TY - GEN
T1 - Secure deletion myths, issues, and solutions
AU - Joukov, Nikolai
AU - Papaxenopoulos, Harry
AU - Zadok, Erez
PY - 2006
Y1 - 2006
N2 - This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwriting tools work well, and that securely deleted files must be overwritten many times. (2) We discuss new and important issues that are often neglected: secure deletion consistency in case of power failures, handling versioning and journalling file systems, and metadata overwriting. (3) We present two solutions for on-demand secure deletion. First, we have created a highly portable and flexible system that performs only the minimal amount of work in kernel mode. Second, we present two in-kernel solutions in the form of Ext3 file system patches that can perform comprehensive data and metadata overwriting. We evaluated our proposed solutions and discuss the trade-offs involved.
AB - This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwriting tools work well, and that securely deleted files must be overwritten many times. (2) We discuss new and important issues that are often neglected: secure deletion consistency in case of power failures, handling versioning and journalling file systems, and metadata overwriting. (3) We present two solutions for on-demand secure deletion. First, we have created a highly portable and flexible system that performs only the minimal amount of work in kernel mode. Second, we present two in-kernel solutions in the form of Ext3 file system patches that can perform comprehensive data and metadata overwriting. We evaluated our proposed solutions and discuss the trade-offs involved.
KW - File systems
KW - Secure deletion
KW - Security
KW - Unintended data recovery
UR - https://www.scopus.com/pages/publications/34547403849
U2 - 10.1145/1179559.1179571
DO - 10.1145/1179559.1179571
M3 - Conference contribution
SN - 1595935525
SN - 9781595935526
T3 - Proceedings of the Second ACM International Workshop on Storage Security and Survivability, Storage SS'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
SP - 61
EP - 66
BT - Proceedings of the Second ACM International Workshop on Storage Security and Survivability, StorageSS'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
T2 - 2nd ACM International Workshop on Storage Security and Survivability, StorageSS'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
Y2 - 30 October 2006 through 30 October 2006
ER -