Security conscious users of file systems require that deleted information and its associated meta-data are no longer accessible on the underlying physical disk. Existing file system implementations only reset the file system data structures to reflect the removal of data, leaving both the actual data and its associated meta-data on the physical disk. Even when this information has been overwritten, it may remain visible to advanced probing techniques such as magnetic force microscopy or magnetic force scanning tunneling microscopy. Our project addresses this problem by adding support to the Linux kernel for asynchronous secure deletion of file data and meta-data. We provide an implementation for the Ext2 file system; other file systems can be accommodated easily. An asynchronous overwriting process sacrifices immediate security but ultimately provides a far more usable and complete secure deletion facility. We justify our design by arguing that user-level secure deletion tools are inadequate in many respects and that synchronous deletion facilities are too time consuming to be acceptable to users. Further, we contend that encrypting file information, either using manual tools or a encrypted file system, is not a sufficient solution to alleviate the need for secure data deletion.
[1]
Richard J. Lipton,et al.
A Revocable Backup System
,
1996,
USENIX Security Symposium.
[2]
Yale N. Patt,et al.
Soft updates: a solution to the metadata update problem in file systems
,
2000
.
[3]
Jian-Gang Zhu,et al.
Magnetic force microscopy study of edge overwrite characteristics in thin film media
,
1994
.
[4]
Thomas E. Anderson,et al.
A Comparison of File System Workloads
,
2000,
USENIX Annual Technical Conference, General Track.
[5]
Gregory R. Ganger,et al.
Towards higher disk head utilization: extracting free bandwidth from busy disk drives
,
2000,
OSDI.
[6]
P. K. George,et al.
Effects of current and frequency on write, read, and erase widths for thin-film inductive and magnetoresistive heads
,
1989
.
[7]
Peter Gutmann,et al.
Secure deletion of data from magnetic and solid-state memory
,
1996
.
[8]
Adi Shamir,et al.
The Steganographic File System
,
1998,
Information Hiding.