Skip to main content

Table 3 Comparison of features offered by different secure deletion approaches for HDDs-based storage systems

From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey

Scheme Method Layer Deletion granularity
Degaussers (Kissel et al. 2006) Degaussing Physical medium The entire
    storage medium
Secure erase commands (2016, 2017) Overwriting-based Controller The entire
    storage medium
Reardon et al. (Reardon et al. 2013) Encryption-based Block device Single file
Bauer et al. (Bauer and Priyantha 2001) Overwriting-based File system (EXT2) Single file
Purgefs (Joukov and Zadok 2005) Overwriting-based File system (EXT2) Single file
Joukov et al. (Joukov et al. 2006) Overwriting-based File system (EXT3) Single file
Peterson et al. (Peterson et al. 2005) Encryption-based File system Single file
File overwriting tools (Jagdmann 2015; Durak 2006) Overwriting-based Application Single file
Gracewipe (Zhao and Mannan 2015) Encryption-based Application The entire
    storage medium
Stahlberg et al. (Stahlberg et al. 2007) Based on overwriting Application (for database) Single entry/record
and SQLite (SQLite: Pragma statements 2017) and encryption