SECURE DATA WIPING FOR IT ASSET RECYCLING

Authors

  • P. KRISHNAVENI Assistant Professor, M P Nachimuthu M Jaganthan Engineering College
    Author
  • ARUN KUMAR .A Final Year B.Tech (IT), , M P Nachimuthu M Jaganthan Engineering College
    Author
  • A.BOOPATHY Final Year B.Tech (IT), , M P Nachimuthu M Jaganthan Engineering College
    Author
  • THIRUMALAI RAJ S Final Year B.Tech (IT), , M P Nachimuthu M Jaganthan Engineering College
    Author

DOI:

https://doi.org/10.71366/ijwos03032651788

Keywords:

Data wiping, IT asset recycling, cybersecurity, microservices architecture, secure data destruction, device management

Abstract

The rapid growth of information technology has increased the number of obsolete IT assets such as laptops, servers, solid-state drives (SSDs), and hard disks. When organizations recycle or dispose of these devices, sensitive data may remain stored in the storage media, leading to potential data breaches and privacy violations. Improper data destruction and the absence of verifiable wiping mechanisms pose serious security risks for enterprises. This research proposes a secure platform named Secure Asset Wiper, which provides reliable data wiping, device tracking, and audit verification for IT asset recycling processes. The proposed system integrates microservices, Next.js, and MySQL database to create a scalable web-based platform. A Java-based Local Agent enables communication between hardware storage devices and the web system, allowing disk scanning and secure wiping operations. The platform supports multiple data wiping standards including NIST 800-88 and DoD 5220.22-M, ensuring compliance with international data destruction guidelines. Real-time monitoring of wipe progress is implemented using WebSocket communication, allowing administrators to track wiping operations instantly. The system also includes multi-tenant architecture, role-based authentication, and audit logging to ensure enterprise-grade security. Experimental evaluation demonstrates that the platform successfully provides reliable data destruction, device monitoring, and verifiable wipe logs, making it suitable for enterprise-scale IT asset recycling management

Downloads

Published

2026-03-19

How to Cite

[1]
P. KRISHNAVENI , “SECURE DATA WIPING FOR IT ASSET RECYCLING”, Int. J. Web Multidiscip. Stud. pp. 410-414, 2026-03-19 doi: https://doi.org/10.71366/ijwos03032651788 .