Fully automated and hidden system for wiping sensitive data

  • Authors:
  • George Pecherle;Cornelia Györödi;Robert Györödi;Bogdan Andronic

  • Affiliations:
  • Department of Computer Science, Faculty of Electrical Engineering and Information Technology, University of Oradea, Oradea, Romania;Department of Computer Science, Faculty of Electrical Engineering and Information Technology, University of Oradea, Oradea, Romania;Department of Computer Science, Faculty of Electrical Engineering and Information Technology, University of Oradea, Oradea, Romania;Department of Computer Science, Faculty of Electrical Engineering and Information Technology, University of Oradea, Oradea, Romania

  • Venue:
  • ECC'10 Proceedings of the 4th conference on European computing conference
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this article, we will describe a method to securely erase sensitive data in fully automated and hidden mode. Compared to other similar technologies, our method has two main advantages. The first one is the ability to run in a fully automated mode, in other words the system is configured once and the computer is protected without requiring any user intervention. The second advantage is the ability to run in a so-called secret mode, in which the system looks like another software, for the main purpose of confusing other users. Our paper will describe the structure and functionality of our system, and some of the most important technologies and algorithms that we have used.