Abstract
In many systems one of the most important and essential functionalities necessary for secure data processing is the permanent and irreversible deletion of stored bits. According to recent results, it is possible to retrieve data from numerous (especially magnetic) data storage devices, even if some erasing techniques like wiping have been applied. In fact, in many cases a powerful adversary is able to read information that has been many times overwritten.
In our paper we present a new approach to data storage for which a provably secure data deletion seems to be possible. The core idea is based on a particular way of data coding and is generally independent on physical features of the data storage device, so this approach is not limited to magnetic drives. Furthermore, it does not require any special-purpose “secure” device. The usage of a software drivers or installation of modified firmware is sufficient.
We provide rigid mathematical analysis of security of the proposed scheme for some scenarios even in the presence of an extremely powerful adversary. Our approach offers all of this for the price of speed and storage overhead. However, even under pessimistic assumptions this scheme remains fairly practical.
The research was partially supported by MNiSW grant N N206 1842 33.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Flajolet, P., Sedgewick, R.: Analytic combinatorics. Cambridge University Press, Cambridge (2008)
Gomez, R.D., Burke, E.R., Adly, A.A., Mayergoyz, I.D., Gorczyca, J.A., Kryder, M.H.: Microscopic investigations of overwritten data. Journal of Applied Physics 73(10) (1993)
Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete Mathematics, 2nd edn. A Foundation for Computer Science (1994)
Gutmann, P.: Secure Deletion of Data from Magnetic and Solid-State Memory. In: The Sixth USENIX Security Symposium (1996)
James, D.G.: Forensically unrecoverable hard drive data destruction Whitepaper (2006), http://infosecwriters.com
Janson, S., Łuczak, T., Ruciński, A.: Random Graphs. John Wiley & Sons, Chichester (2001)
Mayergoyz, I.D., Tse, C., Krafft, C., Gomez, R.D.: Spin-stand imaging of overwritten data and its comparsion with magnetic force microscopy. Journal of Applied Physics 89(11) (2001)
Rivest, R.L., Shamir, A.: How to reuse a write-once memory, Information and Control, vol. 55, Belgium (1982)
Rugar, D., Mamin, H.J., Guethner, P., Lambert, S.E., Stern, J.E., McFadyen, I., Yogi, T.: Magnetic force microscopy: General principles and application to longitudinal recording media. Journal of Applied Physics 68(3) (1990)
Sobey, C.H.: Recovering unrecoverable data, A ChannelScience White Paper (2004)
US Department of Defense: National Industrial Security Program Operating Manual, disk sanitization, DoD 5220.22-M
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klonowski, M., Przykucki, M., Strumiński, T. (2009). Data Deletion with Provable Security. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-00306-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00305-9
Online ISBN: 978-3-642-00306-6
eBook Packages: Computer ScienceComputer Science (R0)