A Survey of Confidential Data Storage and Deletion Methods

被引:47
作者
Diesburg, Sarah M. [1 ]
Wang, An-I Andy [1 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
基金
美国国家科学基金会;
关键词
Human Factors; Legal Aspects; Performance; Security; Data overwriting techniques; data theft; personal privacy; secure deletion; secure erasure;
D O I
10.1145/1824795.1824797
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.
引用
收藏
页数:37
相关论文
共 100 条
[1]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[2]  
[Anonymous], P 1 USENIX C FIL STO
[3]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[4]  
[Anonymous], 2003, NIST Special Publication
[5]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[6]  
[Anonymous], 1998, RFC 2401
[7]  
[Anonymous], P 11 WORKSH ACM SIGO
[8]  
[Anonymous], 2007, CSI Survey 2007: The 12th Annual Computer Crime and Security Survey
[9]  
[Anonymous], 2005, ACM Transactions on Storage
[10]  
[Anonymous], 2003, P 2 USENIX C FIL STO