2010
DOI: 10.1145/1824795.1824797
|View full text |Cite
|
Sign up to set email alerts
|

A survey of confidential data storage and deletion methods

Abstract: As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion of data in perso… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(23 citation statements)
references
References 26 publications
0
22
0
1
Order By: Relevance
“…The method involves introducing appropriate number of errors in the dat a and control bits of the blocks of data making data recovery impossible. S. M. Diesburg, et al, summarized and compared existing methods of providing confidential storage and deletion of data in personal computing environments [6]. Paper [8] shows that these systems provide no temporal guarantees on data deletion and that deleted data still persists for nearly 44 hours with average phone use and indefinitely if the phone is not used after the deletion.…”
Section: Related Workmentioning
confidence: 99%
“…The method involves introducing appropriate number of errors in the dat a and control bits of the blocks of data making data recovery impossible. S. M. Diesburg, et al, summarized and compared existing methods of providing confidential storage and deletion of data in personal computing environments [6]. Paper [8] shows that these systems provide no temporal guarantees on data deletion and that deleted data still persists for nearly 44 hours with average phone use and indefinitely if the phone is not used after the deletion.…”
Section: Related Workmentioning
confidence: 99%
“…For example, more than 96% of 2700 patient records that are involved in an NIH-funded GWAS and expected to be submitted into dbGaP were shown to be uniquely re-identifiable based on their diagnosis codes [11]. At the same time, this attack is not addressed by access control and encryption-based methods [14]- [16], as data need to be shared beyond authorized recipients.…”
Section: A Motivationmentioning
confidence: 99%
“…In this section, we survey research related to privacy-preserving data publishing, with a focus on biomedical data. We note that the reidentification problem is not addressed by access control and encryption-based methods [27]–[29] because data need to be shared beyond a small number of authorized recipients.…”
Section: Related Researchmentioning
confidence: 99%