Assured deletion in the cloud: requirements, challenges and future directions
Inadvertent exposure of sensitive data is a major concern for potential cloud customers.
Much focus has been on other data leakage vectors, such as side channel attacks, while …
Much focus has been on other data leakage vectors, such as side channel attacks, while …
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances
NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT
security, these retention issues are significant and require a robust solution for secure …
security, these retention issues are significant and require a robust solution for secure …
Assure deletion supporting dynamic insertion for outsourced data in cloud computing
C Yang, Y Liu, X Tao - International Journal of Distributed …, 2020 - journals.sagepub.com
With the rapid development of cloud computing, an increasing number of data owners are
willing to employ cloud storage service. In cloud storage, the resource-constraint data …
willing to employ cloud storage service. In cloud storage, the resource-constraint data …
Duplicates also matter! towards secure deletion on flash-based storage media by removing duplicates
Flash memory has been used extensively as external storage of smartphones, tablets, IoT
devices, laptops, etc. Therefore, more and more sensitive or even mission critical data are …
devices, laptops, etc. Therefore, more and more sensitive or even mission critical data are …
SADUS: Secure data deletion in user space for mobile devices
Conventional data deletion is implemented for reclaiming storage as a rapid operation.
However, the content of the deleted file still persists on the storage medium. Secure data …
However, the content of the deleted file still persists on the storage medium. Secure data …
Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices
Secure data deletion is of critical importance for complying with retention regulations and
safeguarding user privacy. In this work, we have proposed the first full-stack secure deletion …
safeguarding user privacy. In this work, we have proposed the first full-stack secure deletion …
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices
Embedded devices (eg, mobile phones, smart watches, etc.) store a large amount of
sensitive information. However, Android-based devices may leak a lot of user information if …
sensitive information. However, Android-based devices may leak a lot of user information if …
NASA: NVM-assisted secure deletion for flash memory
W Zhu, KRB Butler - … Transactions on Computer-Aided Design of …, 2022 - ieeexplore.ieee.org
Secure deletion in flash-based storage is crucial for data security. However, existing secure
deletion schemes for flash memory suffer from performance degradation and reliability …
deletion schemes for flash memory suffer from performance degradation and reliability …
Leveraging Journaling File System for Prompt Secure Deletion on Interlaced Recording Drives
SH Chen, KH Huang - IEEE Transactions on Emerging Topics …, 2022 - ieeexplore.ieee.org
With the growing awareness of secure computation, more and more users want to make
their digital footprints securely deleted and irrecoverable after updating or removing files on …
their digital footprints securely deleted and irrecoverable after updating or removing files on …
[PDF][PDF] 云存储中外包数据确定性删除研究综述
任正伟, 李雪婷, 王丽娜, 童言, 徐士伟, 丁炜 - 电子学报, 2022 - ejournal.org.cn
云存储的外包特性使得数据的所有权与管理权/持有权分离, 导致数据安全成为用户关注的焦点
之一. 作为云存储中数据安全的一个组成部分和数据生命周期的最后一个阶段 …
之一. 作为云存储中数据安全的一个组成部分和数据生命周期的最后一个阶段 …