Affiliation:
1. Florida State University
Abstract
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.
Funder
U.S. Department of Energy
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ExD: Explainable Deletion;New Security Paradigms Workshop;2023-09-18
2. Confidential Data Storage;Encyclopedia of Cryptography, Security and Privacy;2022-11-24
3. vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS;IEEE Transactions on Computers;2022
4. A Survey and Classification of Software-Defined Storage Systems;ACM Computing Surveys;2021-05-31
5. Data Protection in AI Services;ACM Computing Surveys;2021-04