Removal of data remanence in deduplicated storage clouds
First Claim
1. A computer program product comprising a computer usable tangible storage medium having readable program code embodied in the tangible storage medium, wherein the tangible storage medium comprises a device and the computer program product includes at least one component operable to:
- receive a first request to securely delete a deduplicated file, wherein the first request is received from a first user, and the first user and a second user are linked to the deduplicated file by data in a deduplication database;
based on the first request, securely delete data from the deduplication database linking the first user to the deduplicated file, without deleting the deduplicated file;
receive a second request to securely delete the deduplicated file, wherein the second request is received from the second user; and
securely delete the deduplicated file based on the second request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method implemented in a computer infrastructure including a combination of hardware and software includes receiving from a local computing device a request to securely delete a file. The method also includes determining the file is deduplicated. The method further includes determining one of: the file is referred to by at least one other file, and the file is not referred to by another file. The method additionally includes securely deleting links associating the file with the local computing device without deleting the file when the file is referred to by at least one other file. The method also includes securely deleting the file when the file is not referred to by another file.
29 Citations
3 Claims
-
1. A computer program product comprising a computer usable tangible storage medium having readable program code embodied in the tangible storage medium, wherein the tangible storage medium comprises a device and the computer program product includes at least one component operable to:
-
receive a first request to securely delete a deduplicated file, wherein the first request is received from a first user, and the first user and a second user are linked to the deduplicated file by data in a deduplication database; based on the first request, securely delete data from the deduplication database linking the first user to the deduplicated file, without deleting the deduplicated file; receive a second request to securely delete the deduplicated file, wherein the second request is received from the second user; and securely delete the deduplicated file based on the second request. - View Dependent Claims (2, 3)
-
Specification