Abstract
Sanitization is an effective approach for ensuring data security through scrubbing invalid but sensitive data pages, with the cost of impacts on storage performance due to moving out valid pages from the sanitization-required wordline, which is a logical read/write unit and consists of multiple pages in high-density SSDs. To minimize the impacts on I/O latency and data security, this article proposes a polling-based scheduling approach for data sanitization in high-density SSDs. Our method polls a specific SSD channel for completing data sanitization at the block granularity, meanwhile other channels can still service I/O requests. Furthermore, our method assigns a low priority to the blocks that are more likely to have future adjacent page invalidations inside sanitization-required wordlines, while selecting the sanitization block, to minimize the negative impacts of moving valid pages. Through a series of emulation experiments on several disk traces of real-world applications, we show that our proposal can decrease the negative effects of data sanitization in terms of the risk-performance index, which is a united time metric of I/O responsiveness and the unsafe time interval, by
- [1] Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, and Prashant Shenoy. 2006. Capsule: An energy-optimized object storage system for memory-constrained sensor devices. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SENSYS’06). 195–208.Google ScholarDigital Library
- [2] Song Lin, Demetrios Zeinalipour-Yazti, Vana Kalogerak, Dimitrios Gunopulos, and Walid A. Najjar. 2006. Efficient indexing data structures for flash-based sensor devices. ACM Transactions on Storage (TOS) 2, 4 (2006), 468–503.Google ScholarDigital Library
- [3] Wonkyung Kang, Dongkun Shin, and Sungjoo Yoo. 2017. Reinforcement learning-assisted garbage collection to mitigate long-tail latency in SSD. ACM Transactions on Embedded Computing Systems (TECS) 16, 5s (2017), 1–20.Google ScholarDigital Library
- [4] Mincheol Kang, Wonyoung, Lee, Jinkwon Kim, and Soontae Kim. 2022. PR-SSD: Maximizing partial read potential by exploiting compression and channel-level parallelism. IEEE Transactions on Computers (TC) 72, 3 (2022).Google Scholar
- [5] Jeong-Uk Kang, Heeseung Jo, Jin-Soo Kim, and Joonwon Lee. 2006. A superblock-based flash translation layer for NAND flash memory. In Proceedings of ACM International Conference on Embedded Software (EMSOFT’06).Google ScholarDigital Library
- [6] Wenhui Zhang, Qiang Cao, Hong Jiang, and Jie Yao. 2018. PA-SSD: A page-type aware TLC SSD for improved write/read performance and storage efficiency. In Proceedings of the 2018 International Conference on Supercomputing (ICS’18), 22–32.Google ScholarDigital Library
- [7] Tsutomu Higuchi, Takuyo Kodama, Koji Kato, Ryo Fukuda, Naoya Tokiwa, Mitsuhiro Abe, Teruo Takagiwa, Yuki Shimizu, Junji Musha, Katsuaki Sakurai, Jumpei Sato, Tetsuaki Utsumi, Kazuhide Yoneya, Yasuhiro Suematsu, Toshifumi Hashimoto, Takeshi Hioka, Kosuke Yanagidaira, Masatsugu Kojima, Junya Matsuno, Kei Shiraishi, Kensuke Yamamoto, Shintaro Hayashi, Tomoharu Hashiguchi, Kazuko Inuzuka, Akio Sugahara, Mitsuaki Honma, Keiji Tsunoda, Kazumasa Yamamoto, Takahiro Sugimoto, Tomofumi Fujimura, Mizuki Kaneko, Hiroki Date, Osamu Kobayashi, Takatoshi Minamoto, Ryoichi Tachibana, Itaru Yamaguchi, Juan Lee, Venky Ramachandra, Srinivas Rajendra, Tianyu Tang, Siddhesh Darne, Jiwang Lee, Jason Li, Toru Miwa, Ryuji Yamashita, Hiroshi Sugawara, Naoki Ookuma, Masahiro Kano, Hiroyuki Mizukoshi, Yuki Kuniyoshi, Mitsuyuki Watanabe, Kei Akiyama, Hirotoshi Mori, Akira Arimizu, Yoshito Katano, Masakazu Ehama, Hiroshi Maejima, Koji Hosono, and Masahiro Yoshihara. 2021. 30.4 a 1Tb 3b/cell 3D-flash memory in a 170+ word-line-layer technology. In 2021 IEEE International Solid-State Circuits Conference (ISSCC’21), 64 (2021), 428–430.Google ScholarCross Ref
- [8] Michael Wei, Grupp Laura, Spada Frederick E, and Swanson Steven. 2011. Reliably erasing data from flash-based solid state drives. In Conference on File and Storage Technologies (FAST’11), Vol. 11, 8–8.Google Scholar
- [9] Data Protection Act 2018. https://www.legislation.gov.uk/ukpga/contentsGoogle Scholar
- [10] Md Mehedi Hasan and Biswajit Ray. 2020. Data recovery from “scrubbed” NAND flash storage: Need for analog sanitization. In Proceedings of the 29th USENIX Security Symposium (USENIX Security’20).Google ScholarDigital Library
- [11] Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, and William Robertson. 2021. SoK: Enabling security analyses of embedded systems via rehosting. In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS’21). 687–701.Google ScholarDigital Library
- [12] Samuel Mergendahl, Samuel Jero, Bryan C. Ward, Juliana Furgala, Gabriel Parmer, and Richard Skowyra. 2022. The thundering herd: Amplifying kernel interference to attack response times. In Proceedings of the IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS’22). 95–107.Google ScholarCross Ref
- [13] Sri Parameswaran and Tilman Wolf. 2008. Embedded systems security—an overview. Design Automation for Embedded Systems, (2008), 173–183. Google ScholarDigital Library
- [14] Weichen Wang, Chienchung Ho, Yuanhao Chang, Teiwei Kuo, and Pinghsien Lin. 2018. Scrubbing-aware secure deletion for 3-D NAND flash. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 37, 11 (2018), 2790–2801.Google ScholarCross Ref
- [15] Jinhua Cui, Weiguang Liu, Jianhang Huang, and Laurence T. Yang. 2021. ADS: Leveraging approximate data for efficient data sanitization in SSDs. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 41, 6 (2021), 1771–1784.Google ScholarCross Ref
- [16] Joel Reardon, David Basin, and Srdjan Capkun. 2013. SoK: Secure data deletion. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P’13). 301–315.Google ScholarDigital Library
- [17] Joel Reardon, Srdjan Capkun, David Basin, and ETH Zurich. 2012. Data node encrypted file system: Efficient secure deletion for flash memory. In USENIX Security Symposium (USENIX Security’12), 333–348.Google Scholar
- [18] Richard Kissel, Andrew Regenscheid, Matthew Scholl, and Kevin Stine. 2014. Guidelines for Media Sanitization. US Department of Commerce, National Institute of Standards and Technology. Google ScholarCross Ref
- [19] 2020. Dwell Time as a Critical Security Success Metric. Retrieved from https://cdn.armor.com/app/uploads/2020/04/Ebook-DwellTime.pdfGoogle Scholar
- [20] Fei Wu, Jiaona Zhou, Shunzhuo Wang, Yajuan Du, Chengmo Yang, and Changshe. 2018. FastGC: Accelerate garbage collection via an efficient copyback-based data migration in SSDs. In Proceedings of the 55th Annual Design Automation Conference (DAC’18). 1–6.Google ScholarDigital Library
- [21] Junghee Lee, Kalidas Ganesh, Hyuk-Jun Lee, and Youngjae Kim. 2017. FESSD: A fast encrypted ssd employing on-chip access-control memory. IEEE Computer Architecture Letters (CAL’17), 16, 2 (2017), 115–118.Google Scholar
- [22] Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. 2017. DEFTL: Implementing plausibly deniable encryption in flash translation layer. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM SAC’17). 2217–2229.Google ScholarDigital Library
- [23] Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin. 2012. User-level secure deletion on log-structured file systems. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS’12). 63–64.Google ScholarDigital Library
- [24] Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, and Geoff Kuenning. 2012. TrueErase: Per-file secure deletion for the storage data path. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC’12). 439–448.Google ScholarDigital Library
- [25] Pinghsien Lin, Yuming Chang,Yungchun Li, Weichen Wang, Chienchung Ho, and Yuanhao Chang. 2018. Achieving fast sanitization with zero live data copy for MLC flash memory. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD’18). 1–8.Google ScholarDigital Library
- [26] Md Raquibuzzama, Matchima Buddhanoy, Aleksandar Milenkovic, and Biswajit Ray. 2022. Instant data sanitization on multi-level-cell NAND flash memory. In Proceedings of the 15th ACM International Conference on Systems and Storage (SYSTOR’22). 85–95.Google ScholarDigital Library
- [27] Craig Ramsay and Jasper Lohuis. 2017. TEMPEST attacks against AES. Covertly stealing keys for 200 euro. In Proceedings of the 2017 Hardware Security Conference Training. 1–10.Google Scholar
- [28] David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1986. Learning representations by back-propagating errors. Nature 323, 6088 (1986), 533–536.Google ScholarCross Ref
- [29] I. A. Basheer and M. Hajmeer. 2000. Artificial neural networks: Fundamentals, computing, design, and application. J. Microbiol. Meth. 43, 1 (2000), 3–31.Google ScholarCross Ref
- [30] Renping Liu, Renping Liu, Yujuan Tan, Runyu Zhang, Liang Liang, and Duo Liu. 2020. SSDKeeper: Self-adapting channel allocation to improve the performance of SSD devices. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS’20). 966–975.Google ScholarCross Ref
- [31] Keita Mizushina, Toshiki Nakamura, Yoshiaki Deguchi, and Ken Takeuchi. 2018. Layer-by-layer adaptively optimized ECC of NAND flash-based SSD storing convolutional neural network weight for scene recognition. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS’18). IEEE, 1–5.Google ScholarCross Ref
- [32] Weiguang Liu, Jinhua Cui, Tiantian Li, Junwei Liu, and Laurence T. Yang. 2022. A Space-efficient fair cache scheme based on machine learning for NVMe SSDs. In IEEE Transactions on Parallel and Distributed Systems (TPDS’22). 34, 1 (2022), 383–399.Google Scholar
- [33] Paul Voigt and Axel von dem Bussche. 2017. The EU general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10.3152676 (2017), 10–5555.Google ScholarCross Ref
- [34] Act. 1996. Accountability. Health insurance portability and Accountability Act of 1996. Pub. Law 104 (1996), 191.Google Scholar
- [35] Niusen Chen and Bo Chen. 2022. Duplicates also matter! Towards secure deletion on flash-based storage media by removing duplicates. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS’22).Google ScholarDigital Library
- [36] Bingzhe Li and David Du. 2021. WAS-Deletion: Workload-aware secure deletion scheme for solid-state drives. In Proceedings of the IEEE 39th International Conference on Computer Design (ICCD’21).Google ScholarCross Ref
- [37] Shunzhuo Wang, You Zhou, Jiaona Zhou, Fei W., and Changsheng Xie. 2020. An efficient data migration scheme to optimize garbage collection in SSDs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 40, 3 (2020), 430–443.Google Scholar
- [38] Dushyanth Narayana, Eno Thereska, Austin Donnelly, Sameh Elnikety, and Antony Rowstron. 2009. Migrating server storage to SSDs: analysis of tradeoffs. In Proceedings of the 4th ACM European Conference on Computer Systems (Eurosys’09). 145–158.Google ScholarDigital Library
- [39] Chunghan Lee, Tatsuo Kumano, Tatsuma Matsuki, Hiroshi Endo, Naoto Fukumoto, and Mariko Sugawara. 2017. Understanding storage traffic characteristics on enterprise virtual desktop infrastructure. In Proceedings of the 10th ACM International Systems and Storage Conference (SYSTOR’17). 1–11.Google ScholarDigital Library
- [40] A. K. Jain, Jianchang Mao, and K. M. Mohiuddin. 1996. Artificial neural networks: A tutorial. Computer 29, 3 (1996), 31–44.Google ScholarDigital Library
- [41] Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Nachaat AbdElatif Mohamed, and Humaira Arshad. 2018. State-of-the-art in artificial neural network applications: A survey. Heliyon 4, 11 (2018), e00938.Google ScholarCross Ref
- [42] Yang Hu, Hong Jiang, Dan Feng, Lei Tian, Hao Luo, and Chao Ren. 2012. Exploring and exploiting the multilevel parallelism inside SSDs for improved performance and endurance. IEEE Transactions on Computers (TC’12) 62, 6 (2012), 1141–1155.Google Scholar
- [43] Jun Li, Zhibing Sha, Zhigang Ca, François Trahay, and Jianwei Liao. 2020. Patch-based data management for dual-copy buffers in RAID-enabled SSDs. 2020. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 39, 11 (2020), 3956–3967.Google ScholarCross Ref
- [44] Jianwei Liao, Jun Li, Mingwang Zhao, Zhibing Sha, and Zhigang Cai. 2022. Read refresh scheduling and data reallocation against read disturb in SSDs. ACM Transactions on Embedded Computing Systems (TECS’22) 21, 2 (2022), 1–27.Google Scholar
- [45] Alibaba Block Traces. Alibaba Group. Retrieved from https://github.com/alibaba/block-tracesGoogle Scholar
- [46] Hal R. Varian. 2010. Intermediate microeconomics (8th Edition): a modern approach. WW Norton & Company, 2010.Google Scholar
- [47] Myungsuk Kim, Jisung Park, Genhee Cho, Yoona Kim, Lois Orosa, Onur Mutlu, and Jihong Kim. 2020. Evanesco: Architectural support for efficient data sanitization in modern flash-based storage systems. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’20). 1311–1326.Google ScholarDigital Library
Index Terms
- Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs
Recommendations
Mixed gated/exhaustive service in a polling model with priorities
In this paper we consider a single-server polling system with switch-over times. We introduce a new service discipline, mixed gated/exhaustive service, that can be used for queues with two types of customers: high and low priority customers. At the ...
A Two-Queue Polling Model with Two Priority Levels in the First Queue
In this paper we consider a single-server cyclic polling system consisting of two queues. Between visits to successive queues, the server is delayed by a random switch-over time. Two types of customers arrive at the first queue: high and low priority ...
Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?
IH&MMSec '21: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia SecurityOrganizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these documents can compromise sensitive information like authors names, details on the information system and ...
Comments