SIGMOD '86 Proceedings of the 1986 ACM SIGMOD international conference on Management of data
ACM Transactions on Database Systems (TODS)
Oblivious data structures: applications to cryptography
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Principles of transaction processing: for the systems professional
Principles of transaction processing: for the systems professional
Anti-presistence: history independent data structures
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Database Management Systems
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Digital Evidence and Computer Crime
Digital Evidence and Computer Crime
Database Systems Concepts
File System Forensic Analysis
Data lifetime is a systems problem
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Forensic analysis of database tampering
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools
IEEE Security and Privacy
Design principles and patterns for computer systems that are simultaneously secure and usable
Design principles and patterns for computer systems that are simultaneously secure and usable
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Shredding your garbage: reducing data lifetime through secure deallocation
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
The ephemerizer: making data disappear
The ephemerizer: making data disappear
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Forensic analysis of database tampering
ACM Transactions on Database Systems (TODS)
Records retention in relational database systems
Proceedings of the 17th ACM conference on Information and knowledge management
Data degradation: making private data less sensitive over time
Proceedings of the 17th ACM conference on Information and knowledge management
The Right Expert at the Right Time and Place
PAKM '08 Proceedings of the 7th International Conference on Practical Aspects of Knowledge Management
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Proceedings of the 13th International Conference on Extending Database Technology
Building disclosure risk aware query optimizers for relational databases
Proceedings of the VLDB Endowment
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
2010 Information Security Curriculum Development Conference
Just-in-time analytics on large file systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Windows Mobile advanced forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
On metadata context in Database Forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Auditing a database under retention policies
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistence of data stored in database systems. This data can be recovered by forensic analysis, and it poses a threat to privacy. First, we show how data remnants are preserved in database table storage, the transaction log, indexes, and other system components. Our evaluation of several real database systems reveals that deleted data is not securely removed from database storage and that users have little control over the persistence of deleted data. Second, we address the problem of unintended data retention by proposing a set of system transparency criteria: data retention should be avoided when possible, evident to users when it cannot be avoided, and bounded in time. Third, we propose specific techniques for secure record deletion and log expunction that increase the transparency of database systems, making them more resistant to forensic analysis.