Visible to the public FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table

TitleFlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Publication TypeConference Paper
Year of Publication2019
AuthorsZhu, Yan, Yang, Shuai, Chu, William Cheng-Chung, Feng, Rongquan
Conference Name2019 IEEE International Conference on Services Computing (SCC)
Keywordsautomatic data sanitization system, compositionality, computer network reliability, computer network security, cryptography, data deletion, data privacy, Data Sanitization, data self destructing, FlashGhost, frequent colliding hash table, hash collision, Human Behavior, Indexes, Instant messaging, Internet, life cycle, Mathematical model, privacy, privacy protection, pubcrawl, resilience, secret sharing, Servers, system reliability, threshold cryptography
Abstract

Today's extensive use of Internet creates huge volumes of data by users in both client and server sides. Normally users don't want to store all the data in local as well as keep archive in the server. For some unwanted data, such as trash, cache and private data, needs to be deleted periodically. Explicit deletion could be applied to the local data, while it is a troublesome job. But there is no transparency to users on the personal data stored in the server. Since we have no knowledge of whether they're cached, copied and archived by the third parties, or sold by the service provider. Our research seeks to provide an automatic data sanitization system to make data could be self-destructing. Specifically, we give data a life cycle, which would be erased automatically when at the end of its life, and the destroyed data cannot be recovered by any effort. In this paper, we present FlashGhost, which is a system that meets this challenge through a novel integration of cryptography techniques with the frequent colliding hash table. In this system, data will be unreadable and rendered unrecoverable by overwriting multiple times after its validity period has expired. Besides, the system reliability is enhanced by threshold cryptography. We also present a mathematical model and verify it by a number of experiments, which demonstrate theoretically and experimentally our system is practical to use and meet the data auto-sanitization goal described above.

DOI10.1109/SCC.2019.00026
Citation Keyzhu_flashghost:_2019