10.1145/3488932.3523255acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open Access

Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates

Authors Info & Claims
Published:30 May 2022Publication History

ABSTRACT

Flash memory has been used extensively as external storage of smartphones, tablets, IoT devices, laptops, etc. Therefore, more and more sensitive or even mission critical data are stored in flash and, once the data turn obsolete, securely deleting them is necessary for both regulation compliance and privacy protection. Traditional secure deletion on flash memory mainly focuses on sanitizing data. However, unique nature of flash memory may cause various data ''remnants'' and, even though the data are removed, the remnants may be utilized by the adversary to recover the deleted data, compromising the secure deletion guarantee.

Based on both theoretic analysis and experiments using real-world workloads, we have identified one common type of remnants in the flash memory, namely duplicates, which are caused by unique internal functions of flash storage media including garbage collection, wear leveling, bad block management. We propose RedFlash, a novel secure deletion scheme which can efficiently Remove both the data and the corresponding duplicates towards secure deletion on Flash memory. Security analysis and experimental evaluation show that RedFlash can ensure the secure deletion guarantee, at the cost of a small performance degradation, compared to a regular (non-secure) flash controller.

Skip Supplemental Material Section

Supplemental Material

ASIA-CCS22-fpm238.mp4

To handle the unique hardware nature of flash memory, flash storage media typically incorporate special functions internally which, however, will produce various duplicates over time. Such duplicates may lead to compromise of the security guarantee offered by existing secure deletion on flash memory. In this video, we first introduce background knowledge of flash memory. We then demonstrate the existence of duplicates, both theoretically and experimentally. Next, we introduce RedFlash, our secure deletion design for flash storage media that can efficiently remove both data and their corresponding duplicates. Our key idea is to maintain a duplicate chain in the out-of-band (OOB) area to keep track of locations of duplicates, such that we can efficiently locate and delete all the duplicates upon secure deletion. Lastly, we introduce our implementation of RedFlash in a real-world testbed and our experimental evaluations. The results show that RedFlash can achieve secure deletion with a small additional overhead.

References

  1. Technical Note - Garbage Collection in Single-Level Cell NAND Flash Memory. https://www.micron.com/-/media/client/global/Documents/Products/Technical%20Note/NAND%20Flash/tn2960_garbage_collection_slc_nand.ashx.Google ScholarGoogle Scholar
  2. Jffs2. https://www.sourceware.org/jffs2/, 2003.Google ScholarGoogle Scholar
  3. Samsung K9GAG08B0M Datasheet. https://www.datasheet.directory/index.php?title=Special:PdfViewer&url=https%3A%2F%2Fdatasheet.iiic.cc%2Fdatasheets-0%2Fsamsung%2FK9GAG08U0M-PIB0.pdf, 2007.Google ScholarGoogle Scholar
  4. Memory Technology Device (MTD) Subsystem for Linux. http://www.linux-mtd.infradead.org/nand-data/nanddata.html, 2011.Google ScholarGoogle Scholar
  5. SNIA I/O Trace Data Files. http://iotta.snia.org/traces/, 2011.Google ScholarGoogle Scholar
  6. Dod manual 5220.22-m. https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/522022M.pdf?ver=2017-04-17-134632-467, 2016.Google ScholarGoogle Scholar
  7. Regulation (eu) 2016/679 of the european parliament and of the council. https://eur-lex.europa.eu/eli/reg/2016/679/oj, 2016.Google ScholarGoogle Scholar
  8. F2fs, 2019. https://www.kernel.org/doc/Documentation/filesystems/f2fs.txt.Google ScholarGoogle Scholar
  9. Firefly AIO-3399J. https://en.t-firefly.com/product/industry/aio_3399, 2021.Google ScholarGoogle Scholar
  10. Bikash Agrawal, Raymond Hansen, Chunming Rong, and Tomasz Wiktorski. Sd-hdfs: Secure deletion in hadoop distributed file system. In 2016 IEEE International Congress on Big Data (BigData Congress), pages 181--189. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ahmed A Ataullah, Ashraf Aboulnaga, and Frank Wm Tompa. Records retention in relational database systems. In Proceedings of the 17th ACM conference on Information and knowledge management, pages 873--882. ACM, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sumeet Bajaj and Radu Sion. Ficklebase: Looking into the future to erase the past. In 2013 IEEE 29th International Conference on Data Engineering (ICDE), pages 86--97. IEEE, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sumeet Bajaj and Radu Sion. Hifs: History independence for file systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1285--1296. ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Bruce McNutt Ken Bates. Umasstracerepository-search engine i/o. http://traces.cs.umass.edu/index.php/Storage/Storage, 2002.Google ScholarGoogle Scholar
  15. Steven Bauer and Nissanka Bodhi Priyantha. Secure data deletion for linux file systems. In Usenix Security Symposium, volume 174, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir. Key recovery attacks of practical complexity on aes-256 variants with up to 10 rounds. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 299--319. Springer, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. Biclique cryptanalysis of the full aes. In International Conference on the Theory and Application of Cryptology and Information Security, pages 344--371. Springer, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Daniel Boteanu and Kevvie Fowler. Bypassing self-encrypting drives (sed) in enterprise environments. In Proceedings of the Black Hat Europe Conference, 2015.Google ScholarGoogle Scholar
  19. Fabiano C Botelho, Philip Shilane, Nitin Garg, and Windsor Hsu. Memory efficient sanitization of a deduplicated storage system. In Presented as part of the 11th USENIX Conference on File and Storage Technologies (FAST 13), pages 81--94, 2013.Google ScholarGoogle Scholar
  20. Alexandre Melo Braga and Alfredo H Gallinucci Colito. Adding secure deletion to an encrypted file system on android smartphones. In Proc. SECURWARE, pages 106--110, 2014.Google ScholarGoogle Scholar
  21. Marcel Breeuwsma, Martien De Jongh, Coert Klaver, Ronald Van Der Knijff, and Mark Roeloffs. Forensic data recovery from flash memory. Small Scale Digital Device Forensics Journal, 1(1):1--17, 2007.Google ScholarGoogle Scholar
  22. Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, and Alessandro Sorniotti. Policy-based secure deletion. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 259--270. ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Claude Castelluccia, Emiliano De Cristofaro, Aurelien Francillon, and Mohamed-Ali Kaafar. Ephpub: Toward robust ephemeral publishing. In 2011 19th IEEE International Conference on Network Protocols, pages 165--175. IEEE, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bo Chen, Shijie Jia, Luning Xia, and Peng Liu. Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. In Proceedings of the 32nd Annual Conference on Computer Security Applications, pages 496--507. ACM, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bo Chen and Radu Sion. Hiflash: A history independent flash device. arXiv preprint arXiv:1511.05180, 2015.Google ScholarGoogle Scholar
  26. Siddharth Choudhuri and Tony Givargis. Deterministic service guarantees for nand flash using partial block cleaning. In Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, pages 19--24. ACM, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Carnegie Mellon University. Disksim simulator. https://www.pdl.cmu.edu/DiskSim/index.shtml, 2008.Google ScholarGoogle Scholar
  28. Google Code. Opennfm. https://code.google.com/p/opennfm/, 2011.Google ScholarGoogle Scholar
  29. United States Congress. Health Insurance Portability and Accountability Act. http://www.hhs.gov/ocr/privacy/index.html, 1996.Google ScholarGoogle Scholar
  30. Patrick Derbez, Pierre-Alain Fouque, and Jérémy Jean. Improved key recovery attacks on reduced-round aes in the single-key setting. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 371--387. Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  31. Ming Di Leom. Remote Wiping in Android. PhD thesis, University of South Australia, 2015.Google ScholarGoogle Scholar
  32. Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, and Geoff Kuenning. Trueerase: Per-file secure deletion for the storage data path. In Proceedings of the 28th annual computer security applications conference, pages 439--448. ACM, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Sarah Diesburg, Christopher Meyers, Mark Stanovich, An-I Andy Wang, and Geoff Kuenning. Trueerase: Leveraging an auxiliary data path for per-file secure deletion. ACM Transactions on Storage (TOS), 12(4):18, 2016.Google ScholarGoogle Scholar
  34. Yajuan Du, Wei Liu, Yuan Gao, and Rachata Ausavarungnirun. Observation and optimization on garbage collection of flash memories: The view in performance cliff. Micromachines, 12(7):846, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  35. Freecode. fio. http://freecode.com/projects/fio, 2014.Google ScholarGoogle Scholar
  36. Simson L Garfinkel and Abhi Shelat. Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 99(1):17--27, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Roxana Geambasu, Tadayoshi Kohno, Amit A Levy, and Henry M Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security Symposium, volume 316, 2009.Google ScholarGoogle Scholar
  38. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting transparent snapshot for bare-metal malware analysis on mobile devices. In Proceedings of the 33rd Annual Computer Security Applications Conference, pages 339--349. ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Aayush Gupta, Youngjae Kim, and Bhuvan Urgaonkar. DFTL: a flash translation layer employing demand-based selective caching of page-level address mappings, volume 44. ACM, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Keonsoo Ha, Jaeyong Jeong, and Jihong Kim. A read-disturb management technique for high-density nand flash memory. In Proceedings of the 4th Asia-Pacific Workshop on Systems, page 13. ACM, 2013.Google ScholarGoogle Scholar
  41. J Alex Halderman, Seth D Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A Calandrino, Ariel J Feldman, Jacob Appelbaum, and Edward W Felten. Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52(5):91--98, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Jason D Hartline, Edwin S Hong, Alexander E Mohr, William R Pentney, and Emily C Rocke. Characterizing history independent data structures. Algorithmica, 42(1):57--74, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Md Mehedi Hasan and Biswajit Ray. Data recovery from "scrubbed" nand flash storage: Need for analog sanitiza-tion. In The 29th Usenix Security Symposium, 2020.Google ScholarGoogle Scholar
  44. Intel. Intel ssd firmware update tool. https://www.intel.com/content/www/us/en/download/17903/intel-ssd-firmware-update-tool.html, 2021.Google ScholarGoogle Scholar
  45. Kee-Hoon Jang and Tae Hee Han. Efficient garbage collection policy and block management method for nand flash memory. In 2010 2nd International Conference on Mechanical and Electronics Engineering, volume 1, pages V1--327. IEEE, 2010.Google ScholarGoogle Scholar
  46. Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. Nfps: Adding undetectable secure deletion to flash translation layer. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 305--315. ACM, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. Deftl: Implementing plausibly deniable encryption in flash translation layer. In Proceedings of the 24th ACM conference on Computer and communications security. ACM, 2017.Google ScholarGoogle Scholar
  48. Nikolai Joukov and Erez Zadok. Adding secure deletion to your favorite file system. In Third IEEE International Security in Storage Workshop (SISW'05), pages 8--pp. IEEE, 2005.Google ScholarGoogle Scholar
  49. Sanghyuk Jung and Yong Ho Song. Link-gc: a preemptive approach for garbage collection in nand flash storages. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages 1478--1484. ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Keonwoo Kim, Dowon Hong, Kyoil Chung, and Jae-Cheol Ryou. Data acquisition from cell phone using logical approach. Proceedings of the world academy of science, engineering and technology, 26, 2007.Google ScholarGoogle Scholar
  51. Richard Kissel, Matthew A Scholl, Steven Skolochenko, and Xing Li. Sp 800--88 rev. 1. guidelines for media sanitization, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Byunghee Lee, Kyungho Son, Dongho Won, and Seungjoo Kim. Secure data deletion for usb flash memory. J. Inf. Sci. Eng., 27(3):933--952, 2011.Google ScholarGoogle Scholar
  53. Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, and Sung Y Shin. Secure deletion for nand flash file system. In Proceedings of the 2008 ACM symposium on Applied computing, pages 1710--1714. ACM, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Park, Sung Y Shin, and Yookun Cho. An efficient secure deletion scheme for flash file systems. J. Inf. Sci. Eng., 26(1):27--38, 2010.Google ScholarGoogle Scholar
  55. Lei Lei, Quanwei Cai, Bo Chen, and Jingqiang Lin. Towards efficient re-encryption for secure client-side deduplication in public clouds. In International Conference on Information and Communications Security, pages 71--84. Springer, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ming Di Leom, Kim-Kwang Raymond Choo, and Ray Hunt. Remote wiping and secure deletion on mobile devices: A review. Journal of forensic sciences, 61(6):1473--1492, 2016.Google ScholarGoogle Scholar
  57. Jingwei Li, Chuan Qin, Patrick PC Lee, and Jin Li. Rekeying for encrypted deduplication storage. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 618--629. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  58. Jianwei Liao, Fengxiang Zhang, Li Li, and Guoqiang Xiao. Adaptive wear-leveling in flash-based memory. IEEE Computer Architecture Letters, 14(1):1--4, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Carsten Maartmann-Moe, Steffen E Thorkildsen, and André Årnes. The persistence of memory: Forensic identification and extraction of cryptographic keys. digital investigation, 6:S132--S140, 2009.Google ScholarGoogle Scholar
  60. Carlo Meijer and Bernard Van Gastel. Self-encrypting deception: weaknesses in the encryption of solid state drives. In 2019 IEEE Symposium on Security and Privacy (SP), pages 72--87. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  61. Dutch T Meyer and William J Bolosky. A study of practical deduplication. ACM Transactions on Storage (TOS), 7(4):14, 2012.Google ScholarGoogle Scholar
  62. Zhen Mo, Yan Qiao, and Shigang Chen. Two-party fine-grained assured deletion of outsourced data in cloud systems. In Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on, pages 308--317. IEEE, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Zhen Mo, Qingjun Xiao, Yian Zhou, and Shigang Chen. On deletion of outsourced data in cloud computing. In 2014 IEEE 7th International Conference on Cloud Computing, pages 344--351. IEEE, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Tilo Müller, Tobias Latzo, and Felix C Freiling. Self-encrypting disks pose self-decrypting risks. In the 29th Chaos Communinication Congress, pages 1--10, 2012.Google ScholarGoogle Scholar
  65. Muthukumar Murugan and David HC Du. Rejuvenator: A static wear leveling algorithm for nand flash memory with minimized overhead. In 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST), pages 1--12. IEEE, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Kaan Onarlioglu, William Robertson, and Engin Kirda. Eraser: Your data won't be back. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 153--166. IEEE, 2018.Google ScholarGoogle Scholar
  67. Radia Perlman. File system design with assured delete. In Third IEEE International Security in Storage Workshop (SISW'05), pages 6--pp. IEEE, 2005.Google ScholarGoogle Scholar
  68. Timothy M Peters, Mark A Gondree, and Zachary NJ Peterson. DEFY: A deniable, encrypted file system for log-structured storage. In 22th Annual Network and Distributed System Security Symposium, NDSS, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  69. Zachary NJ Peterson, Randal C Burns, Joseph Herring, Adam Stubblefield, and Aviel D Rubin. Secure deletion for a versioning file system. In FAST, volume 5, pages 143--154, 2005.Google ScholarGoogle Scholar
  70. Arthur Rahumed, Henry CH Chen, Yang Tang, Patrick PC Lee, and John CS Lui. A secure cloud backup system with assured deletion and version control. In 2011 40th International Conference on Parallel Processing Workshops, pages 160--167. IEEE, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Joel Reardon, David Basin, and Srdjan Capkun. Sok: Secure data deletion. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 301--315. IEEE, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Joel Reardon, Srdjan Capkun, and David Basin. Data node encrypted file system: Efficient secure deletion for flash memory. In Proceedings of the 21st USENIX conference on Security symposium, pages 17--17. USENIX Association, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Samsung. K9f4g08u0a datasheet (pdf). https://pdf1.datasheet.com/datasheet-pdf/view/135880/SAMSUNG/K9F4G08U0A.html.Google ScholarGoogle Scholar
  74. Samsung. Samsung ssd magician7 software. https://semiconductor.samsung.com/consumer-storage/magician/, 2022.Google ScholarGoogle Scholar
  75. SkyHighMemory. What types of ecc should be used on flash memory? http://www.skyhighmemory.com/download/applicationNotes/001-99200_AN99200_What_Types_of_ECC_Should_Be_Used_on_Flash_Memory.pdf.Google ScholarGoogle Scholar
  76. Avinash Srinivasan, Jie Wu, Panneer Santhalingam, and Jeffrey Zamanski. Deaddrop-in-a-flash: Information hiding at ssd nand flash memory physical layer. SECURWARE 2014, page 79, 2014.Google ScholarGoogle Scholar
  77. Mark W Storer, Kevin Greenan, Darrell DE Long, and Ethan L Miller. Secure data deduplication. In Proceedings of the 4th ACM international workshop on Storage security and survivability, pages 1--10, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Raja Subramani, Haritima Swapnil, Niharika Thakur, Bharath Radhakrishnan, and Krishnamurthy Puttaiah. Garbage collection algorithms for nand flash memory devices--an overview. In 2013 European Modelling Symposium, pages 81--86. IEEE, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Steven Swanson and Michael Wei. Safe: Fast, verifiable sanitization for ssds. San Diego, CA: University of California-San Diego, 2010.Google ScholarGoogle Scholar
  80. Yang Tang, Patrick PC Lee, John Lui, and Radia Perlman. Secure overlay cloud storage with access control and assured deletion. Dependable and Secure Computing, IEEE Transactions on, 9(6):903--916, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Yang Tang, Patrick PC Lee, John CS Lui, and Radia Perlman. Fade: Secure overlay cloud storage with file assured deletion. In International Conference on Security and Privacy in Communication Systems, pages 380--397. Springer, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  82. Deepthi Tankasala, Niusen Chen, and Bo Chen. A step-by-step guideline for creating a testbed for flash memory research via lpc-h3131 and opennfm. 2020.Google ScholarGoogle Scholar
  83. Shin Tezuka, Ryuya Uda, and Kenichi Okada. Adec: Assured deletion and verifiable version control for cloud storage. In 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, pages 23--30. IEEE, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Wei-Chen Wang, Chien-Chung Ho, Yuan-Hao Chang, Tei-Wei Kuo, and Ping-Hsien Lin. Scrubbing-aware secure deletion for 3-d nand flash. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(11):2790--2801, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  85. Michael Yung Chung Wei, Laura M Grupp, Frederick E Spada, and Steven Swanson. Reliably erasing data from flash-based solid state drives. In FAST, volume 11, 2011.Google ScholarGoogle Scholar
  86. Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, and Patrick S Chen. A secure data self-destructing scheme in cloud computing. IEEE Transactions on Cloud Computing, 2(4):448--458, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  87. Yaffs. Yaffs. http://www.yaffs.net/, 2002.Google ScholarGoogle Scholar
  88. Ming-Chang Yang, Yu-Ming Chang, Che-Wei Tsao, Po-Chun Huang, Yuan-Hao Chang, and Tei-Wei Kuo. Garbage collection and wear leveling for flash memory: Past and future. In Smart Computing (SMARTCOMP), 2014 International Conference on, pages 66--73. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  89. Apostolis Zarras, Katharina Kohls, Markus Dürmuth, and Christina Pöpper. Neuralyzer: flexible expiration times for the revocation of online data. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pages 14--25. ACM, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Lingfang Zeng, Shibin Chen, Qingsong Wei, and Dan Feng. Sedas: A self-destructing data system based on active storage framework. In APMRC, 2012 Digest, pages 1--8. IEEE, 2012.Google ScholarGoogle Scholar
  91. Qionglu Zhang, Shijie Jia, Bing Chang, and Bo Chen. Ensuring data confidentiality via plausibly deniable encryption and secure deletion--a survey. Cybersecurity, 1(1):1, 2018.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
    May 2022
    1291 pages
    ISBN:9781450391405
    DOI:10.1145/3488932

    Copyright © 2022 Owner/Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 30 May 2022

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%
  • Article Metrics

    • Downloads (Last 12 months)196
    • Downloads (Last 6 weeks)19

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!