skip to main content
10.1145/2664243.2664287acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Assisted deletion of related content

Published: 08 December 2014 Publication History

Abstract

On primary storage systems content is often replicated, converted or modified, and the users quickly lose control over its dispersal on the system. Deleting content related to a particular project from the system therefore becomes a labor-intensive task for the user. In this paper we present IRCUS, a system that assists the user in securely removing project-related content, but does not require changes to the user's behavior or to any of the system components, such as the file system, kernel or applications. IRCUS transparently integrates within the user's system, operates in user-space and stores the resulting metadata alongside the files. We implemented and evaluated our system and show that its overhead and accuracy are acceptable for practical use and deployment.

References

[1]
A. Bacs, R. Vermeulen, A. Slowinska, and H. Bos. System-Level Support for Intrusion Recovery. DIMVA'12. Springer-Verlag, 2013.
[2]
D. Boneh and R. J. Lipton. A Revocable Backup System. In USENIX Security Symposium, 1996.
[3]
M. A. Borkin, C. S. Yeh, M. Boyd, P. Macko, K. Z. Gajos, M. Seltzer, and H. Pfister. Evaluation of Filesystem Provenance Visualization Tools. IEEE Transactions on Visualization and Computer Graphics, 19(12):2476--2485, Dec. 2013.
[4]
A. Broder. On the Resemblance and Containment of Documents. In Proceedings of the Compression and Complexity of Sequences 1997, SEQUENCES '97. IEEE Computer Society, 1997.
[5]
C. Cachin, K. Haralambiev, H.-C. Hsiao, and A. Sorniotti. Policy-based Secure Deletion. CCS '13. ACM, 2013.
[6]
R. Chirgwin. Surrender your crypto keys or you're off to chokey, says Australia. The Register, 2014.
[7]
G. D. Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson. How to Forget a Secret. In STACS, Lecture Notes in Computer Science. Springer, 1999.
[8]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. OSDI'10. USENIX Association, 2010.
[9]
J. Garside. Vodafone reveals existence of secret wires that allow state surveillance. The Guardian, 2014.
[10]
R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy. Keypad: An Auditing File System for Theft-prone Devices. In Proceedings of the Sixth Conference on Computer Systems, EuroSys '11. ACM, 2011.
[11]
A. Gionis, P. Indyk, and R. Motwani. Similarity Search in High Dimensions via Hashing. In Proceedings of the 25th International Conference on Very Large Data Bases, VLDB '99, pages 518--529, San Francisco, CA, USA, 1999. Morgan Kaufmann Publishers Inc.
[12]
A. Goel, W.-c. Feng, D. Maier, W.-c. Feng, and J. Walpole. Forensix: A Robust, High-Performance Reconstruction System. ICDCSW '05. IEEE Computer Society, 2005.
[13]
A. Goel, K. Po, K. Farhadi, Z. Li, and E. de Lara. The Taser Intrusion Recovery System. In Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP '05. ACM, 2005.
[14]
P. Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory. In USENIX Security Symposium, 1996.
[15]
C. Henk and M. Szeredi. FUSE, Filesystem in Userspace. http://fuse.sourceforge.net/.
[16]
Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia. Efficiently Tracking Application Interactions Using Lightweight Virtualization. In Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '08. ACM, 2008.
[17]
C. Jensen, H. Lonsdale, E. Wynn, J. Cao, M. Slater, and T. G. Dietterich. The Life and Times of Files and Information: A Study of Desktop Provenance. CHI '10. ACM, 2010.
[18]
S. Jones, C. Strong, D. D. E. Long, and E. L. Miller. Tracking Emigrant Data via Transient Provenance. TaPP '11, 2011.
[19]
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy Oracle: A System for Finding Application Leaks with Black Box Differential Testing. CCS '08. ACM, 2008.
[20]
A. K. Karlson, G. Smith, and B. Lee. Which Version is This?: Improving the Desktop Experience Within a Copy-aware Computing Ecosystem. CHI '11. ACM, 2011.
[21]
S. T. King and P. M. Chen. Backtracking Intrusions. ACM Trans. Comput. Syst., 23(1), Feb. 2005.
[22]
L. Lamport. Time, Clocks, and the Ordering of Events in a Distributed System. Commun. ACM, 21(7), July 1978.
[23]
Y. Mejova, K. De Schepper, L. Bergman, and J. Lu. Reuse in the Wild: An Empirical and Ethnographic Study of Organizational Content Reuse. CHI '11. ACM, 2011.
[24]
K.-K. Muniswamy-Reddy and D. A. Holland. Causality-based Versioning. Trans. Storage, 5(4), Dec. 2009.
[25]
K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-aware Storage Systems. ATEC '06. USENIX Association, 2006.
[26]
L. Munson. Lavabit appeals contempt of court ruling surrounding handover of SSL keys. Naked Security, 2014.
[27]
A. Muthitacharoen, B. Chen, and D. Mazières. A Low-bandwidth Network File System. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01. ACM, 2001.
[28]
A. Nadkarni and W. Enck. Preventing Accidental Data Disclosure in Modern Operating Systems. CCS '13. ACM, 2013.
[29]
J. Oates. Youth jailed for not handing over encryption password. The Register, 2010.
[30]
K. Onarlioglu, C. Mulliner, W. Robertson, and E. Kirda. PrivExec: Private Execution as an Operating System Service. In IEEE Symposium on Security and Privacy (S&P), May 2013.
[31]
J. Reardon, D. Basin, and S. Capkun. SoK: Secure Data Deletion. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13. IEEE Computer Society, 2013.
[32]
J. Reardon, C. Marforio, S. Capkun, and D. Basin. Secure Deletion on Log-structured File Systems. ASIACCS, 2012.
[33]
J. Reardon, H. Ritzdorf, D. Basin, and S. Capkun. Secure Data Deletion from Persistent Media. CCS '13. ACM, 2013.
[34]
A. Rusbridger. David Miranda, schedule 7 and the danger that all reporters now face. The Guardian, 2013.
[35]
S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: Local Algorithms for Document Fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03. ACM, 2003.
[36]
S. Shah, C. A. N. Soules, G. R. Ganger, and B. D. Noble. Using Provenance to Aid in Personal File Search. ATC'07. USENIX Association, 2007.
[37]
S. Sitaraman and S. Venkatesan. Forensic Analysis of File System Intrusions Using Improved Backtracking. IWIA '05. IEEE Computer Society, 2005.
[38]
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting Mobile Data Exposure with Idle Eviction. OSDI'12. USENIX Association, 2012.
[39]
A. Tridgell. Efficient Algorithms for Sorting and Synchronization. PhD thesis, The Australian National University, February 1999.
[40]
C. Verbowski, E. Kiciman, A. Kumar, B. Daniels, S. Lu, J. Lee, Y.-M. Wang, and R. Roussev. Flight Data Recorder: Monitoring Persistent-state Interactions to Improve Systems Management. OSDI '06. USENIX Association, 2006.
[41]
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. CCS '07. ACM, 2007.
[42]
A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping Applications from Spilling the Beans. NSDI '07. USENIX Association, 2007.
[43]
N. Zhu and T. Chiueh. Design, Implementation, and Evaluation of Repairable File Service. In Dependable Systems and Networks, 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '14: Proceedings of the 30th Annual Computer Security Applications Conference
December 2014
492 pages
ISBN:9781450330053
DOI:10.1145/2664243
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2014

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

ACSAC '14
Sponsor:
  • ACSA
ACSAC '14: Annual Computer Security Applications Conference
December 8 - 12, 2014
Louisiana, New Orleans, USA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media