[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2414456.2414493acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

User-level secure deletion on log-structured file systems

Published: 02 May 2012 Publication History

Abstract

Deleting a file from a storage medium serves two purposes: it reclaims storage resources and ensures that any sensitive information contained in the file becomes inaccessible. When done for the latter purpose, it is critical that the file is securely deleted, meaning that its content does not persist on the storage medium after deletion. Secure deletion is the act of deleting data from a storage medium such that the data is afterwards irrecoverable from the storage medium. The time between deleting data and it becoming irrecoverable is called the deletion latency.

References

[1]
S. Bauer and N. B. Priyantha. Secure Data Deletion for Linux File Systems. Usenix Security Symposium, pages 152--164, 2001.
[2]
E. Gal and S. Toledo. Algorithms and data structures for flash memories. ACM Computing Surveys, 37: 138--163, 2005.
[3]
Micron Technology, Inc. Technical Note: Design and Use Considerations for NAND Flash Memory. 2006.
[4]
M. Rosenblum and J. K. Ousterhout. The Design and Implementation of a Log-Structured File System. ACM Transactions on Computer Systems, 10: 1--15, 1992.

Cited By

View all
  • (2024)Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDsACM Transactions on Storage10.1145/363982620:2(1-23)Online publication date: 19-Feb-2024
  • (2023)Lethe: Secure Deletion by AdditionProceedings of the 3rd Workshop on Challenges and Opportunities of Efficient and Performant Storage Systems10.1145/3578353.3589541(1-8)Online publication date: 8-May-2023
  • (2023)Reaping Both Latency and Reliability Benefits With Elaborate Sanitization Design for 3D TLC NAND FlashIEEE Transactions on Computers10.1109/TC.2023.327228072:11(3029-3041)Online publication date: Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
May 2012
119 pages
ISBN:9781450316484
DOI:10.1145/2414456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. flash memory
  2. privacy
  3. secure deletion

Qualifiers

  • Research-article

Conference

ASIA CCS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDsACM Transactions on Storage10.1145/363982620:2(1-23)Online publication date: 19-Feb-2024
  • (2023)Lethe: Secure Deletion by AdditionProceedings of the 3rd Workshop on Challenges and Opportunities of Efficient and Performant Storage Systems10.1145/3578353.3589541(1-8)Online publication date: 8-May-2023
  • (2023)Reaping Both Latency and Reliability Benefits With Elaborate Sanitization Design for 3D TLC NAND FlashIEEE Transactions on Computers10.1109/TC.2023.327228072:11(3029-3041)Online publication date: Nov-2023
  • (2022)Instant data sanitization on multi-level-cell NAND flash memoryProceedings of the 15th ACM International Conference on Systems and Storage10.1145/3534056.3534941(85-95)Online publication date: 6-Jun-2022
  • (2022)ADS: Leveraging Approximate Data for Efficient Data Sanitization in SSDsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.310027441:6(1771-1784)Online publication date: Jun-2022
  • (2022)Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile DevicesIEEE Internet of Things Journal10.1109/JIOT.2021.31195149:12(10093-10107)Online publication date: 15-Jun-2022
  • (2022)Forensic analysis of image deletion applicationsMultimedia Tools and Applications10.1007/s11042-021-11619-z81:14(19559-19586)Online publication date: 16-Feb-2022
  • (2020)Challenges and Designs for Secure Deletion in Storage Systems2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)10.1109/Indo-TaiwanICAN48429.2020.9181335(181-189)Online publication date: Feb-2020
  • (2019)Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)10.1109/ICCAD45719.2019.8942084(1-8)Online publication date: Nov-2019
  • (2018)Scrubbing-Aware Secure Deletion for 3-D NAND FlashIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.285726037:11(2790-2801)Online publication date: Nov-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media