Affiliation:
1. University of Northern Iowa, Cedar Falls, IA
2. Florida State University, Tallahassee, FL
3. Harvey Mudd College, Claremont, CA
Abstract
One important aspect of privacy is the ability to securely delete sensitive data from electronic storage in such a way that it cannot be recovered; we call this action
secure deletion
. Short of physically destroying the entire storage medium, existing software secure-deletion solutions tend to be piecemeal at best -- they may only work for one type of storage or file system, may force the user to delete all files instead of selected ones, may require the added complexities of encryption and key storage, may require extensive changes and additions to the computer's operating system or storage firmware, and may not handle system crashes gracefully.
We present TrueErase, a holistic secure-deletion framework for individual systems that contain sensitive data. Through design, implementation, verification, and evaluation on both a hard drive and NAND flash, TrueErase shows that it is possible to construct a per-file, secure-deletion framework that can accommodate different storage media and legacy file systems, require limited changes to legacy systems, and handle common crash scenarios. TrueErase can serve as a building block by cryptographic systems that securely delete information by erasing encryption keys. The overhead is dependent on spatial locality, number of sensitive files, and workload (computational- or I/O-bound).
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture
Reference91 articles.
1. B. Allen and D. Gilbert. 2007. Bad Block HOWTO for Smartmontools. http://smartmontools.sourceforge.net/badblockhowto.html. B. Allen and D. Gilbert. 2007. Bad Block HOWTO for Smartmontools. http://smartmontools.sourceforge.net/badblockhowto.html.
2. Apple Inc. 2012. Mac OS X Security Configuration for Mac OS X Version 10.6 Snow Leopard. http://images.apple.com/support/security/guides/docs/SnowLeopard_Security_Config_v10.6.pdf. Apple Inc. 2012. Mac OS X Security Configuration for Mac OS X Version 10.6 Snow Leopard. http://images.apple.com/support/security/guides/docs/SnowLeopard_Security_Config_v10.6.pdf.
3. A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances;Computers & Security;2023-10
2. Data Sanitization on eMMCs;Proceedings of the 28th Asia and South Pacific Design Automation Conference;2023-01-16
3. Confidential Data Storage;Encyclopedia of Cryptography, Security and Privacy;2022-11-24
4. NASA: NVM-Assisted Secure Deletion for Flash Memory;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2022-11
5. CPSD: A data security deletion algorithm based on copyback command;2022 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA);2022-06-24