© 2016

Secure Data Deletion


Part of the Information Security and Cryptography book series (ISC)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Introduction and Background

    1. Front Matter
      Pages 1-1
    2. Joel Reardon
      Pages 3-9
    3. Joel Reardon
      Pages 11-31
    4. Joel Reardon
      Pages 33-43
  3. Secure Deletion for Mobile Storage

    1. Front Matter
      Pages 45-45
    2. Joel Reardon
      Pages 73-85
    3. Joel Reardon
      Pages 87-102
  4. Secure Deletion for Remote Storage

    1. Front Matter
      Pages 103-103
    2. Joel Reardon
      Pages 105-113
    3. Joel Reardon
      Pages 115-128
    4. Joel Reardon
      Pages 129-142
  5. Conclusions

    1. Front Matter
      Pages 175-175
    2. Joel Reardon
      Pages 177-186
  6. Back Matter
    Pages 187-203

About this book


This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related work, organizes existing solutions in terms of their interfaces, presents a taxonomy of adversaries differing in their capabilities, and then builds a system and adversarial model based on the survey of related work.

The book is useful for both academics, researchers and graduate students, and for practitioners who may integrate its results into deployed systems.


Secure deletion Cloud security Mobile security Information security Digital forensics Unsorted Block Image File System (UBIFS)

Authors and affiliations

  1. 1.Dept. of Computer ScienceETH ZürichZürichSwitzerland

About the authors

Joel Reardon received his Ph.D. from the System Security Group of the Institute of Information Security of ETH Zürich. He is currently a postdoc in the International Computer Science Institute (ICSI) and University of California, Berkeley.

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking


“In this book, the author discusses all of this, as well as some of the ways to ensure secure deletion … . The material is generally well presented and interesting … . This book could well be used as supplemental material for an undergraduate course in computer security or in operating systems, as the author mentions implementations in Linux for several ideas presented.” (Computing Reviews, May, 2017)