Proceedings of the Second ACM Workshop on Storage Security and Survivability 2006
DOI: 10.1145/1179559.1179571
|View full text |Cite
|
Sign up to set email alerts
|

Secure deletion myths, issues, and solutions

Abstract: This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwriting tools work well, and that securely deleted files must be overwritten many times. (2) We discuss new and important issues that are often neglected: secure deletion consistency in case of power failures, handling versioning and journalling file systems, and meta-data overwriting. (3) We present two solutions for on-demand secure del… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
11
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(15 citation statements)
references
References 11 publications
1
11
0
Order By: Relevance
“…This has the advantage of quickly erasing data since only a small block of data (16 bytes for AES-128) needs to be overwritten. However, if the key is saved on the disk, cryptography may not add much security in ensuring data deletion [16]. On the contrary, it may even degrade security if not handled properly -instead of recovering a large amount of overwritten data, the attacker now just needs to recover a short 128-bit key.…”
Section: Key Managementmentioning
confidence: 99%
“…This has the advantage of quickly erasing data since only a small block of data (16 bytes for AES-128) needs to be overwritten. However, if the key is saved on the disk, cryptography may not add much security in ensuring data deletion [16]. On the contrary, it may even degrade security if not handled properly -instead of recovering a large amount of overwritten data, the attacker now just needs to recover a short 128-bit key.…”
Section: Key Managementmentioning
confidence: 99%
“…Kernel-level secure deletion solutions have been proposed for some widely-used block-structured file systems [2,17,18]. These solutions typically modify the kernel and enforce that when any data chunk is marked for deletion, it is then overwritten with arbitrary data.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to bad sector forwarding, persistent caches have been placed in disk-storage systems to improve performance [Joukov et al 2006]. These caches may not only defer writing to the actual physical media, but may also aggregate multiple writes to the same location on the disk as a single write.…”
Section: Hard-disk Issuesmentioning
confidence: 99%