🌱 Inspiration

The rapid rise of electronic waste (e-waste) has created an invisible but serious problem. Many discarded laptops, hard drives, and mobile devices still contain recoverable sensitive data, even after users believe it has been deleted. This leads to data breaches, privacy violations, and loss of trust in IT recycling and resale.

We were inspired by the realization that data deletion without proof is not real security. Our goal was to design a system that not only erases data securely, but also provides verifiable evidence that the data is permanently gone before a device is recycled or reused.


🛠️ How We Built the Project

We built Secure Data Wiping for Trustworthy IT Asset Recycling as a cross-platform solution with security, usability, and trust at its core.

  • Frontend:
    Developed using Flutter along with a CLI tool to provide a simple, one-click experience across operating systems.

  • Backend:
    Implemented using Node.js (Express) to handle device detection, wiping workflows, and certificate generation.

  • Secure Erasure Standards:
    Integrated industry-recognized data wiping algorithms:

    • DoD 5220.22-M
    • NIST SP 800-88
    • Gutmann Method
  • Verification & Audit:
    Each wiping operation generates a SHA-256 cryptographic hash, which is stored in blockchain-based immutable logs to ensure tamper-proof verification.

The integrity of a wipe record is verified using: [ H = \text{SHA256}(\text{DeviceID} + \text{Timestamp} + \text{WipeMethod}) ]

  • Storage:
    PostgreSQL is used to store wiping certificates, audit logs, and compliance records.

The system automatically selects the optimal wiping method based on the device type (HDD, SSD, or mobile), reducing human error.


⚠️ Challenges We Faced

  • Supporting different storage technologies while ensuring the correct wiping standard is applied
  • Preventing interruption during the wiping process, which could compromise data security
  • Designing a tamper-proof verification system that remains easy to understand for non-technical users
  • Balancing strong cryptographic security with a smooth and intuitive user experience
  • Ensuring blockchain integration added real transparency and trust, not unnecessary complexity

📚 What We Learned

  • Secure data destruction is as much about trust and verification as it is about deletion
  • Industry standards like NIST SP 800-88 are essential for real-world compliance
  • Cryptographic hashing and blockchain provide strong guarantees of integrity and accountability
  • A security tool must remain simple and user-friendly to achieve widespread adoption
  • Environmental sustainability and cybersecurity can work together to solve real-world problems

🚀 Conclusion

This project showed us that secure data wiping is a critical step in responsible IT asset recycling. By combining industry-standard erasure techniques, cryptographic verification, and transparent audit logs, we created a solution that protects user data while supporting a more sustainable digital future.

ppt link

Contact

Built With

Share this project:

Updates