Secure Deletion File Systems

In this project we consider techniques to wipe out the data from storage to prevent the possibility of its future unintended recovery. File systems can reliably detect events such as deletion, truncation, and renaming that require secure deletion. At the same time, file systems have knowledge about the physical location of the data that requires overwriting. This makes file systems the ideal place for secure deletion functionality.

Download software.

Conference and Workshop Papers:

# Title (click for html version) Formats Published In Date Comments
1 Secure Deletion Myths, Issues, and Solutions PS PDF BibTeX Second ACM International Workshop on Storage Security and Survivability (StorageSS 2006) held in conjunction with the 13th ACM CCS. Oct 2006  
2 Adding Secure Deletion to Your Favorite File System PS PDF BibTeX Third IEEE Security In Storage Workshop (SISW 2005) Dec 2005  

Past Students:

# Name (click for home page) Program Period Current Location
1 Nikolai Joukov PhD Jan 2004 - Dec 2006 Research Staff Member, Storage and Data Services Research group, IBM T. J. Watson Research Center (Hawthorne, NY)
2 Harry Papaxenopoulos MS Dec 2005 - Mar 2007 Staff Engineer, Static Application Security Testing, Whitehat Security (Santa Clara, CA)


(Last updated: Thu Feb 19 23:07:40 EST 2015)