The Experts below are selected from a list of 106590 Experts worldwide ranked by ideXlab platform
Joel Reardon - One of the best experts on this subject based on the ideXlab platform.
-
Robust Key Management for Secure Data Deletion
Secure Data Deletion, 2016Co-Authors: Joel ReardonAbstract:This chapter considers the problem of an unreliable securely deleting storage medium, that is, one that may lose Data, expose Data, fail to delete Data, and fail to be available. We build a robust fault-tolerant system that uses multiple unreliable storage media. The system permits multiple clients to store securely deletable Data and provides a means to control policy aspects of its storage and Deletion. It presents details on the implementation both of the distributed securely deleting medium as well as a file system extension that uses it. The solution has low latency at high loads and requires only a small amount of communication among nodes.
-
Data Node Encrypted File System
Secure Data Deletion, 2016Co-Authors: Joel ReardonAbstract:This chapter presents DNEFS, a file system change that provides fine-grained secure Data Deletion and is particularly suited to flash memory. DNEFS encrypts each individual Data item and colocates all the encryption keys in a densely packed key storage area. DNEFS is efficient in flash memory erasures because the expensive erasure operation is only needed for the key storage area.
-
Secure Data Deletion
2016Co-Authors: Joel ReardonAbstract:This book is the first to develop a systematized approach for the comparison and evaluation of secure Deletion solutions. The book focuses on novel secure Deletion solutions targeting specific real-world environments where secure Deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities, and then builds a system and adversarial model based on the survey of related work. The book is useful for both academics, researchers and graduate students, and for practitioners who may integrate its results into deployed systems.
-
secure Data Deletion from persistent media
Computer and Communications Security, 2013Co-Authors: Joel Reardon, David Basin, Hubert Ritzdorf, Srdjan CapkunAbstract:Secure Deletion is the task of deleting Data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure Deletion for persistent storage that relies on encryption and key wrapping. We define a key disclosure graph that models the adversarial knowledge of the history of key generation and wrapping. We introduce a generic update function and prove that it achieves secure Deletion of Data against a coercive attacker; instances of the update function implement the update behaviour of all arborescent Data structures including B-Trees, extendible hash tables, linked lists, and others. We implement a B-Tree instance of our solution. Our implementation is at the block-device layer, allowing any block-based file system to be used on top of it. Using different workloads, we find that the storage and communication overhead required for storing and retrieving B-Tree nodes is small and that this therefore constitutes a viable solution for many applications requiring secure Deletion from persistent media.
-
sok secure Data Deletion
IEEE Symposium on Security and Privacy, 2013Co-Authors: Joel Reardon, David Basin, Srdjan CapkunAbstract:Secure Data Deletion is the task of deleting Data irrecoverably from a physical medium. In the digital world, Data is not securely deleted by default; instead, many approaches add secure Deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the file system, the device driver, etc. Depending on which interface is used, the properties of an approach can differ significantly. In this paper, we survey the related work in detail and organize existing approaches in terms of their interfaces to physical media. We further present a taxonomy of adversaries differing in their capabilities as well as a systematization for the characteristics of secure Deletion approaches. Characteristics include environmental assumptions, such as how the interface's use affects the physical medium, as well as behavioural properties of the approach such as the Deletion latency and physical wear. We perform experiments to test a selection of approaches on a variety of file systems and analyze the assumptions made in practice.
Srdjan Capkun - One of the best experts on this subject based on the ideXlab platform.
-
secure Data Deletion from persistent media
Computer and Communications Security, 2013Co-Authors: Joel Reardon, David Basin, Hubert Ritzdorf, Srdjan CapkunAbstract:Secure Deletion is the task of deleting Data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure Deletion for persistent storage that relies on encryption and key wrapping. We define a key disclosure graph that models the adversarial knowledge of the history of key generation and wrapping. We introduce a generic update function and prove that it achieves secure Deletion of Data against a coercive attacker; instances of the update function implement the update behaviour of all arborescent Data structures including B-Trees, extendible hash tables, linked lists, and others. We implement a B-Tree instance of our solution. Our implementation is at the block-device layer, allowing any block-based file system to be used on top of it. Using different workloads, we find that the storage and communication overhead required for storing and retrieving B-Tree nodes is small and that this therefore constitutes a viable solution for many applications requiring secure Deletion from persistent media.
-
sok secure Data Deletion
IEEE Symposium on Security and Privacy, 2013Co-Authors: Joel Reardon, David Basin, Srdjan CapkunAbstract:Secure Data Deletion is the task of deleting Data irrecoverably from a physical medium. In the digital world, Data is not securely deleted by default; instead, many approaches add secure Deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the file system, the device driver, etc. Depending on which interface is used, the properties of an approach can differ significantly. In this paper, we survey the related work in detail and organize existing approaches in terms of their interfaces to physical media. We further present a taxonomy of adversaries differing in their capabilities as well as a systematization for the characteristics of secure Deletion approaches. Characteristics include environmental assumptions, such as how the interface's use affects the physical medium, as well as behavioural properties of the approach such as the Deletion latency and physical wear. We perform experiments to test a selection of approaches on a variety of file systems and analyze the assumptions made in practice.
-
IEEE Symposium on Security and Privacy - SoK: Secure Data Deletion
2013 IEEE Symposium on Security and Privacy, 2013Co-Authors: Joel Reardon, David Basin, Srdjan CapkunAbstract:Secure Data Deletion is the task of deleting Data irrecoverably from a physical medium. In the digital world, Data is not securely deleted by default; instead, many approaches add secure Deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the file system, the device driver, etc. Depending on which interface is used, the properties of an approach can differ significantly. In this paper, we survey the related work in detail and organize existing approaches in terms of their interfaces to physical media. We further present a taxonomy of adversaries differing in their capabilities as well as a systematization for the characteristics of secure Deletion approaches. Characteristics include environmental assumptions, such as how the interface's use affects the physical medium, as well as behavioural properties of the approach such as the Deletion latency and physical wear. We perform experiments to test a selection of approaches on a variety of file systems and analyze the assumptions made in practice.
-
ACM Conference on Computer and Communications Security - Secure Data Deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013Co-Authors: Joel Reardon, David Basin, Hubert Ritzdorf, Srdjan CapkunAbstract:Secure Deletion is the task of deleting Data irrecoverably from a physical medium. In this work, we present a general approach to the design and analysis of secure Deletion for persistent storage that relies on encryption and key wrapping. We define a key disclosure graph that models the adversarial knowledge of the history of key generation and wrapping. We introduce a generic update function and prove that it achieves secure Deletion of Data against a coercive attacker; instances of the update function implement the update behaviour of all arborescent Data structures including B-Trees, extendible hash tables, linked lists, and others. We implement a B-Tree instance of our solution. Our implementation is at the block-device layer, allowing any block-based file system to be used on top of it. Using different workloads, we find that the storage and communication overhead required for storing and retrieving B-Tree nodes is small and that this therefore constitutes a viable solution for many applications requiring secure Deletion from persistent media.
-
Secure Deletion on Log-structured File Systems
arXiv: Cryptography and Security, 2011Co-Authors: Joel Reardon, Srdjan Capkun, Claudio Marforio, David BasinAbstract:We address the problem of secure Data Deletion on log-structured file systems. We focus on the YAFFS file system, widely used on Android smartphones. We show that these systems provide no temporal guarantees on Data Deletion and that deleted Data still persists for nearly 44 hours with average phone use and indefinitely if the phone is not used after the Deletion. Furthermore, we show that file overwriting and encryption, methods commonly used for secure Deletion on block-structured file systems, do not ensure Data Deletion in log-structured file systems. We propose three mechanisms for secure Deletion on log-structured file systems. Purging is a user-level mechanism that guarantees secure Deletion at the cost of negligible device wear. Ballooning is a user-level mechanism that runs continuously and gives probabilistic improvements to secure Deletion. Zero overwriting is a kernel-level mechanism that guarantees immediate secure Deletion without device wear. We implement these mechanisms on Nexus One smartphones and show that they succeed in secure Deletion and neither prohibitively reduce the longevity of the flash memory nor noticeably reduce the device's battery lifetime. These techniques provide mobile phone users more confidence that Data they delete from their phones are indeed deleted.
Liang Xue - One of the best experts on this subject based on the ideXlab platform.
-
Toward Assured Data Deletion in Cloud Storage
IEEE Network, 2020Co-Authors: Dong Zheng, Liang XueAbstract:Outsourcing Data to remote cloud servers can significantly reduce the managing overhead and storage burden for individuals and enterprises. When the Data stored in cloud are no longer needed, assured Data Deletion is a fundamental requirement to ensure that the sensitive Data on the cloud can be safely deleted. Salient features of cloud storage such as virtualization, multi-tenancy, high availability and the platform complexity pose various challenges to the assured Data Deletion, which need to be addressed. In this article, we investigate the system model, desirable security properties as well as the potential solutions to the issues of assured Deletion. We present the techniques used to achieve verifiable Deletion and propose several methods which satisfy the timeliness, fine granularity and the verification of Deletion at the same time. We consider various scenarios such as assured Deletion with Data transfer, fine-grained access control and Data storage with multiple copies. Implementation results demonstrate the efficiency of the proposed protocols.
-
Efficient attribute-based encryption with attribute revocation for assured Data Deletion
Information Sciences, 2019Co-Authors: Liang Xue, Bo YangAbstract:Abstract Cloud storage allows customers to store their Data on remote cloud servers. With the advantage of reducing the burden of Data management and storage, an increasing number of users prefer to store their Data on the cloud. While secure Data Deletion is a crucial, it is a challenging issue in cloud storage. Logically deleted Data may be easily exposed to un-authorized users in the cloud storage scenario thanks to its salient features such as multi-tenancy, virtualization and elasticity. Moreover, cloud servers might not delete customers’ Data as instructed for hidden business interest. Hence, assured Deletion is highly sought after. It helps preserve cloud users’ Data privacy and is a necessary component of Data retention regulations in cloud storage. In this paper, we first investigate the goals of assured Data Deletion and formalize its security model.Then, we propose a key-policy attribute-based encryption scheme for assured Deletion (AD-KP-ABE) of cloud Data. Our construction makes use of the attribute revocation cryptographic primitive and Merkle Hash Tree to achieve fine-grained access control and verifiable Data Deletion. The proposed AD-KP-ABE enjoys desirable properties such as no secret key update, partial ciphertext update and assured Data Deletion. The detailed security proof and implementation results demonstrate the security and practicality of our proposal.
-
assured Data Deletion with fine grained access control for fog based industrial applications
IEEE Transactions on Industrial Informatics, 2018Co-Authors: Liang Xue, Mohsen Guizani, Bo YangAbstract:The advances of cloud computing, fog computing, and Internet of things (IoT) make industries more prosperous than ever. A wide range of industrial systems such as transportation and manufacturing systems have been developed by integrating cloud computing, fog computing, and IoT infrastructure successfully. However, in this sophisticated system, security and privacy issues are major concerns that hinder the widespread adoptions of these novel techniques. In this paper, we focus on assured Data Deletion, an issue that is important but received less attention in academia and industry. We first propose a framework to integrate the cloud, the fog, and the things together to manage stored Data from industries or individuals. We then focus on secure Data Deletion in this framework by proposing an assured Data Deletion scheme that fulfills verifiable Data Deletion as well as flexible access control over sensitive Data. Only Data owners and fog devices are involved when deleting cloud Data and validating the Deletion of these Data, which makes the protocol practical due to the features of low latency as well as real-time interaction with fog. The proposed protocol takes advantage of the attribute-based encryption, whose security can be proved under the standard model. The theoretical analysis shows good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.
-
assured Data Deletion with fine grained access control for fog based industrial applications
arXiv: Cryptography and Security, 2018Co-Authors: Liang Xue, Mohsen Guizani, Bo YangAbstract:The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel techniques. In this paper, we focus on assured Data Deletion, an issue which is important but received less attention in academia and industry. We firstly propose a framework to integrate the cloud, the fog and the things together to manage the stored Data from industries or individuals. We then focus on secure Data Deletion in this framework by proposing an assured Data Deletion scheme which fulfills fine-grained access control over sensitive Data and verifiable Data Deletion. Only the Data owners and the fog devices are involved when deleting a Data key and validating the Data Deletion, which makes the protocol practical due to the features of low latency and real-time interaction of fog computing. The proposed protocol takes advantage of attribute-based encryption and is provably secure under the standard model. The theoretical analysis shows the good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.
Fengwei Zhang - One of the best experts on this subject based on the ideXlab platform.
-
SADUS: Secure Data Deletion in user space for mobile devices
Computers & Security, 2018Co-Authors: Li Yang, Teng Wei, Fengwei ZhangAbstract:Abstract Conventional Data Deletion is implemented for reclaiming storage as a rapid operation. However, the content of the deleted file still persists on the storage medium. Secure Data Deletion is a task of deleting Data irrecoverably from the physical medium. Mobile devices use flash memory as the internal storage. However, flash memory does not support the in-place update which is in direct opposition to efforts to securely delete sensitive Data from storage. Previously practical secure Deletion tools and techniques are rapidly becoming obsolete, and are rendered ineffective. Therefore, research on secure Data Deletion approaches for mobile devices has become a practical and urgent issue. In this paper, we study the logic structure and operation characteristics of flash memory, and survey related work on secure Data Deletion. In addition, we define the adversary capability and threat model, putting forward the design goals that secure Data Deletion scheme needs to meet. Then an approach in user space that uses the user space file system to provide secure Deletion guarantees at file granularity is proposed, independent of the characteristics of the underlying file system and storage medium. The approach encrypting every file on an insecure medium with a unique key that can later be discarded to cryptographically render the Data irrecoverable. Moreover, we implement our secure Data Deletion approach on Android platform named SADUS. Finally, experiments are conducted, and the results indicate that SADUS prototype ensures the secure Deletion of Data in flash memory on mobile devices with comparable overhead and it can meet the requirements of the users in daily use.
Bo Yang - One of the best experts on this subject based on the ideXlab platform.
-
Efficient attribute-based encryption with attribute revocation for assured Data Deletion
Information Sciences, 2019Co-Authors: Liang Xue, Bo YangAbstract:Abstract Cloud storage allows customers to store their Data on remote cloud servers. With the advantage of reducing the burden of Data management and storage, an increasing number of users prefer to store their Data on the cloud. While secure Data Deletion is a crucial, it is a challenging issue in cloud storage. Logically deleted Data may be easily exposed to un-authorized users in the cloud storage scenario thanks to its salient features such as multi-tenancy, virtualization and elasticity. Moreover, cloud servers might not delete customers’ Data as instructed for hidden business interest. Hence, assured Deletion is highly sought after. It helps preserve cloud users’ Data privacy and is a necessary component of Data retention regulations in cloud storage. In this paper, we first investigate the goals of assured Data Deletion and formalize its security model.Then, we propose a key-policy attribute-based encryption scheme for assured Deletion (AD-KP-ABE) of cloud Data. Our construction makes use of the attribute revocation cryptographic primitive and Merkle Hash Tree to achieve fine-grained access control and verifiable Data Deletion. The proposed AD-KP-ABE enjoys desirable properties such as no secret key update, partial ciphertext update and assured Data Deletion. The detailed security proof and implementation results demonstrate the security and practicality of our proposal.
-
assured Data Deletion with fine grained access control for fog based industrial applications
IEEE Transactions on Industrial Informatics, 2018Co-Authors: Liang Xue, Mohsen Guizani, Bo YangAbstract:The advances of cloud computing, fog computing, and Internet of things (IoT) make industries more prosperous than ever. A wide range of industrial systems such as transportation and manufacturing systems have been developed by integrating cloud computing, fog computing, and IoT infrastructure successfully. However, in this sophisticated system, security and privacy issues are major concerns that hinder the widespread adoptions of these novel techniques. In this paper, we focus on assured Data Deletion, an issue that is important but received less attention in academia and industry. We first propose a framework to integrate the cloud, the fog, and the things together to manage stored Data from industries or individuals. We then focus on secure Data Deletion in this framework by proposing an assured Data Deletion scheme that fulfills verifiable Data Deletion as well as flexible access control over sensitive Data. Only Data owners and fog devices are involved when deleting cloud Data and validating the Deletion of these Data, which makes the protocol practical due to the features of low latency as well as real-time interaction with fog. The proposed protocol takes advantage of the attribute-based encryption, whose security can be proved under the standard model. The theoretical analysis shows good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.
-
assured Data Deletion with fine grained access control for fog based industrial applications
arXiv: Cryptography and Security, 2018Co-Authors: Liang Xue, Mohsen Guizani, Bo YangAbstract:The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel techniques. In this paper, we focus on assured Data Deletion, an issue which is important but received less attention in academia and industry. We firstly propose a framework to integrate the cloud, the fog and the things together to manage the stored Data from industries or individuals. We then focus on secure Data Deletion in this framework by proposing an assured Data Deletion scheme which fulfills fine-grained access control over sensitive Data and verifiable Data Deletion. Only the Data owners and the fog devices are involved when deleting a Data key and validating the Data Deletion, which makes the protocol practical due to the features of low latency and real-time interaction of fog computing. The proposed protocol takes advantage of attribute-based encryption and is provably secure under the standard model. The theoretical analysis shows the good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.