Sok: Secure Data Deletion

Sok: Secure Data Deletion

SoK: Secure Data Deletion Joel Reardon, David Basin, Srdjan Capkun ETH Zurich 2013-05-21 1 Secure deletion: the task of deleting data from a physical medium so that the data is irrecoverable. 2 Why is this needed? Secure deletion protects the security and privacy of sensitive data Secure deletion is lacking in most deployed systems e.g., file systems are not designed to offer secure deletion Old solutions to this problem make many assumptions invalid for modern systems e.g., simply overwriting a file with zeros fails for many systems Secure deletion is seeing active research 7 of the 20 papers we survey in detail were published since 2010 3 Contributions of our systematization Define adversaries by their capabilities Define a strength partial ordering among adversaries Determine solution properties and environmental assumptions Developed by analyzing the existing literature Define a substitutability partial ordering among solutions Organize solutions by the interface to which they access the storage medium Extensively survey the literature determine each solution's properties and its defeated adversary Experiment with numerous user-level secure deletion tools Show which file systems and use cases effect secure deletion. 4 Outline of this talk Define adversaries by their capabilities Define a strength partial ordering among adversaries Determine solution properties and environmental assumptions Developed by analyzing the existing literature Define a substitutability partial ordering among solutions Organize solutions by the interface to which they access the storage medium Extensively survey the literature determine each solution's properties and its defeated adversary Experiment with numerous user-level secure deletion tools Show which file systems and use cases effect secure deletion. 5 Terminology Data Objects: Addressable units of data e.g., blocks, DB records, SMS messages, files Physical Medium: Any device capable of storing and retrieving data objects e.g., magnetic hard drive, flash memory, piece of paper Interface: How the user interacts with the physical medium; it transforms data objects into a form suitable for the physical medium e.g., a file system 6 A data object is securely deleted from a physical medium if an adversary that is given some manner of access to the medium is unable to recover the deleted data object. 7 Classes of Adversarial Capabilities We divide capabilities into discrete classes Each class is fully ordered by adversarial strength An adversary is defined as a set of capabilities one capability per class 8 Classes of Adversarial Capabilities attack surface software attacks hardware attacks 9 Classes of Adversarial Capabilities attack surface software attacks hardware attacks access time user−controlled attacker−controlled 10 Classes of Adversarial Capabilities attack surface software attacks hardware attacks access time user−controlled attacker−controlled credential revelation non−coercive coercive 11 Classes of Adversarial Capabilities attack surface software attacks hardware attacks access time user−controlled attacker−controlled credential revelation non−coercive coercive computational bound computationally bounded information theoretic 12 Example: Subpoena Adversary attack surface software attacks hardware attacks access time user−controlled attacker−controlled credential revelation non−coercive coercive computational bound computationally bounded information theoretic 13 Example: Border Crossing attack surface software attacks hardware attacks access time user−controlled attacker−controlled credential revelation non−coercive coercive computational bound computationally bounded information theoretic 14 As adversaries differ in their strength, secure deletion solutions may differ by which adversaries they defeat. Solutions may also differ in other ways. 15 Some Properties of Secure Deletion Solutions integration: How does it integrate into a system? What assumptions does it make on the behaviour of the interface? granularity: Does it delete data at the smallest granularity possible, or only entire files, or only entire storage media? scope: Does it securely delete all discarded data, or just specially marked sensitive data? lifetime: Does it cause wear on the storage medium? does it destroy it? 16 We'll now take a closer look at the integration property. 17 Interface and Layers user space e.g., POSIX file system file system e.g., block device device driver e.g., ATA controller tactile physical medium 18 Interface and Layers user space file system device driver controller physical access physical e.g., degaussing, medium destruction, etc. 19 Interface and Layers user space file system device driver secure erase command, controller factory reset, etc. physical access physical e.g., degaussing, medium destruction, etc. 20 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL file system device driver secure erase command, controller factory reset, etc. physical access physical e.g., degaussing, medium destruction, etc. 21 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL file system device driver secure erase command, controller factory reset, etc. physical access physical e.g., degaussing, increased interface; fewer assumptions medium destruction, etc. 22 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL file system device driver secure erase command, controller factory reset, etc. physical access physical e.g., degaussing, better knowledge of what to delete increased interface; fewer assumptions medium destruction, etc. 23 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL overwrite freed blocks file system specialized approaches various FSes device driver secure erase command, controller factory reset, etc. physical access physical e.g., degaussing, better knowledge of what to delete increased interface; fewer assumptions medium destruction, etc. 24 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL overwrite freed blocks file system specialized approaches various FSes device driver secure erase command, TRIM, TrueErase controller factory reset, etc. physical access physical e.g., degaussing, better knowledge of what to delete increased interface; fewer assumptions medium destruction, etc. 25 Interface and Layers overwrite with zeros user space files: srm, shred, wipe database: MySQL overwrite freed blocks hole punch file system specialized approaches various FSes device driver secure erase command, TRIM, TrueErase controller factory reset, etc. physical access physical e.g., degaussing, better knowledge of what to delete increased interface; fewer assumptions medium destruction, etc. 26 Solution Space Solution Name Target Adversary Integration Granularity Scope Lifetime overwrite unbounded coercive user-level (in) per-file targeted unchanged fill unbounded coercive user-level per-block untargeted unchanged NIST clear internal repurposing varies per-medium untargeted varies NIST purge external repurposing varies per-medium untargeted varies NIST destroy advanced forensic physical per-medium untargeted destoyed ATA secure erase external repurposing controller per-medium untargeted unchanged flash SAFE external repurposing controller per-medium untargeted some wear renaming unbounded coercive kernel (in) per-block targeted unchanged ext2 sec del unbounded coercive kernel (in) per-block targeted unchanged ext3 basic unbounded coercive kernel (in) per-block targeted unchanged ext3 comprehensive unbounded coercive kernel (in) per-block targeted unchanged purgefs unbounded coercive kernel (in) per-block targeted unchanged ext3cow sec del bounded coersive kernel (in) per-block untargeted unchanged compaction unbounded coercive kernel per-block untargeted some wear batched compaction unbounded coercive kernel per-block untargeted some wear per-file encryption bounded coersive kernel per-file targeted some wear DNEFS bounded peek-a-boo kernel per-block untargeted some wear scrubbing unbounded coercive kernel (in) per-block untargeted unchanged ShredDroid unbounded coercive user-level per-block untargeted some wear 27 1 Conclusions and Future Work Secure deletion solutions may differ in many ways e.g., adversaries, behaviour properties, interface assumptions by systematizing these spaces, we can better evaluate when one solution properly achieves secure deletion in a concrete setting, and better compare among other suitable solutions Ideal solutions would have minimal assumptions along with a small granularity techniques to move information on deleted data from the user's intentions to the lowest layers are therefore useful Other storage media types and interfaces exist cloud storage, mixed-media data centers, etc. 28 Now, we'll look at two general user-level solutions: overwriting and filling. 29 User-Level Solutions overwriting a targeted-scope per-file-granularity solution opens specific files and overwrites them with zeros assumes that in-place updates occur e.g., srm, shred, wipe filling an untargeted-scope per-block-granularity solution opens a new file and writes into until the file system is full assumes that when the file system is full, no deleted data remains e.g., scrub, Mac Disk Utility 30 User-Level Secure Deletion File Data File Metadata File Updates Filling Updates Filling System In-place Works In-place Works btrfs no yes no no exfat yes no no no ext2 yes yes no no ext3/ext4 no yes no no f2fs no yes no yes hfs yes yes no no hfsplus no yes no no jffs2 no no no yes reiserfs yes yes no no ubifs no yes no yes vfat yes no no no yaffs no yes no yes 31 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    31 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us