Work-in-Progress: Full-Datapath Secure Deletion

Slides:



Advertisements
Similar presentations
Systems Software System Software Enables the applications software to interact with the computer and Helps the computer manage its internal and external.
Advertisements

PC Card ATA command Extensions for Small Memory Card MEI(Panasonic), SanDisk,Toshiba Minoru Patrick Ohara(Toshiba)
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
What You Will Learn Components of a computer’s system software The importance of an operating system Functions of an operating system Types of user interfaces.
Exploring the UNIX File System and File Security
Handheld TFTP Server with USB Andrew Pangborn Michael Nusinov RIT Computer Engineering – CE Design 03/20/2008.
File Management Systems
Accurate and Efficient Replaying of File System Traces Nikolai Joukov, TimothyWong, and Erez Zadok Stony Brook University (FAST 2005) USENIX Conference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Operating Systems.
Instructions Slides 3,4,5 are general questions that you should be able to answer. Use slides 6-27 to answer the questions. Write your answers in a separate.
An Introduction to Device Drivers Sarah Diesburg COP 5641 / CIS 4930.
File System. NET+OS 6 File System Architecture Design Goals File System Layer Design Storage Services Layer Design RAM Services Layer Design Flash Services.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Tanenbaum 8.3 See references
Computer Organization Review and OS Introduction CS550 Operating Systems.
Chapter 10 Storage and File Structure Yonsei University 2 nd Semester, 2013 Sanghyun Park.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Lecture 2 “Structure of computer” Informatics. Computer is  general purpose device that can be programmed to carry out a set of arithmetic or logical.
CHAPTER FOUR COMPUTER SOFTWARE.
Rensselaer Polytechnic Institute CSCI-4210 – Operating Systems CSCI-6140 – Computer Operating Systems David Goldschmidt, Ph.D.
Multiple Device Driver and Flash FTL Sarah Diesburg COP 5641.
TrueErase: Secure Deletion on Flash Storage Sarah Diesburg, Chris Meyers, An-I Andy Wang 10/8/2015.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Installation Overview Lab#2 1Hanin Abdulrahman. Installing Ubuntu Linux is the process of copying operating system files from a CD, DVD, or USB flash.
Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/
Chapter Two Exploring the UNIX File System and File Security.
Class ID: Renesas Electronics America Inc. © 2012 Renesas Electronics America Inc. All rights reserved. Class ID: Using Virtual EEPROM and Flash API for.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Storing data on your computer & network. Storage devices Hardware Hard drive Flash drive Tape File server (HD) SAN NAS Software System software Windows.
Managing Files. Module 5 Managing Files ♦ Introduction “On a Linux system, everything is a file; if something is not a file, it is a process.” ♦ Topics.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Creating and Managing File Systems. Module 5 – Creating and Managing File Systems ♦ Overview This module deals with the structure of the file system,
ICT IGCSE Theory – Revision Presentation 1.2 The Main Components of Computer Systems Chapter 1: Types and components of computer systems
Manage Directories and Files in Linux Part 2. 2 Identify File Types in the Linux System The file types in Linux referred to as normal files and directories.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
TrueErase: Full-storage-data-path Per-file Secure Deletion Sarah Diesburg  Christopher Meyers  Mark Stanovich Michael Mitchell  Justin Marshall  Julia.
Thanapoom Boondee M.2/2 No.22. Pattawan Tangpattananon M.2/2No.5 Tuchatham Tosakul M.2/2No.13 Thanapoom Boondee M.2/2No.22 Suvit Pathomthanasarn M.2/2No.30.
FILE MANAGEMENT Computer Technology Timpview High School.
Operating System (Reference : OS[Silberschatz] + Norton 6e book slides)
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
CS 101 Lecture Test 1 Review 1. What is one way to get bonus points in this class? 1.Going to an Open Lab 2.Taking tests 3.Writing a paper 4.Coming to.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 3 جوانمرد Ejavanmard.blogfa.com
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Introduction to Operating Systems Concepts
Short History of Data Storage
Computers: Tools for an Information Age
Kernel Design & Implementation
Network Attached Storage Overview
Module 12: I/O Systems I/O hardware Application I/O Interface
Operating System Structure
TrueErase: Secure Deletion on Electronic Storage
Introduction to Computers
Introduction to the Kernel and Device Drivers
2018 Huawei H Real Questions Killtest
OS Virtualization.
Operation System Program 4
Exploring the UNIX File System and File Security
Operating System Fundamentals
1.2 Types of information storage media
Files Management – The interfacing
Modern PC operating systems
Chapter 13: I/O Systems I/O Hardware Application I/O Interface
File System Management
OPERATING SYSTEM B-TECH III YEAR I SEM BRANCH :ECE
CS703 - Advanced Operating Systems
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Work-in-Progress: Full-Datapath Secure Deletion Sarah Diesburg, Chris Meyers, An-I Andy Wang USENIX Security ‘09

Full-Datapath Secure Deletion Current Work Secure deletion Erasing all traces of files after user deletion The problem Fine-grained secure deletion methods only operate on one segment of storage data path Secure deletion may leave traces of data when interacting with other components (e.g. journal, page cache, flash) The solution Develop holistic, data-path-wide approach to securely erase files Full-Datapath Secure Deletion

When is fine-grained secure deletion important? Getting rid of one personal file Switching banks, hospitals, any large organization Decommissioned hard drives Military purposes Full-Datapath Secure Deletion

Are current methods good enough? Applications Applications cannot delete information about files File System Block Layer Storage Full-Datapath Secure Deletion

Are current methods good enough? Applications Applications cannot delete information about files File systems may Hold hidden copies of information Consolidate writes Not honor in-place overwrites File System Block Layer Storage Full-Datapath Secure Deletion

Are current methods good enough? Applications Applications cannot delete information about files File systems may Hold hidden copies of information Consolidate writes Not honor in-place overwrites Some storage media do not honor in-place overwrites File System Block Layer Storage Full-Datapath Secure Deletion

Full-Datapath Secure Deletion Centralized module that passes secure deletion information from file system to lower layers Extension to storage block layer to take advantage of above information Issue secure overwrite command Call storage-specific secure deletion command Full-Datapath Secure Deletion

Full-Datapath Secure Deletion Applications User Kernel Page Cache File System Add Secure Deletion Module After cache! Check Block # Block Layer Block # Secure delete commands Storage Full-Datapath Secure Deletion

Full-Datapath Secure Deletion Approach Advantages Irrevocably deletes data and description information Easy to use User calls normal delete commands Per-file deletion Acceptable performance Behaves correctly during failures Soft-state module and conservative recovery Works with modern file system mechanisms Journaling, page cache, compression, etc. Works with emerging solid-state storage media Compatible beside the legacy storage data path No modification to original behavior Full-Datapath Secure Deletion

Full-Datapath Secure Deletion Current Development Implements both secure write and secure delete block layer commands Secure write useful for devices that do not honor in-place overwrites Linux 2.6.25.6 kernel with ext3 and NAND flash Full-Datapath Secure Deletion

Full-Datapath Secure Deletion Questions? Full-Datapath Secure Deletion