User-level secure deletion on log-structured file systems

Deleting a file from a storage medium serves two purposes: it reclaims storage resources and ensures that any sensitive information contained in the file becomes inaccessible. When done for the latter purpose, it is critical that the file is securely deleted, meaning that its content does not persist on the storage medium after deletion. Secure deletion is the act of deleting data from a storage medium such that the data is afterwards irrecoverable from the storage medium. The time between deleting data and it becoming irrecoverable is called the deletion latency.

[1]  Michael Austin,et al.  eCryptfs : An Enterprise-class Cryptographic Filesystem for Linux , 2005 .

[2]  Nikolai Joukov,et al.  Secure deletion myths, issues, and solutions , 2006, StorageSS '06.

[3]  Matt Blaze,et al.  A cryptographic file system for UNIX , 1993, CCS '93.

[4]  阿米尔·班 Flash File System , 1994 .

[5]  Mendel Rosenblum,et al.  The design and implementation of a log-structured file system , 1991, SOSP '91.

[6]  Nikolai Joukov,et al.  Adding secure deletion to your favorite file system , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[7]  Garth R. Goodson,et al.  Design Tradeoffs in a Flash Translation Layer , 2010 .

[8]  Steven Swanson,et al.  Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.

[9]  Steven Bauer,et al.  Secure Data Deletion for Linux File Systems , 2001, USENIX Security Symposium.

[10]  Ryan Johnson,et al.  Evaluating and repairing write performance on flash devices , 2009, DaMoN '09.

[11]  Yookun Cho,et al.  An Efficient Secure Deletion Scheme for Flash File Systems , 2010, J. Inf. Sci. Eng..

[12]  David Woodhouse,et al.  JFFS : The Journalling Flash File System , 2001 .

[13]  R. Card,et al.  Design and Implementation of the Second Extended Filesystem , 2001 .

[14]  Sivan Toledo,et al.  Algorithms and data structures for flash memories , 2005, CSUR.

[15]  Sang-Won Lee,et al.  A survey of Flash Translation Layer , 2009, J. Syst. Archit..

[16]  Abhi Shelat,et al.  Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..

[17]  Peter Desnoyers,et al.  Write Endurance in Flash Drives: Measurements and Analysis , 2010, FAST.

[18]  Srdjan Capkun,et al.  Keeping data secret under full compromise using porter devices , 2010, ACSAC '10.