Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs

Published: 19 February 2024 Publication History

Abstract

Sanitization is an effective approach for ensuring data security through scrubbing invalid but sensitive data pages, with the cost of impacts on storage performance due to moving out valid pages from the sanitization-required wordline, which is a logical read/write unit and consists of multiple pages in high-density SSDs. To minimize the impacts on I/O latency and data security, this article proposes a polling-based scheduling approach for data sanitization in high-density SSDs. Our method polls a specific SSD channel for completing data sanitization at the block granularity, meanwhile other channels can still service I/O requests. Furthermore, our method assigns a low priority to the blocks that are more likely to have future adjacent page invalidations inside sanitization-required wordlines, while selecting the sanitization block, to minimize the negative impacts of moving valid pages. Through a series of emulation experiments on several disk traces of real-world applications, we show that our proposal can decrease the negative effects of data sanitization in terms of the risk-performance index, which is a united time metric of I/O responsiveness and the unsafe time interval, by 16.34%, on average, compared to related sanitization methods.

References

[1]
Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, and Prashant Shenoy. 2006. Capsule: An energy-optimized object storage system for memory-constrained sensor devices. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SENSYS’06). 195–208.
[2]
Song Lin, Demetrios Zeinalipour-Yazti, Vana Kalogerak, Dimitrios Gunopulos, and Walid A. Najjar. 2006. Efficient indexing data structures for flash-based sensor devices. ACM Transactions on Storage (TOS) 2, 4 (2006), 468–503.
[3]
Wonkyung Kang, Dongkun Shin, and Sungjoo Yoo. 2017. Reinforcement learning-assisted garbage collection to mitigate long-tail latency in SSD. ACM Transactions on Embedded Computing Systems (TECS) 16, 5s (2017), 1–20.
[4]
Mincheol Kang, Wonyoung, Lee, Jinkwon Kim, and Soontae Kim. 2022. PR-SSD: Maximizing partial read potential by exploiting compression and channel-level parallelism. IEEE Transactions on Computers (TC) 72, 3 (2022).
[5]
Jeong-Uk Kang, Heeseung Jo, Jin-Soo Kim, and Joonwon Lee. 2006. A superblock-based flash translation layer for NAND flash memory. In Proceedings of ACM International Conference on Embedded Software (EMSOFT’06).
[6]
Wenhui Zhang, Qiang Cao, Hong Jiang, and Jie Yao. 2018. PA-SSD: A page-type aware TLC SSD for improved write/read performance and storage efficiency. In Proceedings of the 2018 International Conference on Supercomputing (ICS’18), 22–32.
[7]
Tsutomu Higuchi, Takuyo Kodama, Koji Kato, Ryo Fukuda, Naoya Tokiwa, Mitsuhiro Abe, Teruo Takagiwa, Yuki Shimizu, Junji Musha, Katsuaki Sakurai, Jumpei Sato, Tetsuaki Utsumi, Kazuhide Yoneya, Yasuhiro Suematsu, Toshifumi Hashimoto, Takeshi Hioka, Kosuke Yanagidaira, Masatsugu Kojima, Junya Matsuno, Kei Shiraishi, Kensuke Yamamoto, Shintaro Hayashi, Tomoharu Hashiguchi, Kazuko Inuzuka, Akio Sugahara, Mitsuaki Honma, Keiji Tsunoda, Kazumasa Yamamoto, Takahiro Sugimoto, Tomofumi Fujimura, Mizuki Kaneko, Hiroki Date, Osamu Kobayashi, Takatoshi Minamoto, Ryoichi Tachibana, Itaru Yamaguchi, Juan Lee, Venky Ramachandra, Srinivas Rajendra, Tianyu Tang, Siddhesh Darne, Jiwang Lee, Jason Li, Toru Miwa, Ryuji Yamashita, Hiroshi Sugawara, Naoki Ookuma, Masahiro Kano, Hiroyuki Mizukoshi, Yuki Kuniyoshi, Mitsuyuki Watanabe, Kei Akiyama, Hirotoshi Mori, Akira Arimizu, Yoshito Katano, Masakazu Ehama, Hiroshi Maejima, Koji Hosono, and Masahiro Yoshihara. 2021. 30.4 a 1Tb 3b/cell 3D-flash memory in a 170+ word-line-layer technology. In 2021 IEEE International Solid-State Circuits Conference (ISSCC’21), 64 (2021), 428–430.
[8]
Michael Wei, Grupp Laura, Spada Frederick E, and Swanson Steven. 2011. Reliably erasing data from flash-based solid state drives. In Conference on File and Storage Technologies (FAST’11), Vol. 11, 8–8.
[10]
Md Mehedi Hasan and Biswajit Ray. 2020. Data recovery from “scrubbed” NAND flash storage: Need for analog sanitization. In Proceedings of the 29th USENIX Security Symposium (USENIX Security’20).
[11]
Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, and William Robertson. 2021. SoK: Enabling security analyses of embedded systems via rehosting. In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS’21). 687–701.
[12]
Samuel Mergendahl, Samuel Jero, Bryan C. Ward, Juliana Furgala, Gabriel Parmer, and Richard Skowyra. 2022. The thundering herd: Amplifying kernel interference to attack response times. In Proceedings of the IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS’22). 95–107.
[13]
Sri Parameswaran and Tilman Wolf. 2008. Embedded systems security—an overview. Design Automation for Embedded Systems, (2008), 173–183.
[14]
Weichen Wang, Chienchung Ho, Yuanhao Chang, Teiwei Kuo, and Pinghsien Lin. 2018. Scrubbing-aware secure deletion for 3-D NAND flash. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 37, 11 (2018), 2790–2801.
[15]
Jinhua Cui, Weiguang Liu, Jianhang Huang, and Laurence T. Yang. 2021. ADS: Leveraging approximate data for efficient data sanitization in SSDs. IEEE Trans. Comput.-Aid. Des. Integ. Circ. Syst. 41, 6 (2021), 1771–1784.
[16]
Joel Reardon, David Basin, and Srdjan Capkun. 2013. SoK: Secure data deletion. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P’13). 301–315.
[17]
Joel Reardon, Srdjan Capkun, David Basin, and ETH Zurich. 2012. Data node encrypted file system: Efficient secure deletion for flash memory. In USENIX Security Symposium (USENIX Security’12), 333–348.
[18]
Richard Kissel, Andrew Regenscheid, Matthew Scholl, and Kevin Stine. 2014. Guidelines for Media Sanitization. US Department of Commerce, National Institute of Standards and Technology.
[19]
2020. Dwell Time as a Critical Security Success Metric. Retrieved from https://cdn.armor.com/app/uploads/2020/04/Ebook-DwellTime.pdf
[20]
Fei Wu, Jiaona Zhou, Shunzhuo Wang, Yajuan Du, Chengmo Yang, and Changshe. 2018. FastGC: Accelerate garbage collection via an efficient copyback-based data migration in SSDs. In Proceedings of the 55th Annual Design Automation Conference (DAC’18). 1–6.
[21]
Junghee Lee, Kalidas Ganesh, Hyuk-Jun Lee, and Youngjae Kim. 2017. FESSD: A fast encrypted ssd employing on-chip access-control memory. IEEE Computer Architecture Letters (CAL’17), 16, 2 (2017), 115–118.
[22]
Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. 2017. DEFTL: Implementing plausibly deniable encryption in flash translation layer. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM SAC’17). 2217–2229.
[23]
Joel Reardon, Claudio Marforio, Srdjan Capkun, and David Basin. 2012. User-level secure deletion on log-structured file systems. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS’12). 63–64.
[24]
Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, and Geoff Kuenning. 2012. TrueErase: Per-file secure deletion for the storage data path. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC’12). 439–448.
[25]
Pinghsien Lin, Yuming Chang,Yungchun Li, Weichen Wang, Chienchung Ho, and Yuanhao Chang. 2018. Achieving fast sanitization with zero live data copy for MLC flash memory. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD’18). 1–8.
[26]
Md Raquibuzzama, Matchima Buddhanoy, Aleksandar Milenkovic, and Biswajit Ray. 2022. Instant data sanitization on multi-level-cell NAND flash memory. In Proceedings of the 15th ACM International Conference on Systems and Storage (SYSTOR’22). 85–95.
[27]
Craig Ramsay and Jasper Lohuis. 2017. TEMPEST attacks against AES. Covertly stealing keys for 200 euro. In Proceedings of the 2017 Hardware Security Conference Training. 1–10.
[28]
David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1986. Learning representations by back-propagating errors. Nature 323, 6088 (1986), 533–536.
[29]
I. A. Basheer and M. Hajmeer. 2000. Artificial neural networks: Fundamentals, computing, design, and application. J. Microbiol. Meth. 43, 1 (2000), 3–31.
[30]
Renping Liu, Renping Liu, Yujuan Tan, Runyu Zhang, Liang Liang, and Duo Liu. 2020. SSDKeeper: Self-adapting channel allocation to improve the performance of SSD devices. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS’20). 966–975.
[31]
Keita Mizushina, Toshiki Nakamura, Yoshiaki Deguchi, and Ken Takeuchi. 2018. Layer-by-layer adaptively optimized ECC of NAND flash-based SSD storing convolutional neural network weight for scene recognition. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS’18). IEEE, 1–5.
[32]
Weiguang Liu, Jinhua Cui, Tiantian Li, Junwei Liu, and Laurence T. Yang. 2022. A Space-efficient fair cache scheme based on machine learning for NVMe SSDs. In IEEE Transactions on Parallel and Distributed Systems (TPDS’22). 34, 1 (2022), 383–399.
[33]
Paul Voigt and Axel von dem Bussche. 2017. The EU general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10.3152676 (2017), 10–5555.
[34]
Act. 1996. Accountability. Health insurance portability and Accountability Act of 1996. Pub. Law 104 (1996), 191.
[35]
Niusen Chen and Bo Chen. 2022. Duplicates also matter! Towards secure deletion on flash-based storage media by removing duplicates. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIACCS’22).
[36]
Bingzhe Li and David Du. 2021. WAS-Deletion: Workload-aware secure deletion scheme for solid-state drives. In Proceedings of the IEEE 39th International Conference on Computer Design (ICCD’21).
[37]
Shunzhuo Wang, You Zhou, Jiaona Zhou, Fei W., and Changsheng Xie. 2020. An efficient data migration scheme to optimize garbage collection in SSDs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 40, 3 (2020), 430–443.
[38]
Dushyanth Narayana, Eno Thereska, Austin Donnelly, Sameh Elnikety, and Antony Rowstron. 2009. Migrating server storage to SSDs: analysis of tradeoffs. In Proceedings of the 4th ACM European Conference on Computer Systems (Eurosys’09). 145–158.
[39]
Chunghan Lee, Tatsuo Kumano, Tatsuma Matsuki, Hiroshi Endo, Naoto Fukumoto, and Mariko Sugawara. 2017. Understanding storage traffic characteristics on enterprise virtual desktop infrastructure. In Proceedings of the 10th ACM International Systems and Storage Conference (SYSTOR’17). 1–11.
[40]
A. K. Jain, Jianchang Mao, and K. M. Mohiuddin. 1996. Artificial neural networks: A tutorial. Computer 29, 3 (1996), 31–44.
[41]
Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Nachaat AbdElatif Mohamed, and Humaira Arshad. 2018. State-of-the-art in artificial neural network applications: A survey. Heliyon 4, 11 (2018), e00938.
[42]
Yang Hu, Hong Jiang, Dan Feng, Lei Tian, Hao Luo, and Chao Ren. 2012. Exploring and exploiting the multilevel parallelism inside SSDs for improved performance and endurance. IEEE Transactions on Computers (TC’12) 62, 6 (2012), 1141–1155.
[43]
Jun Li, Zhibing Sha, Zhigang Ca, François Trahay, and Jianwei Liao. 2020. Patch-based data management for dual-copy buffers in RAID-enabled SSDs. 2020. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’20). 39, 11 (2020), 3956–3967.
[44]
Jianwei Liao, Jun Li, Mingwang Zhao, Zhibing Sha, and Zhigang Cai. 2022. Read refresh scheduling and data reallocation against read disturb in SSDs. ACM Transactions on Embedded Computing Systems (TECS’22) 21, 2 (2022), 1–27.
[45]
Alibaba Block Traces. Alibaba Group. Retrieved from https://github.com/alibaba/block-traces
[46]
Hal R. Varian. 2010. Intermediate microeconomics (8th Edition): a modern approach. WW Norton & Company, 2010.
[47]
Myungsuk Kim, Jisung Park, Genhee Cho, Yoona Kim, Lois Orosa, Onur Mutlu, and Jihong Kim. 2020. Evanesco: Architectural support for efficient data sanitization in modern flash-based storage systems. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’20). 1311–1326.

Index Terms

  1. Polling Sanitization to Balance I/O Latency and Data Security of High-density SSDs

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Storage
    ACM Transactions on Storage  Volume 20, Issue 2
    May 2024
    186 pages
    ISSN:1553-3077
    EISSN:1553-3093
    DOI:10.1145/3613586
    • Editor:
    • Erez Zadok
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 February 2024
    Online AM: 06 January 2024
    Accepted: 26 December 2023
    Revised: 31 October 2023
    Received: 03 July 2023
    Published in TOS Volume 20, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. High-density SSDs
    2. I/O latency
    3. data security
    4. sanitization
    5. polling
    6. scheduling

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • Natural Science Foundation Project of CQ CSTC

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 313
      Total Downloads
    • Downloads (Last 12 months)313
    • Downloads (Last 6 weeks)43
    Reflects downloads up to 18 Aug 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media