Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey

Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Qionglu, JIA, Shijie, CHANG, Bing, CHEN, Bo
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/10107
https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-11107
record_format dspace
spelling sg-smu-ink.sis_research-111072025-02-19T03:16:26Z Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey ZHANG, Qionglu JIA, Shijie CHANG, Bing CHEN, Bo Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved in the personal computing devices (i.e., confidentiality during their lifetime); and also, they should be rendered irrecoverable after they are removed from the devices (i.e., confidentiality after their lifetime). Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime, respectively. This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices, including both encryption and secure deletion. Especially for encryption, we mainly focus on the novel plausibly deniable encryption (PDE), which can ensure data confidentiality against both a coercive (i.e., the attacker can coerce the data owner for the decryption key) and a non-coercive attacker. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/10107 info:doi/10.1186/s42400-018-0005-8 https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Data confidentiality Plausibly deniable encryption Secure deletion Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Data confidentiality
Plausibly deniable encryption
Secure deletion
Information Security
spellingShingle Data confidentiality
Plausibly deniable encryption
Secure deletion
Information Security
ZHANG, Qionglu
JIA, Shijie
CHANG, Bing
CHEN, Bo
Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
description Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved in the personal computing devices (i.e., confidentiality during their lifetime); and also, they should be rendered irrecoverable after they are removed from the devices (i.e., confidentiality after their lifetime). Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime, respectively. This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices, including both encryption and secure deletion. Especially for encryption, we mainly focus on the novel plausibly deniable encryption (PDE), which can ensure data confidentiality against both a coercive (i.e., the attacker can coerce the data owner for the decryption key) and a non-coercive attacker.
format text
author ZHANG, Qionglu
JIA, Shijie
CHANG, Bing
CHEN, Bo
author_facet ZHANG, Qionglu
JIA, Shijie
CHANG, Bing
CHEN, Bo
author_sort ZHANG, Qionglu
title Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
title_short Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
title_full Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
title_fullStr Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
title_full_unstemmed Ensuring data confidentiality via plausibly deniable encryption and secure deletion: A survey
title_sort ensuring data confidentiality via plausibly deniable encryption and secure deletion: a survey
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/10107
https://ink.library.smu.edu.sg/context/sis_research/article/11107/viewcontent/s42400_018_0005_8_pvoa_cc_by.pdf
_version_ 1827070768617357312