A survey of confidential data storage and deletion methods

  • Authors:
  • Sarah M. Diesburg;An-I Andy Wang

  • Affiliations:
  • Florida State University;Florida State University

  • Venue:
  • ACM Computing Surveys (CSUR)
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.