A survey of confidential data storage and deletion methods

Sarah M. Diesburg, An-I Andy Wang
2010 ACM Computing Surveys  
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. This survey summarizes and compares existing methods of providing confidential storage and deletion
more » ... f data in personal computing environments. ACM Reference Format: Diesburg, S. M. and Wang, A. A. 2010. A survey of confidential data storage and deletion methods. ACM
doi:10.1145/1824795.1824797 fatcat:vzapmp6lqveodcpenmw6egfuly