The design and implementation of a log-structured file system
ACM Transactions on Computer Systems (TOCS)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Introduction to Algorithms
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Algorithms and data structures for flash memories
ACM Computing Surveys (CSUR)
Secure deletion myths, issues, and solutions
Proceedings of the second ACM workshop on Storage security and survivability
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Shredding your garbage: reducing data lifetime through secure deallocation
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
A survey of Flash Translation Layer
Journal of Systems Architecture: the EUROMICRO Journal
Characterizing flash memory: anomalies, observations, and applications
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
The ephemerizer: making data disappear
The ephemerizer: making data disappear
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
Reliably erasing data from flash-based solid state drives
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Accelerometers and randomness: perfect together
Proceedings of the fourth ACM conference on Wireless network security
Models and Design of an Adaptive Hybrid Scheme for Secure Deletion of Data in Consumer Electronics
IEEE Transactions on Consumer Electronics
User-level secure deletion on log-structured file systems
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure data deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
We propose the Data Node Encrypted File System (DNEFS), which uses on-the-fly encryption and decryption of file system data nodes to efficiently and securely delete data on flash memory systems. DNEFS is a generic modification of existing flash file systems or controllers that enables secure data deletion while preserving the underlying systems' desirable properties: application-independence, fine-grained data access, wear-levelling, and efficiency. We describe DNEFS both abstractly and in the context of the flash file system UBIFS. We propose UBIFSec, which integrates DNEFS into UBIFS. We implement UBIFSec by extending UBIFS's Linux implementation and we integrate UBIFSec in the Android operating system running on a Google Nexus One smartphone. We show that it is efficient and usable; Android OS and applications (including video and audio playback) run normally on top of UBIFSec. To the best of our knowledge, this work presents the first comprehensive and fully-implemented secure deletion solution that works within the specification of flash memory.