Fully automated and hidden system for wiping sensitive data
暂无分享,去创建一个
In this article, we will describe a method to securely erase sensitive data in fully automated and hidden mode. Compared to other similar technologies, our method has two main advantages. The first one is the ability to run in a fully automated mode, in other words the system is configured once and the computer is protected without requiring any user intervention. The second advantage is the ability to run in a so-called secret mode, in which the system looks like another software, for the main purpose of confusing other users. Our paper will describe the structure and functionality of our system, and some of the most important technologies and algorithms that we have used.
[1] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[2] Markus Jakobsson,et al. How to Forget a Secret , 1999, STACS.
[3] Cornelia Gyorodi,et al. Detection of confidential data using the Open Sensitive Area Definition (OSAD) language , 2009, 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing.
[4] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..