Skip to main content

Data Deletion with Provable Security

  • Conference paper
Information Security Applications (WISA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5379))

Included in the following conference series:

Abstract

In many systems one of the most important and essential functionalities necessary for secure data processing is the permanent and irreversible deletion of stored bits. According to recent results, it is possible to retrieve data from numerous (especially magnetic) data storage devices, even if some erasing techniques like wiping have been applied. In fact, in many cases a powerful adversary is able to read information that has been many times overwritten.

In our paper we present a new approach to data storage for which a provably secure data deletion seems to be possible. The core idea is based on a particular way of data coding and is generally independent on physical features of the data storage device, so this approach is not limited to magnetic drives. Furthermore, it does not require any special-purpose “secure” device. The usage of a software drivers or installation of modified firmware is sufficient.

We provide rigid mathematical analysis of security of the proposed scheme for some scenarios even in the presence of an extremely powerful adversary. Our approach offers all of this for the price of speed and storage overhead. However, even under pessimistic assumptions this scheme remains fairly practical.

The research was partially supported by MNiSW grant N N206 1842 33.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Flajolet, P., Sedgewick, R.: Analytic combinatorics. Cambridge University Press, Cambridge (2008)

    MATH  Google Scholar 

  2. Gomez, R.D., Burke, E.R., Adly, A.A., Mayergoyz, I.D., Gorczyca, J.A., Kryder, M.H.: Microscopic investigations of overwritten data. Journal of Applied Physics 73(10) (1993)

    Google Scholar 

  3. Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete Mathematics, 2nd edn. A Foundation for Computer Science (1994)

    Google Scholar 

  4. Gutmann, P.: Secure Deletion of Data from Magnetic and Solid-State Memory. In: The Sixth USENIX Security Symposium (1996)

    Google Scholar 

  5. James, D.G.: Forensically unrecoverable hard drive data destruction Whitepaper (2006), http://infosecwriters.com

  6. Janson, S., Łuczak, T., Ruciński, A.: Random Graphs. John Wiley & Sons, Chichester (2001)

    MATH  Google Scholar 

  7. Mayergoyz, I.D., Tse, C., Krafft, C., Gomez, R.D.: Spin-stand imaging of overwritten data and its comparsion with magnetic force microscopy. Journal of Applied Physics 89(11) (2001)

    Google Scholar 

  8. Rivest, R.L., Shamir, A.: How to reuse a write-once memory, Information and Control, vol. 55, Belgium (1982)

    Google Scholar 

  9. Rugar, D., Mamin, H.J., Guethner, P., Lambert, S.E., Stern, J.E., McFadyen, I., Yogi, T.: Magnetic force microscopy: General principles and application to longitudinal recording media. Journal of Applied Physics 68(3) (1990)

    Google Scholar 

  10. Sobey, C.H.: Recovering unrecoverable data, A ChannelScience White Paper (2004)

    Google Scholar 

  11. US Department of Defense: National Industrial Security Program Operating Manual, disk sanitization, DoD 5220.22-M

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Klonowski, M., Przykucki, M., Strumiński, T. (2009). Data Deletion with Provable Security. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics