Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure deletion for persistent storage that relies on encryption and key wrap-ping. We define a key disclosure graph that models the adversarial knowledge of the history of key generation and wrapping. We introduce a generic update function and prove that it achieves secure deletion of data against a coercive attacker; instances of the update function implement the update behaviour of all arborescent data structures includ-ing B-Trees, extendible hash tables, linked lists, and oth-ers. We implement a B-Tree instance of our solution. Our implementation is at the block-device layer, allow...
Today’s operating systems, word processors, web browsers, and other common software take no measures...
Many applications like pay-per-view, distribution of digital media etc., require secure group commu...
This paper is a study of persistence in data structures. Ordinary data structures are ephemeral in t...
Abstract—Secure data deletion is the task of deleting data ir-recoverably from a physical medium. In...
Modern general data privacy regulations in Europe (GDPR) stipulate that, at a user’s request, data p...
Securely deleting data from storage systems has become difficult today. Most storage space is provi...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We address the problem of secure data deletion on logstructured file systems. We focus on the YAFFS ...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Security assurance is an important challenge for modern computing. Intentional information release (...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
A file system provides secure deletion if, after a file is deleted, an attacker with physical posses...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
As more mobile storage devices are used in consumer electronics, possibility of user confidential da...
Today’s operating systems, word processors, web browsers, and other common software take no measures...
Many applications like pay-per-view, distribution of digital media etc., require secure group commu...
This paper is a study of persistence in data structures. Ordinary data structures are ephemeral in t...
Abstract—Secure data deletion is the task of deleting data ir-recoverably from a physical medium. In...
Modern general data privacy regulations in Europe (GDPR) stipulate that, at a user’s request, data p...
Securely deleting data from storage systems has become difficult today. Most storage space is provi...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
We consider the problem of efficient key management and user revocation in cryptographic file system...
We address the problem of secure data deletion on logstructured file systems. We focus on the YAFFS ...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Security assurance is an important challenge for modern computing. Intentional information release (...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
A file system provides secure deletion if, after a file is deleted, an attacker with physical posses...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
As more mobile storage devices are used in consumer electronics, possibility of user confidential da...
Today’s operating systems, word processors, web browsers, and other common software take no measures...
Many applications like pay-per-view, distribution of digital media etc., require secure group commu...
This paper is a study of persistence in data structures. Ordinary data structures are ephemeral in t...