Skip to main content

Table 4 Comparison of features offered by secure deletion approaches for flash-based storage systems

From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey

Scheme Method Layer Deletion granularity
Scrubbing (Wei et al. 2011) and SmSD (Qin et al. 2013) Overwriting-based Controller (FTL) A physical page
Sun et al. (Sun et al. 2008) Overwriting-based File system (YAFFS) Single file
Zero overwriting (Reardon et al. 2012) Overwriting-based File system (YAFFS) Single file
Trim (Intel Corporation: Intel Solid-State Drive Optimizer 2009) and    
TrueErase (Diesburg et al. 2012) Overwriting-based File system Single file
   to device driver  
Purging and ballooning (Reardon et al. 2012) Overwriting-based Application All the invalid data
Braga et al. (Braga and Colito 2014) for Overwriting-based Application All the invalid data
unencrypted files    
SAFE (Swanson and Wei 2010) Based on overwriting Controller The entire
  and encryption   storage medium
Lee et al. (2008, 2010) Encryption-based File system (YAFFS) Single file
Lee et al. (2011) Encryption-based File system (YAFFS) Single file
DNEFS (Reardon et al. 2012) Encryption-based File system (UBIFS) Single file
DEFY (Peters et al. 2015) Encryption-based File system (YAFFS) Single file
Braga and Colito (2014) for Encryption-based File system (EncFS) Single file
encrypted files