SAFE: Fast, Verifiable Sanitization for SSDs
نویسندگان
چکیده
As users, corporations, and government agencies store more data in digital media, managing that data and access to it becomes increasingly important. Reliably removing data from persistent storage (i.e., sanitizing the storage) is an essential aspect of this management process, and several techniques that reliably delete data from hard disks are available as built-in ATA or SCSI commands, software tools, and government standards. Recently, there have been two disruptive developments in storage sanitization. The first is the emergence of flash-based solid-state drives (SSDs) that use silicon chips rather than spinning disks to store data. The second, is the rise of encryption as a means to protect data on the drive and as a means to quickly render it irrecoverable. Reliably erasing data from SSDs is challenging both because of the complex data management schemes they employ and because the built-in facilities for sanitization are sometimes buggy. We have evaluated built-in sanitization facilities by applying a sanitization technique, dismantling the drives, extracting the raw bits from the discrete flash devices inside, and searching for remnant data. The technique takes a few hours, is inexpensive, requires only moderate technical skill, and works independently of the controller. We have used this technique to show that some drives claim to successfully erased the drive when the data remains intact, leaving us with a strong conviction that firmware-based sanitization techniques must be verifiable to be trustworthy. An alternative to overwriting or erasing data is to store the data in encrypted form. When the user wishes to destroy the data, the drive destroys the cryptographic key. In theory this should render the data irrecoverable. An advantage of this technique is that it is fast. It takes a fraction of a second to destroy a cryptographic key while conventional sanitization operations on an SSD may take many seconds. In emergency situations, speed is of the essence and erasure-based techniques may be too slow.
منابع مشابه
Reliably Erasing Data from Flash-Based Solid State Drives
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-understood for hard drives, flash-based solid state disks have a very different internal architecture, so it is unclear whether hard drive techniques will work for SSDs as well. We empirically evaluate the effectiveness of ...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملOptimal Sanitization Synthesis for Web Application Vulnerability Repair
We present a codeand input-sensitive sanitization synthesis approach for repairing string vulnerabilities that are common in web applications. The synthesized sanitization patch modifies the user input in an optimal way while guaranteeing that the repaired web application is not vulnerable. Given a web application, an input pattern and an attack pattern, we use automata-based static string anal...
متن کاملEfficient Sanitization of Unsafe Data Correlations
In this paper, we present a study to counter privacy violation due to unsafe data correlation. We propose a safe correlation requirement to keep correlated values bounded by l-diversity and evaluate the trade-off to be made for the sake of a strong privacy guarantee. Finally, we present a correlation sanitization algorithm that enforces our safety constraint and demonstrates its efficiency.
متن کاملOptimizing key-value stores for hybrid storage architectures
Flash-based solid state drives (SSDs) are increasingly becoming a popular choice as a storage device within database management systems and keyvalue stores alike. SSDs offer fast throughput and low latency access to data, but their price-per-byte cost often makes them uneconomical for exclusive use, especially in the era of big data workloads. A common solution to this problem is to augment exi...
متن کامل