Deleting Secret Data with Public Verifiability

  title={Deleting Secret Data with Public Verifiability},
  author={Vivek Pradeep and S. sriganeshkumar and C. Santhosh and S. navin arulappan and R. Venkatesh},
Existing software-based data erasure programs can be summarized as following the same one-bit-return protocol: the deletion program performs data erasure and returns either success or failure. However, such a one-bit-return protocol turns the data deletion system into a black box – the user has to trust the outcome but cannot easily verify it. However, the return of the“Success” bit can be misleading. Although the link of the file has been removed, the content of the file remains on the disk… CONTINUE READING

From This Paper

Topics from this paper.
8 Citations
17 References
Similar Papers

Similar Papers

Loading similar papers…