Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SISW.2005.1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Adding Secure Deletion to Your Favorite File System

Published: 13 December 2005 Publication History

Abstract

Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who knowthat this is not true often ignore the issue. Nevertheless, recovering deleted files is trivial and can be performed even by novice hackers. The problem is exacerbated by the widespread of portable and mobile storage devices. This type of unwanted after-deletion data recovery is in part an education problem. Users believe that deleted files are erased, even though they are not. Retraining and educating users is difficult. Therefore, storage systems should behave appropriately - the data should be erased from the storage on a per-delete basis. We found that existing solutions are either inconvenient, inefficient, or insecure. We have designed Purgefs: a file system extension that transparently overwrites files on the per-delete basis. Purgefs can be automatically added to a number of existing and future file systems, including networked and stackable file systems. Purgefs supports multiple policies to trade-off performance with the level of purging guarantees. We demonstrate that Purgefs does not add overheads or perturb users' activity under typical user workloads.

Cited By

View all
  • (2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
  • (2023)Metrics for Sustainability in Data CentersACM SIGEnergy Energy Informatics Review10.1145/3630614.36306223:3(40-46)Online publication date: 25-Oct-2023
  • (2019)eHIFSProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329839(573-585)Online publication date: 2-Jul-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SISW '05: Proceedings of the Third IEEE International Security in Storage Workshop
December 2005
94 pages
ISBN:0769525377

Publisher

IEEE Computer Society

United States

Publication History

Published: 13 December 2005

Author Tags

  1. Security
  2. Unintended data recovery

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
  • (2023)Metrics for Sustainability in Data CentersACM SIGEnergy Energy Informatics Review10.1145/3630614.36306223:3(40-46)Online publication date: 25-Oct-2023
  • (2019)eHIFSProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329839(573-585)Online publication date: 2-Jul-2019
  • (2019)Enabling File-Oriented Fast Secure Deletion on Shingled Magnetic Recording DrivesProceedings of the 56th Annual Design Automation Conference 201910.1145/3316781.3317817(1-6)Online publication date: 2-Jun-2019
  • (2016)NFPSProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897882(305-315)Online publication date: 30-May-2016
  • (2016)TrueEraseACM Transactions on Storage10.1145/285488212:4(1-37)Online publication date: 20-May-2016
  • (2013)Policy-based secure deletionProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516690(259-270)Online publication date: 4-Nov-2013
  • (2012)TrueEraseProceedings of the 28th Annual Computer Security Applications Conference10.1145/2420950.2421013(439-448)Online publication date: 3-Dec-2012
  • (2010)A survey of confidential data storage and deletion methodsACM Computing Surveys10.1145/1824795.182479743:1(1-37)Online publication date: 3-Dec-2010
  • (2009)Managing computer files via artificial intelligence approachesArtificial Intelligence Review10.1007/s10462-009-9129-231:1-4(101-117)Online publication date: 1-Jun-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media