{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:53:31Z","timestamp":1767858811933,"version":"3.49.0"},"reference-count":92,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,5,20]],"date-time":"2017-05-20T00:00:00Z","timestamp":1495238400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-0845672,CNS-1065127"],"award-info":[{"award-number":["CNS-0845672,CNS-1065127"]}]},{"name":"DoE","award":["P200A060279"],"award-info":[{"award-number":["P200A060279"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2016,8,29]]},"abstract":"<jats:p>\n                    One important aspect of privacy is the ability to securely delete sensitive data from electronic storage in such a way that it cannot be recovered; we call this action\n                    <jats:italic toggle=\"yes\">secure deletion<\/jats:italic>\n                    . Short of physically destroying the entire storage medium, existing software secure-deletion solutions tend to be piecemeal at best -- they may only work for one type of storage or file system, may force the user to delete all files instead of selected ones, may require the added complexities of encryption and key storage, may require extensive changes and additions to the computer's operating system or storage firmware, and may not handle system crashes gracefully.\n                  <\/jats:p>\n                  <jats:p>We present TrueErase, a holistic secure-deletion framework for individual systems that contain sensitive data. Through design, implementation, verification, and evaluation on both a hard drive and NAND flash, TrueErase shows that it is possible to construct a per-file, secure-deletion framework that can accommodate different storage media and legacy file systems, require limited changes to legacy systems, and handle common crash scenarios. TrueErase can serve as a building block by cryptographic systems that securely delete information by erasing encryption keys. The overhead is dependent on spatial locality, number of sensitive files, and workload (computational- or I\/O-bound).<\/jats:p>","DOI":"10.1145\/2854882","type":"journal-article","created":{"date-parts":[[2016,5,21]],"date-time":"2016-05-21T21:23:59Z","timestamp":1463865839000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["TrueErase"],"prefix":"10.1145","volume":"12","author":[{"given":"Sarah","family":"Diesburg","sequence":"first","affiliation":[{"name":"University of Northern Iowa, Cedar Falls, IA"}]},{"given":"Christopher","family":"Meyers","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]},{"given":"Mark","family":"Stanovich","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]},{"given":"An-I Andy","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL"}]},{"given":"Geoff","family":"Kuenning","sequence":"additional","affiliation":[{"name":"Harvey Mudd College, Claremont, CA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,20]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"B. Allen and D. Gilbert. 2007. Bad Block HOWTO for Smartmontools. http:\/\/smartmontools.sourceforge.net\/badblockhowto.html."},{"key":"e_1_2_1_2_1","unstructured":"Apple Inc. 2012. Mac OS X Security Configuration for Mac OS X Version 10.6 Snow Leopard. http:\/\/images.apple.com\/support\/security\/guides\/docs\/SnowLeopard_Security_Config_v10.6.pdf."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251339"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267569.1267578"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523660"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703962"},{"key":"e_1_2_1_7_1","volume-title":"Coert Klaver, Ronald Van Der Knijff, and M. Roeloffs.","author":"Breeuwsma Marcel","year":"2009","unstructured":"Marcel Breeuwsma, Martien De Jongh, Coert Klaver, Ronald Van Der Knijff, and M. Roeloffs. 2009. Forensic Data Recovery from Flash Memory. CiteSeerX."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455821"},{"key":"e_1_2_1_9_1","unstructured":"J. Cooke. 2007. Flash memory technology direction. Micron Applications Engineering Document."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","unstructured":"G. D. Crescenzo N. Ferguson R. Impagliazzo and M. Jakobsson. 1999. How to forget a secret. In STACS 99. C. Meinel and S. Tison (Eds.). Springer Berlin Heidelberg 500--509.","DOI":"10.5555\/1764891.1764956"},{"key":"e_1_2_1_11_1","volume-title":"Darik's Boot And Nuke &verbar","author":"DBAN.","unstructured":"DBAN. 2012. Darik's Boot And Nuke &verbar; Hard Drive Disk Wipe and Data Clearing. http:\/\/www.dban.org\/."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421013"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456472"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.41"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 12th International Linux System Technology Conference.","author":"Engel J.","unstructured":"J. Engel and R. Mertens. 2005. LogFS-finally a scalable flash file system. In Proceedings of the 12th International Linux System Technology Conference."},{"key":"e_1_2_1_16_1","unstructured":"G. R. Ganger. 2001. Blurring the line between OSes and storage devices. Technical Report CMU-CS-01-166 Carnegie Mellon University."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176992"},{"key":"e_1_2_1_18_1","unstructured":"J. Garlick. 2012. Scrub Utility. Retrieved from http:\/\/code.google.com\/p\/diskscrub\/."},{"key":"e_1_2_1_19_1","unstructured":"M. Gauthier and D. Jagdmann. 2012. Secure rm. SourceForge. Retrieved from http:\/\/sourceforge.net\/projects\/srm\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855787"},{"key":"e_1_2_1_21_1","unstructured":"GNU Privacy Guard. 2014. The GNU Privacy Guard. Retrieved from https:\/\/www.gnupg.org\/."},{"key":"e_1_2_1_22_1","unstructured":"V. Gough. 2005. Encfs. EncFS: An Encrypted Filesystem. Retrieved from https:\/\/vgough.github.io\/encfs\/."},{"key":"e_1_2_1_23_1","volume-title":"CMRR Protocols for Disk Drive Secure Erase. Technical report","author":"Hughes G.","unstructured":"G. Hughes. 2004. CMRR Protocols for Disk Drive Secure Erase. Technical report, Center for Magnetic Recording Research, University of California, San Diego."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2002.1021942"},{"key":"e_1_2_1_25_1","unstructured":"IMATION. 2015. Ironkey. Retrieved from http:\/\/www.ironkey.com."},{"key":"e_1_2_1_26_1","unstructured":"INDILINX. 2013. The OpenSSD Project. The OpenSSD Project. http:\/\/www.openssd-project.org\/wiki\/The_OpenSSD_Project."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591305.2591312"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591305.2591311"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837915.1837922"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179559.1179571"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.1"},{"key":"e_1_2_1_32_1","volume-title":"Network Appliance","author":"Katcher J.","year":"1997","unstructured":"J. Katcher. 1997. Postmark: A New File System Benchmark. Technical Report TR3022, Network Appliance, 1997. Retrieved from www.netapp.com\/tech_library\/3022.html."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2180887.2180895"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.013"},{"key":"e_1_2_1_35_1","unstructured":"KINGSTON. 2012. Secure USB Flash Drives. http:\/\/www.kingston.com\/us\/usb\/encrypted_security."},{"key":"e_1_2_1_36_1","volume-title":"Vnodes: An architecture for multiple file system types in sun UNIX. USENIX Summer, 238--247.","author":"Kleiman S. R.","year":"1986","unstructured":"S. R. Kleiman. 1986. Vnodes: An architecture for multiple file system types in sun UNIX. USENIX Summer, 238--247."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364093"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.96"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208472"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591299"},{"key":"e_1_2_1_41_1","volume-title":"How Yaffs works &verbar","author":"Manning C.","unstructured":"C. Manning. 2012. How Yaffs works &verbar; Yaffs. Retrieved from http:\/\/www.yaffs.net\/documents\/how-yaffs-works."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"},{"key":"e_1_2_1_43_1","unstructured":"MICRON. 2011. Bad Block Management in NAND Flash Memory Introduction."},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","unstructured":"G. M\u00fcller T. Happ M. Kund G. Yong Lee N. Nagel and R. Sezi. 2004. Status and Outlook of Emerging Nonvolatile Memory Technologies. 567--570.","DOI":"10.1109\/IEDM.2004.1419223"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394441.1394442"},{"key":"e_1_2_1_46_1","unstructured":"OPENSSH. 2012. OpenSSH Homepage. OpenSSH Homepage. http:\/\/openssh.com\/."},{"key":"e_1_2_1_47_1","unstructured":"N. Patel. 2009. Intel pulls SSD Toolbox for killing drives under Windows 7 -- Engadget. http:\/\/www.engadget.com\/2009\/10\/27\/intel-pulls-ssd-toolbox-for-killing-drives-under-windows-7\/."},{"key":"e_1_2_1_48_1","volume-title":"The Ephemerizer: Making Data Disappear. Sun Microsystems","author":"Perlman R.","year":"2005","unstructured":"R. Perlman. 2005. The Ephemerizer: Making Data Disappear. Sun Microsystems, Inc., Mountain View, CA,."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063786.1063789"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251028.1251039"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267905"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.28"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362810"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"J. Reardon C. Marforio S. Capkun and D. Basin. 2011. Secure Deletion on Log-Structured File Systems. Technical Report arXiv:1106.0917.","DOI":"10.1145\/2414456.2414493"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516699"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","unstructured":"R. Rivest. 1997. All-or-nothing encryption and the package transform. Fast Software Encryption 210--218.","DOI":"10.5555\/647932.740733"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_2_1_58_1","unstructured":"P. Rusty Russell D. Quinlan and C. Yeoh. 1994. Filesystem hierarchy standard. Filesystem Hierarchy Standard. http:\/\/www.pathname.com\/fhs\/pub\/fhs-2.3.html."},{"key":"e_1_2_1_59_1","unstructured":"SANDISK. 2006. DiskOnChip 2000 DIP. http:\/\/jkmicro.com\/DOC_2000_DIP_DS_Rev3.9.pdf."},{"key":"e_1_2_1_60_1","volume-title":"Protect your Data with Seagate Secure Self-Encrypting Drives &verbar","author":"SEAGATE.","unstructured":"SEAGATE. 2012. Protect your Data with Seagate Secure Self-Encrypting Drives &verbar; Seagate. http:\/\/www.seagate.com\/tech-insights\/protect-data-with-seagate-secure-self-encrypting-drives-master-ti\/."},{"key":"e_1_2_1_61_1","unstructured":"SHRED. 2012. Shred Linux\/Unix man page. Retrieved from http:\/\/linux.about.com\/library\/cmd\/blcmdl1_shred.htm."},{"key":"e_1_2_1_62_1","unstructured":"F. Shu and N. Obr. 2007. Data Set Management Commands Proposal for ATA8-ACS2."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298458"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251028.1251029"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251280"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090694.1090702"},{"key":"e_1_2_1_67_1","unstructured":"SMART. 2014. SMART Monitoring Tools. Retrieved from http:\/\/sourceforge.net\/projects\/smartmontools\/."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.crhy.2005.10.007"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4470030"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.136"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 4th Annual Linux Expo.","author":"Tweedie S. C.","year":"1998","unstructured":"S. C. Tweedie. 1998. Journaling the linux ext2fs filesystem. In Proceedings of the 4th Annual Linux Expo."},{"key":"e_1_2_1_72_1","unstructured":"UBIFS. 2008. Unsorted Block Image File System. http:\/\/www.linux-mtd.infradead.org\/doc\/ubifs.html."},{"key":"e_1_2_1_73_1","volume-title":"Computer and Internet Use in the United States","author":"United States Census Bureau. 2014.","year":"2013","unstructured":"United States Census Bureau. 2014. Computer and Internet Use in the United States: 2013. Computer and Internet Use in the United States: 2013. Retrieved from http:\/\/www.census.gov\/content\/dam\/Census\/library\/publications\/2014\/acs\/acs-28.pdf."},{"key":"e_1_2_1_74_1","unstructured":"U.S. Department of Defense. 1995. National Industrial Security Program Operating Manual 5220.22-M. http:\/\/www.usaid.gov\/policy\/ads\/500\/d522022m.pdf."},{"key":"e_1_2_1_75_1","volume-title":"Health Insurance Portability and Accountability Act of","author":"U.S. Department of Health & Human Services. 1996.","year":"1996","unstructured":"U.S. Department of Health & Human Services. 1996. Health Insurance Portability and Accountability Act of 1996. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/statute\/hipaastatutepdf.pdf."},{"key":"e_1_2_1_76_1","unstructured":"U.S. Department of Health & Human Services. 2009. HITECH Act Enforcement Interim Final Rule. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/enforcementrule\/hitechenforcementifr.html."},{"key":"e_1_2_1_77_1","unstructured":"U.S. Government. 1999. Gramm-Leach-Bliley Act. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-106publ102\/html\/PLAW-106publ102.htm."},{"key":"e_1_2_1_78_1","volume-title":"Sarbanes-Oxley Act of","author":"Government U.S.","year":"2002","unstructured":"U.S. Government. 2002. Sarbanes-Oxley Act of 2002. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-107publ204\/html\/PLAW-107publ204.htm."},{"key":"e_1_2_1_79_1","volume-title":"Fair and Accurate Credit Transactions Act of","author":"Government U.S.","year":"2003","unstructured":"U.S. Government. 2003. Fair and Accurate Credit Transactions Act of 2003. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-108publ159\/html\/PLAW-108publ159.htm."},{"key":"e_1_2_1_80_1","unstructured":"U.S. NIST. 2006. Special Publication 800-88: Guidelines for Media Sanitization. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-88\/NISTSP800-88_with-errata.pdf."},{"key":"e_1_2_1_81_1","unstructured":"A. Venkatesh D. Dunkle and A. Wortman. 2011. Evolving Patterns of Household Computer Use: 1999--2010. University of California Irvine Center for Research on Information Technology and Organizations."},{"key":"e_1_2_1_82_1","unstructured":"T. Vier. 2012. Wipe: Secure File Deletion. http:\/\/wipe.sourceforge.net\/."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/1960475.1960483"},{"key":"e_1_2_1_84_1","volume-title":"et al","author":"Wolchok S.","year":"2010","unstructured":"S. Wolchok, O. S. Hofmann, and N. Heninger, et al. 2010. Defeating vanish with low-cost sybil attacks against large DHTs. NDSS."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2070050"},{"key":"e_1_2_1_86_1","volume-title":"Ottawa Linux Symposium.","author":"Woodhouse D.","year":"2001","unstructured":"D. Woodhouse. 2001. JFFS: The journalling flash file system. Ottawa Linux Symposium."},{"key":"e_1_2_1_87_1","unstructured":"D. Woodhouse. 2008. Jffs2: The journalling flash file system version 2. http:\/\/sourceware.org\/jffs2\/."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_21"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208471"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195506"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208462"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591298"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2854882","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2854882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:40:11Z","timestamp":1763458811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854882"}},"subtitle":["Leveraging an Auxiliary Data Path for Per-File Secure Deletion"],"short-title":[],"issued":{"date-parts":[[2016,5,20]]},"references-count":92,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8,29]]}},"alternative-id":["10.1145\/2854882"],"URL":"https:\/\/doi.org\/10.1145\/2854882","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,20]]},"assertion":[{"value":"2014-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-10-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-05-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}