Overview
- First book to offer a systematized comparison of secure deletion solutions
- Shows how to build a system and adversarial model
- Useful for researchers, graduate students, and practitioners
- Includes supplementary material: sn.pub/extras
Part of the book series: Information Security and Cryptography (ISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents(12 chapters)
-
Introduction and Background
-
Secure Deletion for Mobile Storage
-
Secure Deletion for Remote Storage
-
Conclusions
About this book
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities, and then builds a system and adversarial model based on the survey of related work.
The book is useful for both academics, researchers and graduate students, and for practitioners who may integrate its results into deployed systems.
Reviews
“The author has written the definitive reference on the topic ... a formalized and systematized approach to the secure deletion of data. This is not the book for those looking for a list of products for file or drive sanitization. This is actually the book that the developers of such software and hardware solutions should be using to design their systems, and to ensure their products can indeed perform as described. ... The book is a fascinating read for anyone who wants to understand the significant challenges in deleted data from various forms of media.” (Ben Rothke, CISSP CISM)
Authors and Affiliations
-
Dept. of Computer Science, ETH Zürich, Zürich, Switzerland
Joel Reardon
About the author
Joel Reardon received his Ph.D. from the System Security Group of the Institute of Information Security of ETH Zürich. He is currently a postdoc in the International Computer Science Institute (ICSI) and University of California, Berkeley.
Bibliographic Information
Book Title: Secure Data Deletion
Authors: Joel Reardon
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-319-28778-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2016
Hardcover ISBN: 978-3-319-28777-5Published: 11 November 2016
Softcover ISBN: 978-3-319-80422-4Published: 23 June 2018
eBook ISBN: 978-3-319-28778-2Published: 02 November 2016
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XVII, 203
Number of Illustrations: 32 b/w illustrations
Topics: Data Structures and Information Theory, Security, Security Science and Technology, Computer Hardware, Electronics and Microelectronics, Instrumentation