Securely deleting data from storage systems has become difficult today. Most storage space is provided as a virtual resource and traverses many layers between the user and the actual physical storage medium. Operations to properly erase data and wipe out all its traces are typically not foreseen. This paper introduces a cryptographic model for policy-based secure deletion of data in storage systems, whose security relies on the proper erasure of cryptographic keys. Deletion operations are expressed in terms of a deletion policy that describes data destruction through deletion attributes and protection classes. A protection class is first applied to the stored data. Later, a secure deletion operation takes attributes as parameters and tr...
With global personal information flows increasing, efforts have been made to develop principles to s...
Computer usage is increasing constantly every year and reports of companies that have been targeted ...
Even if an encryption algorithm is mathematically strong, humans inevitably make for a weak link in ...
Modern general data privacy regulations in Europe (GDPR) stipulate that, at a user’s request, data p...
Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we ...
The problem of secure data erasure has been extensively studied in the past with a rich body of lite...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
A file system provides secure deletion if, after a file is deleted, an attacker with physical posses...
Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software...
Being able to permanently erase data is a security requirement in many environments. But what that a...
Abstract: In order to ensure a secure data life cycle, it is necessary to delete sensitive data in a...
We consider the problem of logical data erasure, contrasting with physical erasure in the same way t...
Security assurance is an important challenge for modern computing. Intentional information release (...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
With global personal information flows increasing, efforts have been made to develop principles to s...
Computer usage is increasing constantly every year and reports of companies that have been targeted ...
Even if an encryption algorithm is mathematically strong, humans inevitably make for a weak link in ...
Modern general data privacy regulations in Europe (GDPR) stipulate that, at a user’s request, data p...
Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we ...
The problem of secure data erasure has been extensively studied in the past with a rich body of lite...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
A file system provides secure deletion if, after a file is deleted, an attacker with physical posses...
Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software...
Being able to permanently erase data is a security requirement in many environments. But what that a...
Abstract: In order to ensure a secure data life cycle, it is necessary to delete sensitive data in a...
We consider the problem of logical data erasure, contrasting with physical erasure in the same way t...
Security assurance is an important challenge for modern computing. Intentional information release (...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
With global personal information flows increasing, efforts have been made to develop principles to s...
Computer usage is increasing constantly every year and reports of companies that have been targeted ...
Even if an encryption algorithm is mathematically strong, humans inevitably make for a weak link in ...