2016
DOI: 10.1007/978-3-319-28778-2_5
|View full text |Cite
|
Sign up to set email alerts
|

User-Level Secure Deletion on Log-Structured File Systems

Abstract: We address the problem of secure data deletion on logstructured file systems. We focus on the YAFFS file system, used on Android smartphones, and on the flash translation layer (FTL), used in SD cards and USB memory sticks. We show that neither of these systems provide temporal data deletion guarantees and that deleted data remains indefinitely on these systems if the storage medium is not used after the data is marked for deletion. Moreover, the time that data remains on log-structured file systems increases … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Reardon et al developed a secure deletion tool for the Android OS that will monitor the amount of free space and fill it with random data. This ensures unwanted data marked as invalid are filled with random data to achieve random deletion.…”
Section: Secure Flash Storage Deletionmentioning
confidence: 99%
“…Reardon et al developed a secure deletion tool for the Android OS that will monitor the amount of free space and fill it with random data. This ensures unwanted data marked as invalid are filled with random data to achieve random deletion.…”
Section: Secure Flash Storage Deletionmentioning
confidence: 99%
“…A user-level secure deletion scheme named purging is proposed in [20], which requires no modifications to the storage system. Since the user does not have direct control to the lower-level storage controller, a passive method is applied: the user should fill all the empty space in the file system with as much junk files as it can holds.…”
Section: Related Work On Ssd Secure Deletionmentioning
confidence: 99%
“…S. M. Diesburg, et al, summarized and compared existing methods of providing confidential storage and deletion of data in personal computing environments [6]. Paper [8] shows that these systems provide no temporal guarantees on data deletion and that deleted data still persists for nearly 44 hours with average phone use and indefinitely if the phone is not used after the deletion. They proposed three mechanisms for secure deletion on log-structured file systems.…”
Section: Related Workmentioning
confidence: 99%
“…They proposed three mechanisms for secure deletion on log-structured file systems. R. Joel, et al, presented three user-level solutions for secure deletion on log-structured file systems assuming a coercive attacker capable of compromising both the storage medium and any secret keys required to access it [9]. The principle behind their three solutions -purging, ballooning, and our hybrid solution-is that they reduce the file system's available free space to encourage more frequent garbage collection, thereby decreasing the deletion latency of deleted data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation