IDas: Enhancing Security for Data Storage in Active Storage Framework by Automatic Data Identity Destructing Mechanism



Popularization of cloud innovation and everyday use of portable Internet has turned out to be exceptionally basic in the present quick moving world where individuals are subjected to post their own data like record numbers, passwords, notes, and distinctive key data. This data are stored, duplicated, and filed by Cloud Service Providers (CSPs), normally for clients' approval and administration. There are high possibilities for the data to fall into wrong side utilization where it could be gotten to unlawfully without the clients' learning. In such circumstances security for the data on cloud must be expanded. Identity destructing data mainly goes for ensuring the clients' data classification. Every one of the data and their duplicates progress toward becoming destructed or hazy after a client indicated time, with no intercession from the client part. IDas system addresses this difficulty by another mix of cryptographic procedures and active storage structure in light of T10 OSD standard. These security strategies and its functionalities ensure that IDas meets all protection safeguarding approaches and is simple for viable utilize. Contrasted with the system without IDas the execution for transferring/downloading records has been accomplished better.


R.Geambasu, T.Kohno, A.Levy, and H.M.Levy, “Vanish:
Increasing data privacy with self-destructing data,” in Proc.
USENIX Security Symp., Montreal, Canada, Aug. 2009, pp.
[2] Shamir, “How to share a secret,” Commun. ACM, vol. 22, no.
11, pp. 612–613, 1979.
[3] S.Wolchok, O.S.Hofmann, N.Heninger, E.W.Felten,
J.A.Halderman, C.J.Rossbach, B.Waters, and E.Witchel,
“Defeating vanish with low-cost sybil attacks against large
DHEs,” in Proc. Network and Distributed System Security
Symp., 2010.
[4] L.Zeng, Z.Shi, S.Xu, and D.Feng, “Safevanish: An improved
data self-destruction for protecting data privacy,” in Proc.
Second Int. Conf. Cloud Computing Technology and Science
(CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
[5] L.Qin and D.Feng, “Active storage framework for object-based
storage device,” in Proc. IEEE 20th Int. Conf. Advanced
Information Networking and Applications (AINA), 2006.
[6] Y.Zhang and D.Feng, “An active storage system for high
performance computing,” in Proc. 22nd Int. Conf. Advanced
Information Networking and Applications (AINA), 2008, pp.
[7] T.M.John, A.T.Ramani, and J.A.Chandy, “Active storage using
object-based devices,” in Proc. IEEE Int. Conf. Cluster
Computing, 2008, pp. 472–478.
[8] Devulapalli, I.T.Murugandi, D.Xu, and P.Wyckoff, 2009,
Design of an intelligent object-based storage device [Online].
Available: research/network_
file/projects/object/ Researches/istor-tr.pdf
[9] S.W.Son, S.Lang, P.Carns, R.Ross, R.Thakur, B.Ozisikyilmaz,
W.K.Liao, and A.Choudhary, “Enabling active storage on
parallel I/O software stacks,” in Proc. IEEE 26th Symp. Mass
Storage Systems and Technologies (MSST), 2010.
[10] Y.Xie, K.K.Muniswamy-Reddy, D.Feng, D.D.E.Long, Y.Kang,
Z.Niu, and Z.Tan, “Design and evaluation of oasis: An active
storage framework based on t10 osd standard,” in Proc. 27th
IEEE Symp. Massive Storage Systems and Technologies
(MSST), 2011.
[11] A.Acharya, M.Uysal, and J.Saltz. Active disks: Programming
model, algorithms and evaluation. In Proceedings of the Eighth
International Conference on Architectural Support for
Programming Languages and Operating Systems, pages 81–91,
[12] A.Aggarwal and J.S.Vitter. The Input/Output complexity of
sorting and related problems. Communications of the ACM,
31(9):1116–1127, 1988.
[13] K.Amiri, G.Gibson, and R.Golding. Highly concurrent shared
storage. In 20th International Conference on Distributed
Computing Systems (ICDCS ’00), pages 298–307. IEEE, Apr.
[14] K.Amiri, D.Petrou, G.R.Ganger, and G.A.Gibson. Dynamic
function placement for data-intensive cluster computing. In
Proceedings of the 2000 USENIX Annual Technical
Conference (USENIX-00), pages 307–322, Berkeley, CA, June
18–23 2000. USENIX.
[15] K.S.Amiri. Scalable and manageable storage systems. PhD
thesis, Department of Electrical and Computer Engineering,
Carnegie Mellon University, 2000.
International Journal of Applied Engineering and Technical Research Vol.1(3), August 2017, E-ISSN: xxxx-xxxx
© 2017, IJAETR All Rights Reserved 13
[16] Y.Kang, J.Yang, and E.L.Miller, “Object-based SCM: An
efficient interface for storage class memories,” in Proc. 27th
IEEE Symp. Massive Storage Systems and Technologies
(MSST), 2011. [26] [Online]. Available:
[17] B.Welch, M.Unangst, Z.Abbasi, G.Gibson, B.Mueller, J.Small,
J.Zelenka, and B.Zhou, “Scalable performance of the panasas
parallel file system,” in Proc. 6th USENIX Conf. File and
Storage Technologies (FAST), 2008.
[18] S.A.Weil, S.A.Brandt, E.L.Miller, D.D.E.Long, and
C.Maltzahn, “Ceph: A scalable, high-performance distributed
file system,” in Proc. 7th Symp. Operating Systems Design and
Implementation (OSDI), 2006.
How to Cite
KUMAR, RAJ. IDas: Enhancing Security for Data Storage in Active Storage Framework by Automatic Data Identity Destructing Mechanism. International Journal of Applied Engineering and Technical Research- IJAETR, [S.l.], v. 1, n. 3, p. 7, oct. 2017. ISSN 0000-0000. Available at: <>. Date accessed: 20 jan. 2019.