skip to main content
10.1145/2508859.2516699acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Secure data deletion from persistent media

Published: 04 November 2013 Publication History

Abstract

Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure deletion for persistent storage that relies on encryption and key wrapping. We define a key disclosure graph that models the adversarial knowledge of the history of key generation and wrapping. We introduce a generic update function and prove that it achieves secure deletion of data against a coercive attacker; instances of the update function implement the update behaviour of all arborescent data structures including B-Trees, extendible hash tables, linked lists, and others. We implement a B-Tree instance of our solution. Our implementation is at the block-device layer, allowing any block-based file system to be used on top of it. Using different workloads, we find that the storage and communication overhead required for storing and retrieving B-Tree nodes is small and that this therefore constitutes a viable solution for many applications requiring secure deletion from persistent media.

References

[1]
Laszlo A. Bélády. A study of replacement algorithms for virtual-storage computer. IBM Systems Journal, 5(2):78--101, 1966.
[2]
Dan Boneh and Richard J. Lipton. A Revocable Backup System. In USENIX Security Symposium, pages 91--96, 1996.
[3]
Nikita Borisov, Ian Goldberg, and Eric Brewer. Off-the-record communication, or, why not to use PGP. In ACM workshop on Privacy in the electronic society, pages 77--84, 2004.
[4]
Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, and Alessandro Sorniotti. Policy-based Secure Deletion. Cryptology ePrint Archive, Report 152, 2013.
[5]
Douglas Comer. The ubiquitous B-tree. ACM Computing Surveys, 11:121--137, 1979.
[6]
Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, and Markus Jakobsson. How to Forget a Secret. In STACS, Lecture Notes in Computer Science, pages 500--509. Springer, 1999.
[7]
Sarah M. Diesburg and An-I Andy Wang. A survey of confidential data storage and deletion methods. ACM Computing Surveys, 43(1):1--37, 2010.
[8]
Ronald Fagin, Jurg Nievergelt, Nicholas Pippenger, and H. Raymond Strong. Extendible hashing--a fast access method for dynamic files. ACM Trans. Database Syst., 4(3):315--344, 1979.
[9]
Simson Garfinkel and Abhi Shelat. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy, pages 17--27, January 2003.
[10]
Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. Vanish: increasing data privacy with self-destructing data. In USENIX Security Symposium, pages 299--316, 2009.
[11]
Peter Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory. In USENIX Security Symposium, pages 77--89, 1996.
[12]
McDougall, R. and Mauro, J. FileBench. www.solarisinternals.com/si/tools/filebench/, 2005.
[13]
Ralph C. Merkle. A certified digital signature. In Proceedings on Advances in Cryptology, CRYPTO '89, pages 218--238. Springer-Verlag New York, Inc., 1989.
[14]
Mike Mesnier, Gregory R. Ganger, and Erik Riedel. Object-Based Storage. Communications Magazine, IEEE, 41(8):84--90, 2003.
[15]
Einar Mykletun, Maithili Narasimha, and Gene Tsudik. Providing authentication and integrity in outsourced databases using Merkle hash trees. Technical report, University of California Irvine, 2003.
[16]
Radia Perlman. The Ephemerizer: Making Data Disappear. Technical report, Sun Microsystems, 2005.
[17]
Joel Reardon, David Basin, and Srdjan Capkun. SoK: Secure Data Deletion. In IEEE Symposium on Security and Privacy, 2013.
[18]
Joel Reardon, Srdjan Capkun, and David Basin. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. In USENIX Security Symposium, pages 333--348, 2012.
[19]
Ohad Rodeh. B-trees, shadowing, and clones. Trans. Storage, 3(4):2:1--2:27, 2008.
[20]
Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman. FADE: Secure Overlay Cloud Storage with File Assured Deletion. In SecureComm, pages 380--397, 2010.
[21]
W. T. Tutte. Graph Theory. Encyclopedia of Mathematics and its Applications. Addison-Wesley Publishing Company, 1984.
[22]
Scott Wolchok, Owen S. Hoffman, Nadia Henninger, Edward W. Felten, J. Alex Haldermann, Christopher J. Rossback, Brent Waters, and Emmet Witchel. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. In Proc.\ 17th Network and Distributed System Security Symposium, February 2010.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
November 2013
1530 pages
ISBN:9781450324779
DOI:10.1145/2508859
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. b-tree
  2. persistent storage
  3. privacy
  4. secure deletion

Qualifiers

  • Research-article

Conference

CCS'13
Sponsor:

Acceptance Rates

CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media