Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/10107 https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-11107 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-111072025-02-19T03:16:26Z Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey ZHANG, Qionglu JIA, Shijie CHANG, Bing CHEN, Bo Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved in the personal computing devices (i.e., confidentiality during their lifetime); and also, they should be rendered irrecoverable after they are removed from the devices (i.e., confidentiality after their lifetime). Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime, respectively. This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices, including both encryption and secure deletion. Especially for encryption, we mainly focus on the novel plausibly deniable encryption (PDE), which can ensure data confidentiality against both a coercive (i.e., the attacker can coerce the data owner for the decryption key) and a non-coercive attacker. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/10107 info:doi/10.1186/s42400-018-0005-8 https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data confidentiality Plausibly deniable encryption Secure deletion Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Data confidentiality Plausibly deniable encryption Secure deletion Information Security |
spellingShingle |
Data confidentiality Plausibly deniable encryption Secure deletion Information Security ZHANG, Qionglu JIA, Shijie CHANG, Bing CHEN, Bo Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
description |
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved in the personal computing devices (i.e., confidentiality during their lifetime); and also, they should be rendered irrecoverable after they are removed from the devices (i.e., confidentiality after their lifetime). Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime, respectively. This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices, including both encryption and secure deletion. Especially for encryption, we mainly focus on the novel plausibly deniable encryption (PDE), which can ensure data confidentiality against both a coercive (i.e., the attacker can coerce the data owner for the decryption key) and a non-coercive attacker. |
format |
text |
author |
ZHANG, Qionglu JIA, Shijie CHANG, Bing CHEN, Bo |
author_facet |
ZHANG, Qionglu JIA, Shijie CHANG, Bing CHEN, Bo |
author_sort |
ZHANG, Qionglu |
title |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
title_short |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
title_full |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
title_fullStr |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
title_full_unstemmed |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey |
title_sort |
ensuring data confidentiality via plausibly deniable encryption and secure deletion: a survey |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/10107 https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf |
_version_ |
1827070768617357312 |