跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.91) 您好!臺灣時間:2025/01/20 00:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:王韋程
研究生(外文):Wei-Chen Wang
論文名稱:基於三維快閃記憶體之擦洗式導向資料淨化技術
論文名稱(外文):Scrubbing-aware Sanitization for 3D NAND Flash
指導教授:郭大維郭大維引用關係
指導教授(外文):Tei-Wei Kuo
口試日期:2017-06-28
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:英文
論文頁數:42
中文關鍵詞:資料淨化資料安全擦洗式導向儲存系統三維快閃記憶體
外文關鍵詞:sanitizationdata securityscrubbing-awarestorage system3D NAND flash
相關次數:
  • 被引用被引用:0
  • 點閱點閱:299
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
由於近年來大眾對於電腦科學之資料安全議題的關注以及重視,傳統資料刪除指令的能力已不符合現今儲存系統上對於資料安全的需求。因此,新興之資料淨化技術以及擦洗式指令皆被提出,以符合將機密資料完全徹底地從儲存裝置中移除乾淨的需求。然而,資料淨化的過程有可能導致大量的資料搬移而造成時間和空間上的浪費,並且擦洗式指令也會造成資料干擾之議題。此篇論文中,我們目標為同時利用資料淨化和擦洗式指令的優點,以提出一個基於三維快閃記憶體上有效率之新興資料刪除技術。不同於以往的研究中採取加密式或者傳統刪除式的方法以達成資料淨化之目的,此篇論文同時利用擦洗式指令的干擾議題以及三維快閃記憶體的特性,而進一步提昇資料淨化之效能。此外,我們也提出了一個以群集為基礎的資料寫入策略,因此減少資料搬移的負擔且有效地利用資料干擾之特性,而使得資料淨化技術之效率提昇。上述設計架構之能力經由一連串的實驗及驗證,我們亦得到令人激賞之結果。
Because of the increasing concern of data security, the ability of traditional erase and deletion commands can no longer support such a security requirement of today’s storage systems. As a result, the ideas of sanitization and scrubbing operations are proposed to meet the needs of clearly and completely removing the sensitive data from the storage devices physically. However, the sanitization process can result in the significant overhead of live-page-copying, and the scrubbing can result in the disturbance issues. In this work, we aim at exploring a way to take advantage of benefits of both sanitization and scrubbing operations to propose an efficient sanitization design for 3D NAND flash memory. Different from the past work which adopted encryption-based and erase-based schemes to achieve the goal of data sanitization, this paper exploiting the considerations of scrubbing disturbances and characteristics of 3D flash memory (e.g., programming latency and page layout) to improve the performance of sanitization. In addition, a grouping-based write strategy is proposed to not only reduce the live-page-copying overheads but also exploit the disturbance property to improve sanitization efficiency. The capability of the proposed design is evaluated by a series of experiments, for which we have very encouraging results.
Abstract in Chinese iii
Abstract v
Contents vii
List of Figures ix
List of Tables x

1 Introduction 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Architecture of 3D NAND Flash . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Objectives and Contributions . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 Background and Research Motivation 6
2.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Sanitization on HDDs and SSDs . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Scrubbing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4 Summary of Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

3 Scrubbing-aware Sanitization Design 12
3.1 Design Concept: Sanitization Overhead . . . . . . . . . . . . . . . . . . 12
3.2 Design Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3 Grouping-basedWrite Strategy . . . . . . . . . . . . . . . . . . . . . . . 19
3.4 Reliable Grouping-basedWrite Strategy . . . . . . . . . . . . . . . . . . 22
3.5 Disturbance Infection Scrubbing Policy . . . . . . . . . . . . . . . . . . 24
3.6 Garbage Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

4 Performance Evaluation 31
4.1 Evaluation Metrics and Experiment Setup . . . . . . . . . . . . . . . . . 31
4.2 Experiment Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

5 Concluding Remarks 37
5.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Bibliography 39
[1] Alexandre Melo Braga and Alfredo H. Gallinucci Colito. Adding secure deletion to an encrypted file system on android smartphones. In Proceedings of the 8th Inter- national Conference on Emerging Security Information, Systems and Technologies, IARIA ’14, pages 106–110, 2014.
[2] K. P. Chang, H. T. Lue, C. P. Chen, C. F. Chen, Y. R. Chen, Y. H. Hsiao, C. C. Hsieh, Y. H. Shih, T. Yang, K. C. Chen, C. H. Hung, and C. Y. Lu. Memory architecture of 3d vertical gate (3dvg) nand flash using plural island-gate ssl decoding method and study of it’s program inhibit characteristics. In 2012 4th IEEE International Memory Workshop, pages 1–4, May 2012.
[3] Bo Chen, Shijie Jia, Luning Xia, and Peng Liu. Sanitizing data is not enough!: Towards sanitizing structural artifacts in flash media. In Proceedings of the 32Nd Annual Conference on Computer Security Applications, ACSAC ’16, pages 496– 507, New York, NY, USA, 2016. ACM.
[4] Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, and Geoff Kuenning. Trueerase: Per-file secure deletion for the storage data path. In Proceedings of the 28th Annual Com- puter Security Applications Conference, ACSAC ’12, pages 439–448, New York, NY, USA, 2012. ACM.
[5] JEDEC Solid State Technology Association, Arlington, VA, USA. JEDEC Em- bedded Multi-Media Card (eMMC) Electrical Standard (5.1), 5.1 edition, February 2015.
[6] JEDEC Solid State Technology Association, Arlington, VA, USA. JEDEC Univer- sal Flash Storage (UFS) Version 2.1, version 2.1 edition, March 2016.
[7] Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. Nfps: Adding undetectable secure deletion to flash translation layer. In Proceedings of the 11th ACM on Asia Confer- ence on Computer and Communications Security, ASIA CCS ’16, pages 305–315, New York, NY, USA, 2016. ACM.
[8] KPMG and Consumer Goods Forum. Global Consumer Executive Top of Mind Survey 2014, July 2014.
[9] KPMG and Consumer Goods Forum. Global Consumer Executive Top of Mind Survey 2016, June 2016.
[10] Chen Liu, Hoda Khouzani, and Chengmo Yang. Erasucrypto: A light-weight secure data deletion scheme for solid state drives. In Proceedings on Privacy Enhancing Technologies, 2017.
[11] H. T. Lue, S. H. Chen, Y. H. Shih, K. Y. Hsieh, and C. Y. Lu. Overview of 3d nand flash and progress of vertical gate (vg) architecture. In 2012 IEEE 11th International Conference on Solid-State and Integrated Circuit Technology, pages 1–4, Oct 2012.
[12] Micron Technology, Inc., Boise, ID, USA. Micron 3D NAND FlashMemory, February 2016.
[13] NVM Express Workgroup c/o Virtual, Inc., Wakefield, MA, USA. NVM Express Revision 1.2.1 Specification, revision 1.2.1 edition, June 2016.
[14] K. T. Park, S. Nam, D. Kim, P. Kwak, D. Lee, Y. H. Choi, M. H. Choi, D. H. Kwak, D. H. Kim, M. S. Kim, H. W. Park, S. W. Shim, K. M. Kang, S. W. Park, K. Lee, H. J. Yoon, K. Ko, D. K. Shim, Y. L. Ahn, J. Ryu, D. Kim, K. Yun, J. Kwon, S. Shin, D. S. Byeon, K. Choi, J. M. Han, K. H. Kyung, J. H. Choi, and K. Kim. Threedimensional 128 gb mlc vertical nand flash memory with 24-wl stacked layers and 50 mb/s high-speed programming. IEEE Journal of Solid-State Circuits, 50(1):204– 213, Jan 2015.
[15] Joel Reardon, Srdjan Capkun, and David Basin. Data node encrypted file system: Efficient secure deletion for flash memory. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pages 333–348, Bellevue, WA, 2012. USENIX.
[16] Joel Reardon, ClaudioMarforio, Srdjan Capkun, and David Basin. User-level secure deletion on log-structured file systems. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’12, pages 63– 64, New York, NY, USA, 2012. ACM.
[17] Thomas Ristenpart and Scott Yilek. When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. In NDSS, 2010.
[18] Samsung Electronics Co., Ltd., Gyeonggi-do, Korea. Samsung V-NAND technology, September 2014.
[19] SK HYNIX INC., Gyeonggi-do, Korea. Hynix 32Gb MLC NAND Flash Memory TSOP Legacy, January 2011.
[20] Kyoungmoon Sun, Jongmoo Choi, Donghee Lee, and S. H. Noh. Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics. IEEE Trans. on Consum. Electron., 54(1):100–104, February 2008.
[21] Avishay Traeger, Erez Zadok, Nikolai Joukov, and Charles P. Wright. A nine year study of file system and storage benchmarking. Trans. Storage, 4(2):5:1–5:56, May 2008.
[22] Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson. Reliably erasing data from flash-based solid state drives. In Proceedings of the 9th USENIX Conference on File and Stroage Technologies, FAST’11, pages 8–8, Berkeley, CA, USA, 2011. USENIX Association.
[23] MichaelWei and Steven Swanson. Safe: Fast, verifiable sanitization for ssds. Technical Report cs2011-0963, October 2010.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top