My Account Log in

1 option

Secure Data Deletion / by Joel Reardon.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Reardon, Joel, 1983- author.
Contributor:
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Information security and cryptography 1619-7100
Information Security and Cryptography, 1619-7100
Language:
English
Subjects (All):
Data structures (Computer science).
Data protection.
System safety.
Computer hardware.
Electronics.
Microelectronics.
Data Structures and Information Theory.
Security.
Security Science and Technology.
Computer Hardware.
Electronics and Microelectronics, Instrumentation.
Local Subjects:
Data Structures and Information Theory.
Security.
Security Science and Technology.
Computer Hardware.
Electronics and Microelectronics, Instrumentation.
Physical Description:
1 online resource (XVII, 203 pages) : 32 illustrations.
Edition:
First edition 2016.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2016.
System Details:
text file PDF
Summary:
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities, and then builds a system and adversarial model based on the survey of related work. The book is useful for both academics, researchers and graduate students, and for practitioners who may integrate its results into deployed systems.
Contents:
Introduction
Related Work on Secure Deletion
System Model and Security Goal
Flash Memory: Background and Related Work
User-Level Secure Deletion on Log-Structured File Systems
Data Node Encrypted File System
UBIFSec: Adding DNEFS to UBIFS
Cloud Storage: Background and Related Work
Secure Data Deletion from Persistent Media
B-Tree-Based Secure Deletion
Robust Key Management for Secure Data Deletion
Conclusions.
Other Format:
Printed edition:
ISBN:
978-3-319-28778-2
9783319287782
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account