Skip to main content

Table 5 Comparison of features offered by secure deletion approaches designed to handle impacts created by past existence of the deleted data

From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey

  NFPS (Jia et al. 2016) TedFlash (Chen et al. 2016) HIFS (Bajaj and Sion 2013b; Bajaj et al. 2016) HiFlash (Chen and Sion 2015) Ficklebase (Bajaj and Sion 2013a)
Method to sanitize data Overwriting Encryption Overwriting Overwriting Encryption
Method to sanitize past impacts Partial scrubbing Random placement technique History independent hash table One-one mapping Versioning, query rewriting
Layer Controller (FTL) Controller (FTL) File system Controller (FTL) Application