One big file is not enough: a critical evaluation of the dominant free-space sanitization technique

  • Authors:
  • Simson L. Garfinkel;David J. Malan

  • Affiliations:
  • Center for Research on Computation and Society, Harvard University;Division of Engineering and Applied Sciences, Harvard University

  • Venue:
  • PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many of today's privacy-preserving tools create a big file that fills up a hard drive or USB storage device in an effort to overwrite all of the “deleted files” that the media contain. But while this technique is widespread, it is largely unvalidated. We evaluate the effectiveness of the “big file technique” using sector-by-sector disk imaging on file systems running under Windows, Mac OS, Linux, and FreeBSD. We find the big file is effective in overwriting file data on FAT32, NTFS, and HFS, but not on Ext2fs, Ext3fs, or Reiserfs. In one case, a total of 248 individual files consisting of 1.75MB of disk space could be recovered in their entirety. Also, file metadata such as filenames are rarely overwritten. We present a theoretical analysis of the file sanitization problem and evaluate the effectiveness of a commercial implementation that implements an improved strategy.