Author
Klonowski, M
Przykucki, M
Struminski, T
Journal title
INFORMATION SECURITY APPLICATIONS
DOI
10.1007/978-3-642-00306-6_18
Volume
5379
Last updated
2018-08-09T16:40:17.917+01:00
Page
240-255
Abstract
In many systems one of the most important and essential functionalities necessary for secure data processing is the permanent and irreversible deletion of stored bits. According to recent results, it is possible to retrieve data from numerous (especially magnetic) data storage devices, even if some erasing techniques like wiping have been applied. In fact, in many cases a powerful adversary is able to read information that has been many times overwritten. In our paper we present a new approach to data storage for which a provably secure data deletion seems to be possible. The core idea is based on a particular way of data coding and is generally independent on physical features of the data storage device, so this approach is not limited to magnetic drives. Furthermore, it does not require any special-purpose "secure" device. The usage of a software drivers or installation of modified firmware is sufficient. We provide rigid mathematical analysis of security of the proposed scheme for some scenarios even in the presence of an extremely powerful adversary. Our approach offers all of this for the price of speed and storage overhead. However, even under pessimistic assumptions this scheme remains fairly practical. © 2009 Springer Berlin Heidelberg.
Symplectic ID
596431
Download URL
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000264578800018&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=4fd6f7d59a501f9b8bac2be37914c43e
Publication type
Conference Paper
ISBN-13
978-3-642-00305-9
ISBN-10
3642003052
Publication date
2009
Please contact us with feedback and comments about this page.