A survey of confidential data storage and deletion methods
- 1 November 2010
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 43 (1), 1-37
- https://doi.org/10.1145/1824795.1824797
Abstract
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.Keywords
Funding Information
- U.S. Department of Energy (P200A060279)
This publication has 17 references indexed in Scilit:
- Secure deletion myths, issues, and solutionsPublished by Association for Computing Machinery (ACM) ,2006
- Semantically-smart disk systemsACM SIGMETRICS Performance Evaluation Review, 2006
- Ext3cow: a time-shifting file system for regulatory complianceACM Transactions on Storage, 2005
- Data lifetime is a systems problemPublished by Association for Computing Machinery (ACM) ,2004
- Magnetic imaging on a spin-standJournal of Applied Physics, 2000
- The Zebra striped network file systemACM Transactions on Computer Systems, 1995
- Magnetic force scanning tunneling microscope imaging of overwritten dataIEEE Transactions on Magnetics, 1992
- The design and implementation of a log-structured file systemPublished by Association for Computing Machinery (ACM) ,1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to share a secretCommunications of the ACM, 1979