Communications of the ACM
Security functions for a file repository
ACM SIGOPS Operating Systems Review
Ext3cow: a time-shifting file system for regulatory compliance
ACM Transactions on Storage (TOS)
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Security of erasable memories against adaptive adversaries
Proceedings of the 2005 ACM workshop on Storage security and survivability
Building regulatory compliant storage systems
dg.o '06 Proceedings of the 2006 international conference on Digital government research
Secure deletion myths, issues, and solutions
Proceedings of the second ACM workshop on Storage security and survivability
Threats to privacy in the forensic analysis of database systems
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
Towards tamper-evident storage on patterned media
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Keypad: an auditing file system for theft-prone devices
Proceedings of the sixth conference on Computer systems
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Data node encrypted file system: efficient secure deletion for flash memory
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Timed revocation of user data: long expiration times from existing infrastructure
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
CleanOS: limiting mobile data exposure with idle eviction
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
A secure self-destructing scheme for electronic data
Journal of Computer and System Sciences
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure data deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
We present a system which enables a user to remove a file from both the file system and all the backup tapes on which the file is stored. The ability to remove files from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system to "forget" information rather than protect it. Our system is easy to install and is transparent to the end user. Further, it introduces no slowdown in system performance and little slowdown in the backup procedure.