IEEE Spectrum - Linking with light
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Semantically-Smart Disk Systems
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Adding Secure Deletion to Your Favorite File System
SISW '05 Proceedings of the Third IEEE International Security in Storage Workshop
Trusted Computing for Disk Drives and Other Peripherals
IEEE Security and Privacy
Secure deletion myths, issues, and solutions
Proceedings of the second ACM workshop on Storage security and survivability
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
ACM Transactions on Computer Systems (TOCS)
When cryptography meets storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Reliably erasing data from flash-based solid state drives
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Models and Design of an Adaptive Hybrid Scheme for Secure Deletion of Data in Consumer Electronics
IEEE Transactions on Consumer Electronics
Empirical analysis of solid state disk data retention when used with contemporary operating systems
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Data node encrypted file system: efficient secure deletion for flash memory
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Hi-index | 0.00 |
The ability to securely delete sensitive data from electronic storage is becoming important. However, current per-file deletion solutions tend to be limited to a segment of the operating system's storage data path or specific to particular file systems or storage media. This paper introduces TrueErase, a holistic secure-deletion framework. Through its design, implementation, verification, and evaluation, TrueErase shows that it is possible to build a legacy-compatible full-storage-data-path framework that performs per-file secure deletion and works with common file systems and solid-state storage, while handling common system failures. In addition, this framework can serve as a building block for encryption- and tainting-based secure-deletion systems.