메뉴 건너뛰기




Volumn 43, Issue 1, 2010, Pages

A survey of confidential data storage and deletion methods

Author keywords

Data overwriting techniques; Data theft; Personal privacy; Secure deletion; Secure erasure

Indexed keywords

CRIME; HARD DISK STORAGE; PERSONAL COMPUTING; SURVEYS;

EID: 78650122777     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1824795.1824797     Document Type: Article
Times cited : (68)

References (108)
  • 7
    • 85206027394 scopus 로고    scopus 로고
    • Critical recording benefits from cryptic measures
    • BOHMAN, T. 2007. Critical recording benefits from cryptic measures. VME Critical Syst. 26-28.
    • (2007) VME Critical Syst. , pp. 26-28
    • Bohman, T.1
  • 8
    • 84957063575 scopus 로고    scopus 로고
    • On the security properties of OAEP as an all-or-nothing transform
    • Springer, Berlin
    • BOYKO, V. 1999. On the security properties of OAEP as an all-or-nothing transform. In Proceedings of Advances in Cryptology (Crypto'99). Springer, Berlin, 503-518.
    • (1999) Proceedings of Advances in Cryptology (Crypto'99) , pp. 503-518
    • Boyko, V.1
  • 9
    • 85206044417 scopus 로고
    • National Bureau of Standards Special Publications D. Branstad et al. Eds., U.S. Department of Commerce, Washington, D.C.
    • CAMPBELL, C. 1978. Design and specification of cryptographic capabilities. In National Bureau of Standards Special Publications, D. Branstad et al. Eds., U.S. Department of Commerce, Washington, D.C., 54-66.
    • (1978) Design and Specification of Cryptographic Capabilities , pp. 54-66
    • Campbell, C.1
  • 11
    • 85034623360 scopus 로고
    • Cryptanalysis of des with a reduced number of rounds sequences of linear factors in block ciphers
    • Lecture Notes in Computer Science, vol. LNCS, Springer, Berlin
    • CHAUM, D., AND EVERTSE, J.-H. 1985. Cryptanalysis of DES with a reduced number of rounds sequences of linear factors in block ciphers. In Proceedings of Advances in Cryptology (Crypto'85). Lecture Notes in Computer Science, vol. LNCS 218, Springer, Berlin, 192-211.
    • (1985) Proceedings of Advances in Cryptology (Crypto'85) , vol.218 , pp. 192-211
    • Chaum, D.1    Evertse, J.-H.2
  • 13
    • 84889030419 scopus 로고    scopus 로고
    • Shredding your garbage: Reducing data lifetime through secure deallocation
    • USENIX Association, Berkeley, CA
    • CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. 2005. Shredding your garbage: Reducing data lifetime through secure deallocation. In Proceedings of the USENIX Security Symposium. USENIX Association, Berkeley, CA, 331-346.
    • (2005) Proceedings of the USENIX Security Symposium , pp. 331-346
    • Chow, J.1    Pfaff, B.2    Garfinkel, T.3    Rosenblum, M.4
  • 14
    • 85206050822 scopus 로고    scopus 로고
    • Homepage
    • DARIK'S BOOT AND NUKE. 2008. Homepage. http://dban.sourceforge.net/.
    • (2008) DARIK'S BOOT AND NUKE
  • 17
    • 0012983374 scopus 로고    scopus 로고
    • NIST Special Publication 800-38A. National Institute of Standards and Technology
    • DWORKIN, M. 2001. Recommendation for block cipher modes of operation, methods and techniques. NIST Special Publication 800-38A. National Institute of Standards and Technology. http://www.csrc.nist.gov/publications/nistpubs/800- 38a/sp800-38a.pdf.
    • (2001) Recommendation for Block Cipher Modes of Operation, Methods and Techniques
    • Dworkin, M.1
  • 18
    • 0347015653 scopus 로고    scopus 로고
    • FEDERAL TRADE COMMISSION,Pub. L. No. 106-102, 113 Stat. 1338, codified at 15 U.S.C. §§6801-09
    • FEDERAL TRADE COMMISSION. 1999. Gramm-Leach-Bliley Financial Services Modernization Act, Pub. L. No. 106-102, 113 Stat. 1338, codified at 15 U.S.C. §§6801-09.
    • (1999) Gramm-Leach-Bliley Financial Services Modernization Act
  • 19
    • 84949194630 scopus 로고    scopus 로고
    • A simple algebraic representation of Rijndael
    • In Proceedings of Selected Areas in Cryptography, Springer, Berlin
    • FERGUSON, N., SCHROEPPEL, R., AND WHITING, D. 2001. A simple algebraic representation of Rijndael. In Proceedings of Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2259, Springer, Berlin, 103-111.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 103-111
    • Ferguson, N.1    Schroeppel, R.2    Whiting, D.3
  • 20
    • 44049086023 scopus 로고    scopus 로고
    • AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista
    • FERGUSON, N. 2006. AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista. Tech. rep. http://www.microsoft.com/downloads/ details.aspx?FamilyID=131dae03-39ae-48bea8d6- 8b0034c92555&DisplayLang=en.
    • (2006) Tech. Rep.
    • Ferguson, N.1
  • 26
    • 0026911505 scopus 로고
    • Magnetic force scanning tunneling microscope imaging of overwritten data
    • GOMEZ, R., ADLY, A., MAYERGOYZ, I., AND BURKE., E. 1992. Magnetic force scanning tunneling microscope imaging of overwritten data. IEEE Trans. Magnetics 28, 5, 3141-3143.
    • (1992) IEEE Trans. Magnetics , vol.28 , Issue.5 , pp. 3141-3143
    • Gomez, R.1    Adly, A.2    Mayergoyz, I.3    Burke., E.4
  • 28
    • 33947155733 scopus 로고    scopus 로고
    • NIST special publication, National Institute of Standards and Technology, Gaithersburg, MD
    • GRANCE, T., STEVENS, M., AND MYERS, M. 2003. Guide to selecting information security products. NIST special publication 800-36, National Institute of Standards and Technology, Gaithersburg, MD. http://csrc.nist.gov/ publications/nistpubs/800-36/NIST-SP800-36.pdf.
    • (2003) Guide to Selecting Information Security Products , pp. 800-836
    • Grance, T.1    Stevens, M.2    Myers, M.3
  • 29
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • USENNIX Association, Berkeley, CA
    • GUTMANN, P. 1996. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the 6th USENIX Security Symposium. USENNIX Association, Berkeley, CA, 77-90.
    • (1996) Proceedings of the 6th USENIX Security Symposium , pp. 77-90
    • Gutmann, P.1
  • 30
    • 70349230440 scopus 로고    scopus 로고
    • ECryptfs: A stacked cryptographic filesystem
    • HALCROW, M. 2007. eCryptfs: A stacked cryptographic filesystem. Linux J. 156, 2.
    • (2007) Linux J. , vol.156 , pp. 2
    • Halcrow, M.1
  • 31
    • 84976704061 scopus 로고
    • The Zebra striped network file system
    • HARTMAN, J. AND OUSTERHOUT, J. 1995. The Zebra striped network file system. In ACM Trans. Comput. Syst. 13, 3, 274-310.
    • (1995) ACM Trans. Comput. Syst. , vol.13 , Issue.3 , pp. 274-310
    • Hartman, J.1    Ousterhout, J.2
  • 34
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • Proceedings of the Crypto'03, Springer, Berlin
    • HALEVI, S. AND ROGAWAY, P. 2003. A tweakable enciphering mode. In Proceedings of the Crypto'03. Lecture Notes in Computer Science, vol. 2729, Springer, Berlin, 482-499.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 35
    • 85206064455 scopus 로고    scopus 로고
    • IRS still losing laptops
    • HINES, M. 2007. IRS still losing laptops. InfoWorld. http://www. infoworld.com/article/07/04/05/HNirslostlaptops 1.html.
    • (2007) InfoWorld
    • Hines, M.1
  • 36
    • 85206066544 scopus 로고    scopus 로고
    • HOHMANN, C. 2008. CryptoFS. http://reboot.animeirc.de/cryptofs/.
    • (2008) CryptoFS
    • Hohmann, C.1
  • 37
    • 33749161511 scopus 로고    scopus 로고
    • Network Working Group RFC 3825, Standards Track
    • HOUSLEY, R. 2004. Cryptographic message syntax. Network Working Group RFC 3825, Standards Track. http://www.ietf.org/rfc/rfc3852.txt.
    • (2004) Cryptographic Message Syntax
    • Housley, R.1
  • 39
    • 85206058146 scopus 로고    scopus 로고
    • IRONKEY
    • IRONKEY. 2007. Benefits of hardware-based encryption. https://learn.ironkey.com/docs/IronKey WhitepaperBenefits of Hardware Encryption.pdf.
    • (2007) Benefits of Hardware-based Encryption
  • 44
    • 0004216472 scopus 로고    scopus 로고
    • Private Communication in a Public World 2nd Ed Prentice Hall, Englewood Cliffs, NJ
    • KAUFMAN, C., PERLMAN, R., AND SPECINER, M. 2002. Network Security: Private Communication in a Public World 2nd Ed. Prentice Hall, Englewood Cliffs, NJ.
    • (2002) Network Security
    • Kaufman, C.1    Perlman, R.2    Speciner, M.3
  • 45
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the Internet Protocol
    • KENT, S. AND ATKINSON, R. 1998. Security architecture for the Internet Protocol. Technical rep. RFC 2401. http://www.ietf.org/rfc/rfc2401.txt.
    • (1998) Technical Rep. RFC , pp. 2401
    • Kent, S.1    Atkinson, R.2
  • 47
    • 85206066297 scopus 로고    scopus 로고
    • KINGSTON TECHNOLOGY
    • KINGSTON TECHNOLOGY. 2008. Data traveler secure. http://www.kingston.com/ flash/dt secure.asp.
    • (2008) Data Traveler Secure
  • 48
    • 0002024821 scopus 로고
    • Vnodes: An architecture for multiple file system types in Sun UNIX
    • USENIX Association, Berkeley, CA
    • KLEIMAN, S. R. 1986. Vnodes: An architecture for multiple file system types in Sun UNIX. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 238-247.
    • (1986) Proceedings of the USENIX Annual Technical Conference , pp. 238-247
    • Kleiman, S.R.1
  • 51
  • 52
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • LUBY, M. AND RACKOFF, C. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17, 2, 373-386.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 55
    • 85206032566 scopus 로고    scopus 로고
    • 2.9 million US residents at risk of ID theft
    • MCNEVIN, G. 2007. 2.9 million US residents at risk of ID theft. Image Data Manager. http://www.idm.net.au/story.asp?id=8270.
    • (2007) Image Data Manager
    • McNevin, G.1
  • 57
    • 33947186223 scopus 로고    scopus 로고
    • Encrypting file system in Windows XP and Windows Server 2003
    • MICROSOFT CORP
    • MICROSOFT CORP. 2002. Encrypting file system in Windows XP and Windows Server 2003. Tech. rep. http://technet.microsoft.com/en-us/library/bb457065. aspx.
    • (2002) Tech. Rep.
  • 58
    • 85206037119 scopus 로고    scopus 로고
    • Microsoft office 2003 Eds
    • MICROSOFT CORP.
    • MICROSOFT CORP. 2003. Microsoft Office 2003 Eds. Security whitepaper. http://www.microsoft.com/technet/prodtechnol/office/office2003/operate/o3secdet. mspx.
    • (2003) Security Whitepaper
  • 59
    • 85206036205 scopus 로고    scopus 로고
    • Bitlocker drive encryption: Executive overview
    • MICROSOFT CORP
    • MICROSOFT CORP. 2006. Bitlocker drive encryption: Executive overview. Tech. rep. http://technet.microsoft.com/en-us/windowsvista/aa906018.aspx#EQB.
    • (2006) Tech. Rep.
  • 61
    • 85206037346 scopus 로고    scopus 로고
    • MICROSOFT CORP
    • MICROSOFT CORP. 2008. How EFS works. Tech. Rep. 2008. http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/distrib/ dsck efs duwf.mspx? mfr=true.
    • (2008) How EFS Works. Tech. Rep. , vol.2008
  • 64
    • 85206020469 scopus 로고    scopus 로고
    • NESTER.
    • NESTER. 2008. Wipe homepage. http://wipe.sourceforge.net/.
    • (2008) Wipe Homepage
  • 66
    • 70449683026 scopus 로고    scopus 로고
    • NIST, National Institute of Standards and Technology, Gaithersburg, MD.
    • NIST. 2008. Request for public comments on XTS. National Institute of Standards and Technology, Gaithersburg, MD. http://csrc.nist.gov/groups/ST/ documents/Request-for-PublicComment-on XTS.pdf.
    • (2008) Request for Public Comments on XTS
  • 67
    • 78650108412 scopus 로고    scopus 로고
    • Efficient cryptographic techniques for securing storage systems
    • Carnegie Mellon University
    • OPREA, A. 2007. Efficient cryptographic techniques for securing storage systems. Tech. rep. CMU-CS-07-119, Carnegie Mellon University.
    • (2007) Tech. Rep. CMU-CS-07-119
    • Oprea, A.1
  • 72
    • 33244463191 scopus 로고    scopus 로고
    • Ext3cow: A time-shifting file system for regulatory compliance
    • PETERSON, Z. AND BURNS, R. 2005. Ext3cow: A time-shifting file system for regulatory compliance. ACM Trans. Storage 1, 2, 190-212.
    • (2005) ACM Trans. Storage , vol.1 , Issue.2 , pp. 190-212
    • Peterson, Z.1    Burns, R.2
  • 80
    • 85206020850 scopus 로고
    • Cryptographic message syntax standard
    • RSA LABORATORIES.
    • RSA LABORATORIES. 1993. Cryptographic message syntax standard. Tech. note, PKCS 7, v1.5. ftp://ftp.rsasecurity.com/pub/pkcs/ps/pkcs-7.ps.
    • (1993) Tech. Note, PKCS 7, v1.5.
  • 84
    • 85206038727 scopus 로고    scopus 로고
    • SECUREDISK.
    • SECUREDISK. 2008. Hardware SecureDisk encryption. http://www.usbgear.com/ secure-disk-hardware-encryptedusbdrive.html.
    • (2008) Hardware SecureDisk Encryption
  • 85
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
    • (1979) Comm ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 93
    • 31344435093 scopus 로고    scopus 로고
    • Drive-independent data recovery: The current state-of-theart
    • SOBEY, C., ORTO, L., AND SAKAGUCHI, G. 2006. Drive-independent data recovery: The current state-of-theart. IEEE Trans. Magnetics 42, 2, 1, 188-193.
    • (2006) IEEE Trans. Magnetics 42 , vol.2 , Issue.1 , pp. 188-193
    • Sobey, C.1    Orto, L.2    Sakaguchi, G.3
  • 94
    • 78651279231 scopus 로고    scopus 로고
    • Feistel finite set encryption mode
    • SPIES, T. 2008. Feistel finite set encryption mode. NIST proposed encryption mode. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/ proposedmodes/ffsem/ffsem-spec.pdf.
    • (2008) NIST Proposed Encryption Mode
    • Spies, T.1
  • 95
    • 85206050180 scopus 로고    scopus 로고
    • Stolen laptop may hold ID numbers
    • SQUARE, L. 2007. Stolen laptop may hold ID numbers. The Daily Reveille. http://media.www.lsureveille.com/media/storage/paper868/news/2007/05/03/News/ Stolen.Laptop.May. Hold.Id.Numbers-2892874.shtml.
    • (2007) The Daily Reveille
    • Square, L.1
  • 97
    • 85206067242 scopus 로고    scopus 로고
    • Help! i left my identity in the backseat of a taxi
    • SULLIVAN, B. 2005. Help! I left my identity in the backseat of a taxi. MSNBC: The Red Tape Chronicles. http://redtape.msnbc.com/2005/11/why you should .html.
    • (2005) MSNBC: The Red Tape Chronicles
    • Sullivan, B.1
  • 100
    • 0005877091 scopus 로고
    • U. S. DEPARTMENT OF DEFENSE, 5220.22- M, U.S Government Printing Office, Washington, D.C
    • U. S. DEPARTMENT OF DEFENSE. 1995. National Industrial Security Program Operating Manual. 5220.22- M, U.S. Government Printing Office, Washington, D.C.
    • (1995) National Industrial Security Program Operating Manual
  • 101
    • 85206025607 scopus 로고    scopus 로고
    • WIRELESSWEEK, Wirel. Week
    • WIRELESSWEEK. 2007. Alcatel-Lucent loses computer disk. Wirel. Week http://www.wirelessweek.com/article.aspx?id=148070.
    • (2007) Alcatel-Lucent Loses Computer Disk
  • 102
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of pgp 5.0
    • USENIX Association, Berkeley, CA
    • WHITTEN, A. AND TYGAR, J. D. 1999. Why Johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium. USENIX Association, Berkeley, CA, 169-184.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 107
    • 0012579128 scopus 로고    scopus 로고
    • Cryptfs: A stackable vnode level encryption file system
    • Computer Science Dept., Columbia University
    • ZADOK, E., BADULESCU, I., AND SHENDER, A. 1998. Cryptfs: A stackable vnode level encryption file system. Tech. rep. CUCS-021-98, Computer Science Dept., Columbia University.
    • (1998) Tech. Rep. CUCS-021-98
    • Zadok, E.1    Badulescu, I.2    Shender, A.3
  • 108


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.