Challenges and Designs for Secure Deletion in Storage Systems

Wei Chen Wang, Chien Chung Ho, Yu Ming Chang, Yuan Hao Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Data security has risen to be one of the most critical concerns of computer professionals. Tighter legal requirements now exist for the purpose of protecting user data from unauthorized uses and for both preserving and erasing/sanitizing data records to meet legal compliance requirements. To meet the data security requirement, many secure (data) deletion techniques have been proposed to deal with the data security concerns from different system layers. This paper surveys the state-of-the-art secure deletion techniques that have been designed to pursue higher efficiency, verifiability, and portability for emerging types of hard disk drives and flash-based solid-state drives. Meanwhile, the pros and cons of implementing secure deletion in different system layers are also discussed, so as to assist in pursuing better secure deletion designs for future storage systems.

Original languageEnglish
Title of host publicationIndo - Taiwan 2nd International Conference on Computing, Analytics and Networks, Indo-Taiwan ICAN 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages181-189
Number of pages9
ISBN (Electronic)9781728149998
DOIs
Publication statusPublished - 2020 Feb
EventIndo - Taiwan 2nd International Conference on Computing, Analytics and Networks, Indo-Taiwan ICAN 2020 - Rajpura, Punjab, India
Duration: 2020 Feb 72020 Feb 15

Publication series

NameIndo - Taiwan 2nd International Conference on Computing, Analytics and Networks, Indo-Taiwan ICAN 2020 - Proceedings

Conference

ConferenceIndo - Taiwan 2nd International Conference on Computing, Analytics and Networks, Indo-Taiwan ICAN 2020
Country/TerritoryIndia
CityRajpura, Punjab
Period20-02-0720-02-15

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Challenges and Designs for Secure Deletion in Storage Systems'. Together they form a unique fingerprint.

Cite this