{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:06:15Z","timestamp":1775693175029,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375737","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"283-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["IoT Expunge"],"prefix":"10.1145","author":[{"given":"Nisha","family":"Panwar","sequence":"first","affiliation":[{"name":"Augusta University &amp; University of California, Irvine, Augusta, GA, USA"}]},{"given":"Shantanu","family":"Sharma","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Peeyush","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Dhrubajyoti","family":"Ghosh","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Nalini","family":"Venkatasubramanian","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"General Data Protection Regulation (GDPR) available at: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"e_1_3_2_1_2_1","unstructured":"California Online Privacy Protection Act (CalOPPA) available at: https:\/\/www.privacypolicies.com\/blog\/caloppa\/#What_Is_Caloppa."},{"key":"e_1_3_2_1_3_1","unstructured":"California Consumer Privacy Act (CCPA) available at: https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375."},{"key":"e_1_3_2_1_4_1","unstructured":"Technical report. Available at: http:\/\/isg.ics.uci.edu\/publications.html."},{"key":"e_1_3_2_1_5_1","volume-title":"revision 1: Guidelines for media sanitization","year":"2015","unstructured":"Nist special publication 800--88, revision 1: Guidelines for media sanitization. 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176337"},{"issue":"3","key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2478\/popets-2019-0040","article-title":"Keeping the smart home private with smart(er) IoT traffic shaping","volume":"2019","author":"Apthorpe N.","year":"2019","unstructured":"N. Apthorpe et al. Keeping the smart home private with smart(er) IoT traffic shaping. PoPETs, 2019(3):128--148, 2019.","journal-title":"PoPETs"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"e_1_3_2_1_11_1","first-page":"274","volume-title":"EUROCRYPT","author":"Benaloh J.","year":"1994","unstructured":"J. Benaloh et al. One-way accumulators: A decentralized alternative to digital signatures. In EUROCRYPT, pages 274--285, 1994."},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"EDBT","author":"Bertino E.","year":"2016","unstructured":"E. Bertino. Data security and privacy in the IoT. In EDBT, pages 1--3, 2016."},{"key":"e_1_3_2_1_13_1","first-page":"315","volume-title":"USENIX","author":"Biryukov A.","year":"2016","unstructured":"A. Biryukov et al. Egalitarian computing. In USENIX, pages 315--326, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Intel SGX explained. IACR Cryptology ePrint Archive","author":"Costan V.","year":"2016","unstructured":"V. Costan et al. Intel SGX explained. IACR Cryptology ePrint Archive, 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824797"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2436387"},{"key":"e_1_3_2_1_18_1","first-page":"139","volume-title":"CRYPTO","author":"Dwork C.","year":"1992","unstructured":"C. Dwork et al. Pricing via processing or combatting junk mail. In CRYPTO, pages 139--147, 1992."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_21_1","first-page":"77","volume-title":"USENIX","volume":"14","author":"Gutmann P.","year":"1996","unstructured":"P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In USENIX, volume 14, pages 77--89, 1996."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423684"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10879-7_30"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176315"},{"key":"e_1_3_2_1_25_1","volume-title":"Dynamic certification of cloud services: Trust, but verify! IEEE Security & Privacy, 14(2):66--71","author":"Lins S.","year":"2016","unstructured":"S. Lins et al. Dynamic certification of cloud services: Trust, but verify! IEEE Security & Privacy, 14(2):66--71, 2016."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2306938"},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"PerCom Workshops","author":"Mehrotra S.","year":"2016","unstructured":"S. Mehrotra et al. TIPPERS: A privacy cognizant IoT environment. In PerCom Workshops, pages 1--6, 2016. http:\/\/tippersweb.ics.uci.edu\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_35"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888931"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.5"},{"key":"e_1_3_2_1_31_1","volume-title":"FAST","author":"Z. N.","year":"2005","unstructured":"Z. N. J. Peterson et al. Secure deletion for a versioning file system. In FAST, 2005."},{"key":"e_1_3_2_1_32_1","first-page":"271","volume-title":"CCS","author":"Reardon J.","year":"2013","unstructured":"J. Reardon et al. Secure data deletion from persistent media. In CCS, pages 271--284, 2013."},{"key":"e_1_3_2_1_33_1","first-page":"301","volume-title":"IEEE SP","author":"Reardon J.","year":"2013","unstructured":"J. Reardon et al. SoK: Secure data deletion. In IEEE SP, pages 301--315, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"e_1_3_2_1_35_1","first-page":"340","volume-title":"Asia CCS","author":"I.","year":"2019","unstructured":"I. Sanchez-Rola et al. Can i opt out yet?: Gdpr and the global illusion of cookie control. In Asia CCS, pages 340--351, 2019."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809723"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.63"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.011"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382227"},{"key":"e_1_3_2_1_42_1","first-page":"2421","volume-title":"CCS","author":"Wang W.","year":"2017","unstructured":"W. Wang et al. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. In CCS, pages 2421--2434, 2017."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081342"},{"issue":"185","key":"e_1_3_2_1_44_1","first-page":"193","article-title":"Blockchain-based publicly verifiable data deletion scheme for cloud storage","volume":"103","author":"Yang C.","year":"2018","unstructured":"C. Yang et al. Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. of Network and Computer Applications, 103:185 -- 193, 2018.","journal-title":"J. of Network and Computer Applications"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857714"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375737"}},"subtitle":["Implementing Verifiable Retention of IoT Data"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":45,"alternative-id":["10.1145\/3374664.3375737","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375737","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}