From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey
NFPS (Jia et al. 2016) | TedFlash (Chen et al. 2016) | HiFlash (Chen and Sion 2015) | Ficklebase (Bajaj and Sion 2013a) | ||
---|---|---|---|---|---|
Method to sanitize data | Overwriting | Encryption | Overwriting | Overwriting | Encryption |
Method to sanitize past impacts | Partial scrubbing | Random placement technique | History independent hash table | One-one mapping | Versioning, query rewriting |
Layer | Controller (FTL) | Controller (FTL) | File system | Controller (FTL) | Application |