Affiliation:
1. Florida State University
Abstract
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.
Funder
U.S. Department of Energy
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Cited by
55 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The impact of data imputation on air quality prediction problem;PLOS ONE;2024-09-12
2. Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing;International Journal of Advanced Research in Science, Communication and Technology;2024-08-08
3. ExD: Explainable Deletion;New Security Paradigms Workshop;2023-09-18
4. Mix&slice for Efficient Access Revocation on Outsourced Data;IEEE Transactions on Dependable and Secure Computing;2023
5. Confidential Data Storage;Encyclopedia of Cryptography, Security and Privacy;2022-11-24