Next Article in Journal
Symmetry Adaptation of the Rotation-Vibration Theory for Linear Molecules
Previous Article in Journal
Modeling the Multi-Period and Multi-Classification-Yard Location Problem in a Railway Network
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessFeature PaperArticle
Symmetry 2018, 10(5), 136;

Reinforcement Learning Based Data Self-Destruction Scheme for Secured Data Management

Department of Computer Science and Engineering, Kyung Hee University, Yongin-si 17104, Korea
Databank Systems, Daegu 705-701, Korea
Author to whom correspondence should be addressed.
Received: 2 March 2018 / Revised: 13 April 2018 / Accepted: 23 April 2018 / Published: 27 April 2018
Full-Text   |   PDF [2788 KB, uploaded 3 May 2018]   |  


As technologies and services that leverage cloud computing have evolved, the number of businesses and individuals who use them are increasing rapidly. In the course of using cloud services, as users store and use data that include personal information, research on privacy protection models to protect sensitive information in the cloud environment is becoming more important. As a solution to this problem, a self-destructing scheme has been proposed that prevents the decryption of encrypted user data after a certain period of time using a Distributed Hash Table (DHT) network. However, the existing self-destructing scheme does not mention how to set the number of key shares and the threshold value considering the environment of the dynamic DHT network. This paper proposes a method to set the parameters to generate the key shares needed for the self-destructing scheme considering the availability and security of data. The proposed method defines state, action, and reward of the reinforcement learning model based on the similarity of the graph, and applies the self-destructing scheme process by updating the parameter based on the reinforcement learning model. Through the proposed technique, key sharing parameters can be set in consideration of data availability and security in dynamic DHT network environments. View Full-Text
Keywords: self-destructing scheme; DHT network; privacy protection; reinforcement learning self-destructing scheme; DHT network; privacy protection; reinforcement learning

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Kim, Y.K.; Ullah, S.; Kwon, K.; Jang, Y.; Lee, J.; Hong, C.S. Reinforcement Learning Based Data Self-Destruction Scheme for Secured Data Management. Symmetry 2018, 10, 136.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top