a certain period of time using a DHT network. However, the existing privacy protection model does not mention the method of setting the threshold value considering the availability and security of the data. Therefore, in this paper, we propose an optimal threshold finding method considering both data availability and security of privacy protection model by applying regression analysis.

Original languageEnglish
Title of host publication19th Asia-Pacific Network Operations and Management Symposium
Subtitle of host publicationManaging a World of Things, APNOMS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages135-138
Number of pages4
ISBN (Electronic)9781538611012
DOIs
Publication statusPublished - 1 Nov 2017
Event19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017 - Seoul, Korea, Republic of
Duration: 27 Sept 201729 Sept 2017

Publication series

Name19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017

Conference

Conference19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017
Country/TerritoryKorea, Republic of
CitySeoul
Period27/09/1729/09/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • DHT Network
  • Privacy Protection
  • Regression Analysis
  • Self-Destructing Scheme

Fingerprint

Dive into the research topics of 'Threshold estimation in self-destructing scheme using regression analysis'. Together they form a unique fingerprint.

Cite this