A Lifecycle Controlling Method of Documents Based on Deadline and Access Times
- DOI
- 10.2991/lemcs-15.2015.257How to use a DOI?
- Keywords
- Documents; Lifecycle; Deadline; Times; destruction strategies
- Abstract
With the growing popularity of the online-service in cloud, users' data security protection has gradually become a new challenge. After one user sends his documents to the other, the files are no longer under the user's control. Once he needs the receiver to destroy data, he cannot ensure that the data is really thoroughly destructed. This paper provides a lifecycle controlling method of files, which is based on deadline and times. Deadline, times and destruction strategies are as attributes in the header of files. Files are made in new ones which contain storage layer and controller layer by double hash calculations. The method does not require intervention of any user or a trusted third one. A file will destruct itself according to the destruction strategy in the attributes after its deadline or times of access. The model presented in this paper has been proven simple and practical in practice and applied in three companies.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Jiaqi Yang AU - Zhijian Wang AU - Xiao Fu AU - Yu Wang PY - 2015/07 DA - 2015/07 TI - A Lifecycle Controlling Method of Documents Based on Deadline and Access Times BT - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science PB - Atlantis Press SP - 1288 EP - 1294 SN - 1951-6851 UR - https://doi.org/10.2991/lemcs-15.2015.257 DO - 10.2991/lemcs-15.2015.257 ID - Yang2015/07 ER -