Policy-based secure deletion

作者: Christian Cachin , Kristiyan Haralambiev , Hsu-Chun Hsiao , Alessandro Sorniotti , None

DOI: 10.1145/2508859.2516690

关键词:

摘要: Securely deleting data from storage systems has become difficult today. Most space is provided as a virtual resource and traverses many layers between the user actual physical medium. Operations to properly erase wipe out all its traces are typically not foreseen, particularly in networked cloud-storage systems. This paper introduces general cryptographic model for policy-based secure deletion of systems, whose security relies on proper erasure keys. Deletion operations expressed terms policy that describes destruction through attributes protection classes. The links specified class(es) must be erased accordingly. A construction presented policies given by directed acyclic graphs; it built modular way exploiting schemes may composed with each other. unify generalize previous encryption-based techniques deletion. Finally, prototype implementation Linux filesystem

参考文章(26)
Susan Hohenberger, Brent Waters, Attribute-Based Encryption with Fast Decryption Public-Key Cryptography – PKC 2013. pp. 162- 179 ,(2013) , 10.1007/978-3-642-36362-7_11
Henry M. Levy, Tadayoshi Kohno, Amit A. Levy, Roxana Geambasu, Vanish: increasing data privacy with self-destructing data usenix security symposium. pp. 299- 316 ,(2009)
Joel Reardon, Srdjan Capkun, David Basin, Data node encrypted file system: efficient secure deletion for flash memory usenix security symposium. pp. 17- 17 ,(2012) , 10.3929/ETHZ-A-007593083
Dan Boneh, Richard J. Lipton, A revocable backup system usenix security symposium. pp. 9- 9 ,(1996)
Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, Markus Jakobsson, How to forget a secret symposium on theoretical aspects of computer science. pp. 500- 509 ,(1999) , 10.1007/3-540-49116-3_47
Radia J. Perlman, File System Design with Assured Delete. network and distributed system security symposium. ,(2007)
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Hugo Krawczyk, Perfect Forward Secrecy. Encyclopedia of Cryptography and Security (2nd Ed.). pp. 921- 922 ,(2005)
Laura M. Grupp, Michael Wei, Steven Swanson, Frederick E. Spada, Reliably erasing data from flash-based solid state drives file and storage technologies. pp. 8- 8 ,(2011) , 10.5555/1960475.1960483