skip to main content
research-article

Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs

Published:19 February 2024Publication History
Skip Abstract Section

Abstract

Sanitization is an effective approach for ensuring data security through scrubbing invalid but sensitive data pages, with the cost of impacts on storage performance due to moving out valid pages from the sanitization-required wordline, which is a logical read/write unit and consists of multiple pages in high-density SSDs. To minimize the impacts on I/O latency and data security, this article proposes a polling-based scheduling approach for data sanitization in high-density SSDs. Our method polls a specific SSD channel for completing data sanitization at the block granularity, meanwhile other channels can still service I/O requests. Furthermore, our method assigns a low priority to the blocks that are more likely to have future adjacent page invalidations inside sanitization-required wordlines, while selecting the sanitization block, to minimize the negative impacts of moving valid pages. Through a series of emulation experiments on several disk traces of real-world applications, we show that our proposal can decrease the negative effects of data sanitization in terms of the risk-performance index, which is a united time metric of I/O responsiveness and the unsafe time interval, by 16.34%, on average, compared to related sanitization methods.

REFERENCES

  1. [1] Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, and Prashant Shenoy. 2006. Capsule: An energy-optimized object storage system for memory-constrained sensor devices. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SENSYS’06). 195–208.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Song Lin, Demetrios Zeinalipour-Yazti, Vana Kalogerak, Dimitrios Gunopulos, and Walid A. Najjar. 2006. Efficient indexing data structures for flash-based sensor devices. ACM Transactions on Storage (TOS) 2, 4 (2006), 468–503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Wonkyung Kang, Dongkun Shin, and Sungjoo Yoo. 2017. Reinforcement learning-assisted garbage collection to mitigate long-tail latency in SSD. ACM Transactions on Embedded Computing Systems (TECS) 16, 5s (2017), 1–20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Mincheol Kang, Wonyoung, Lee, Jinkwon Kim, and Soontae Kim. 2022. PR-SSD: Maximizing partial read potential by exploiting compression and channel-level parallelism. IEEE Transactions on Computers (TC) 72, 3 (2022).Google ScholarGoogle Scholar
  5. [5] Jeong-Uk Kang, Heeseung Jo, Jin-Soo Kim, and Joonwon Lee. 2006. A superblock-based flash translation layer for NAND flash memory. In Proceedings of ACM International Conference on Embedded Software (EMSOFT’06).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Wenhui Zhang, Qiang Cao, Hong Jiang, and Jie Yao. 2018. PA-SSD: A page-type aware TLC SSD for improved write/read performance and storage efficiency. In Proceedings of the 2018 International Conference on Supercomputing (ICS’18), 22–32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Tsutomu Higuchi, Takuyo Kodama, Koji Kato, Ryo Fukuda, Naoya Tokiwa, Mitsuhiro Abe, Teruo Takagiwa, Yuki Shimizu, Junji Musha, Katsuaki Sakurai, Jumpei Sato, Tetsuaki Utsumi, Kazuhide Yoneya, Yasuhiro Suematsu, Toshifumi Hashimoto, Takeshi Hioka, Kosuke Yanagidaira, Masatsugu Kojima, Junya Matsuno, Kei Shiraishi, Kensuke Yamamoto, Shintaro Hayashi, Tomoharu Hashiguchi, Kazuko Inuzuka, Akio Sugahara, Mitsuaki Honma, Keiji Tsunoda, Kazumasa Yamamoto, Takahiro Sugimoto, Tomofumi Fujimura, Mizuki Kaneko, Hiroki Date, Osamu Kobayashi, Takatoshi Minamoto, Ryoichi Tachibana, Itaru Yamaguchi, Juan Lee, Venky Ramachandra, Srinivas Rajendra, Tianyu Tang, Siddhesh Darne, Jiwang Lee, Jason Li, Toru Miwa, Ryuji Yamashita, Hiroshi Sugawara, Naoki Ookuma, Masahiro Kano, Hiroyuki Mizukoshi, Yuki Kuniyoshi, Mitsuyuki Watanabe, Kei Akiyama, Hirotoshi Mori, Akira Arimizu, Yoshito Katano, Masakazu Ehama, Hiroshi Maejima, Koji Hosono, and Masahiro Yoshihara. 2021. 30.4 a 1Tb 3b/cell 3D-flash memory in a 170+ word-line-layer technology. In 2021 IEEE International Solid-State Circuits Conference (ISSCC’21), 64 (2021), 428–430.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Michael Wei, Grupp Laura, Spada Frederick E, and Swanson Steven. 2011. Reliably erasing data from flash-based solid state drives. In Conference on File and Storage Technologies (FAST’11), Vol. 11, 8–8.Google ScholarGoogle Scholar
  9. [9] Data Protection Act 2018. https://www.legislation.gov.uk/ukpga/contentsGoogle ScholarGoogle Scholar
  10. [10] Md Mehedi Hasan and Biswajit Ray. 2020. Data recovery from “scrubbed” NAND flash storage: Need for analog sanitization. In Proceedings of the 29th USENIX Security Symposium (USENIX Security’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, and William Robertson. 2021. SoK: Enabling security analyses of embedded systems via rehosting. In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS’21). 687–701.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Samuel Mergendahl, Samuel Jero, Bryan C. Ward, Juliana Furgala, Gabriel Parmer, and Richard Skowyra. 2022. The thundering herd: Amplifying kernel interference to attack response times. In Proceedings of the IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS’22). 95–107.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Sri Parameswaran and Tilman Wolf. 2008. Embedded systems security—an overview. Design Automation for Embedded Systems, (2008), 173–183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Weichen Wang, Chienchung Ho, Yuanhao Chang, Teiwei Kuo, and Pinghsien Lin. 2018. Scrubbing-aware secure deletion for 3-D NAND flash. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 37, 11 (2018), 2790–2801.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Jinhua Cui, Weiguang Liu, Jianhang Huang, and Laurence T. Yang. 2021. ADS: Leveraging approximate data for efficient data sanitization in SSDs. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 41, 6 (2021), 1771–1784.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Joel Reardon, David Basin, and Srdjan Capkun. 2013. SoK: Secure data deletion. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P’13). 301–315.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Joel Reardon, Srdjan Capkun, David Basin, and ETH Zurich. 2012. Data node encrypted file system: Efficient secure deletion for flash memory. In USENIX Security Symposium (USENIX Security’12), 333–348.Google ScholarGoogle Scholar
  18. [18] Richard Kissel, Andrew Regenscheid, Matthew Scholl, and Kevin Stine. 2014. Guidelines for Media Sanitization. US Department of Commerce, National Institute of Standards and Technology. Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] 2020. Dwell Time as a Critical Security Success Metric. Retrieved from https://cdn.armor.com/app/uploads/2020/04/Ebook-DwellTime.pdfGoogle ScholarGoogle Scholar
  20. [20] Fei Wu, Jiaona Zhou, Shunzhuo Wang, Yajuan Du, Chengmo Yang, and Changshe. 2018. FastGC: Accelerate garbage collection via an efficient copyback-based data migration in SSDs. In Proceedings of the 55th Annual Design Automation Conference (DAC’18). 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Junghee Lee, Kalidas Ganesh, Hyuk-Jun Lee, and Youngjae Kim. 2017. FESSD: A fast encrypted ssd employing on-chip access-control memory. IEEE Computer Architecture Letters (CAL’17), 16, 2 (2017), 115–118.Google ScholarGoogle Scholar
  22. [22] Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. 2017. DEFTL: Implementing plausibly deniable encryption in flash translation layer. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM SAC’17). 2217–2229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin. 2012. User-level secure deletion on log-structured file systems. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS’12). 63–64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, and Geoff Kuenning. 2012. TrueErase: Per-file secure deletion for the storage data path. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC’12). 439–448.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Pinghsien Lin, Yuming Chang,Yungchun Li, Weichen Wang, Chienchung Ho, and Yuanhao Chang. 2018. Achieving fast sanitization with zero live data copy for MLC flash memory. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD’18). 1–8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Md Raquibuzzama, Matchima Buddhanoy, Aleksandar Milenkovic, and Biswajit Ray. 2022. Instant data sanitization on multi-level-cell NAND flash memory. In Proceedings of the 15th ACM International Conference on Systems and Storage (SYSTOR’22). 85–95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Craig Ramsay and Jasper Lohuis. 2017. TEMPEST attacks against AES. Covertly stealing keys for 200 euro. In Proceedings of the 2017 Hardware Security Conference Training. 1–10.Google ScholarGoogle Scholar
  28. [28] David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1986. Learning representations by back-propagating errors. Nature 323, 6088 (1986), 533–536.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] I. A. Basheer and M. Hajmeer. 2000. Artificial neural networks: Fundamentals, computing, design, and application. J. Microbiol. Meth. 43, 1 (2000), 3–31.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Renping Liu, Renping Liu, Yujuan Tan, Runyu Zhang, Liang Liang, and Duo Liu. 2020. SSDKeeper: Self-adapting channel allocation to improve the performance of SSD devices. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS’20). 966–975.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Keita Mizushina, Toshiki Nakamura, Yoshiaki Deguchi, and Ken Takeuchi. 2018. Layer-by-layer adaptively optimized ECC of NAND flash-based SSD storing convolutional neural network weight for scene recognition. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS’18). IEEE, 1–5.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Weiguang Liu, Jinhua Cui, Tiantian Li, Junwei Liu, and Laurence T. Yang. 2022. A Space-efficient fair cache scheme based on machine learning for NVMe SSDs. In IEEE Transactions on Parallel and Distributed Systems (TPDS’22). 34, 1 (2022), 383–399.Google ScholarGoogle Scholar
  33. [33] Paul Voigt and Axel von dem Bussche. 2017. The EU general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10.3152676 (2017), 10–5555.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Act. 1996. Accountability. Health insurance portability and Accountability Act of 1996. Pub. Law 104 (1996), 191.Google ScholarGoogle Scholar
  35. [35] Niusen Chen and Bo Chen. 2022. Duplicates also matter! Towards secure deletion on flash-based storage media by removing duplicates. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS’22).Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Bingzhe Li and David Du. 2021. WAS-Deletion: Workload-aware secure deletion scheme for solid-state drives. In Proceedings of the IEEE 39th International Conference on Computer Design (ICCD’21).Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Shunzhuo Wang, You Zhou, Jiaona Zhou, Fei W., and Changsheng Xie. 2020. An efficient data migration scheme to optimize garbage collection in SSDs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 40, 3 (2020), 430–443.Google ScholarGoogle Scholar
  38. [38] Dushyanth Narayana, Eno Thereska, Austin Donnelly, Sameh Elnikety, and Antony Rowstron. 2009. Migrating server storage to SSDs: analysis of tradeoffs. In Proceedings of the 4th ACM European Conference on Computer Systems (Eurosys’09). 145–158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Chunghan Lee, Tatsuo Kumano, Tatsuma Matsuki, Hiroshi Endo, Naoto Fukumoto, and Mariko Sugawara. 2017. Understanding storage traffic characteristics on enterprise virtual desktop infrastructure. In Proceedings of the 10th ACM International Systems and Storage Conference (SYSTOR’17). 1–11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] A. K. Jain, Jianchang Mao, and K. M. Mohiuddin. 1996. Artificial neural networks: A tutorial. Computer 29, 3 (1996), 31–44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Nachaat AbdElatif Mohamed, and Humaira Arshad. 2018. State-of-the-art in artificial neural network applications: A survey. Heliyon 4, 11 (2018), e00938.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Yang Hu, Hong Jiang, Dan Feng, Lei Tian, Hao Luo, and Chao Ren. 2012. Exploring and exploiting the multilevel parallelism inside SSDs for improved performance and endurance. IEEE Transactions on Computers (TC’12) 62, 6 (2012), 1141–1155.Google ScholarGoogle Scholar
  43. [43] Jun Li, Zhibing Sha, Zhigang Ca, François Trahay, and Jianwei Liao. 2020. Patch-based data management for dual-copy buffers in RAID-enabled SSDs. 2020. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 39, 11 (2020), 3956–3967.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Jianwei Liao, Jun Li, Mingwang Zhao, Zhibing Sha, and Zhigang Cai. 2022. Read refresh scheduling and data reallocation against read disturb in SSDs. ACM Transactions on Embedded Computing Systems (TECS’22) 21, 2 (2022), 1–27.Google ScholarGoogle Scholar
  45. [45] Alibaba Block Traces. Alibaba Group. Retrieved from https://github.com/alibaba/block-tracesGoogle ScholarGoogle Scholar
  46. [46] Hal R. Varian. 2010. Intermediate microeconomics (8th Edition): a modern approach. WW Norton & Company, 2010.Google ScholarGoogle Scholar
  47. [47] Myungsuk Kim, Jisung Park, Genhee Cho, Yoona Kim, Lois Orosa, Onur Mutlu, and Jihong Kim. 2020. Evanesco: Architectural support for efficient data sanitization in modern flash-based storage systems. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’20). 1311–1326.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Storage
      ACM Transactions on Storage  Volume 20, Issue 2
      May 2024
      186 pages
      ISSN:1553-3077
      EISSN:1553-3093
      DOI:10.1145/3613586
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 February 2024
      • Online AM: 6 January 2024
      • Accepted: 26 December 2023
      • Revised: 31 October 2023
      • Received: 3 July 2023
      Published in tos Volume 20, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)204
      • Downloads (Last 6 weeks)64

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text