Proceedings of the 30th Annual Computer Security Applications Conference 2014
DOI: 10.1145/2664243.2664287
|View full text |Cite
|
Sign up to set email alerts
|

Assisted deletion of related content

Abstract: On primary storage systems content is often replicated, converted or modified, and the users quickly lose control over its dispersal on the system. Deleting content related to a particular project from the system therefore becomes a labor-intensive task for the user. In this paper we present IRCUS, a system that assists the user in securely removing project-related content, but does not require changes to the user's behavior or to any of the system components, such as the file system, kernel or applications. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…In second experiment evaluate performance time evaluation between propose as well as some existing approaches. Four different existing approaches has been evaluated in Figure 2 like [5,6,7,8], according to that experiment analysis system shows how propose system provides better results than classical approaches..…”
Section: Results Illustration and Experiments Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In second experiment evaluate performance time evaluation between propose as well as some existing approaches. Four different existing approaches has been evaluated in Figure 2 like [5,6,7,8], according to that experiment analysis system shows how propose system provides better results than classical approaches..…”
Section: Results Illustration and Experiments Analysismentioning
confidence: 99%
“…We can use introspection techniques because they will not corrupt the source of evidence while collecting necessary data. According to [6] Content is often repeated, modified or modified on primary storage systems, and users lose control over its dispersion on the system. The content identified with a specific venture from the framework in this way turns into a work escalated errand for the client.…”
Section: Litarature Surveymentioning
confidence: 99%
“…Although the IRCUS system [29] was developed for an entirely different use case, namely that of helping users to identify related content when deleting sensitive data from files or projects, there are many similarities to our proposed approach. First of all, they had the same goal of not changing users' work practices and being able to integrate the service transparently without modifications to applications or the operating system.…”
Section: Related Workmentioning
confidence: 99%