TrueErase: Secure Deletion on Flash Storage Sarah Diesburg, Chris Meyers, An-I Andy Wang 10/8/2015.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 7. Systems Software 1 System Software This software is used to provide the.
Advertisements

Autonomic Systems Justin Moles, Winter 2006 Enabling autonomic behavior in systems software with hot swapping Paper by: J. Appavoo, et al. Presentation.
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
Lesson 3: File Management. 2 Learning Objectives After studying this lesson, you will be able to:  Browse files on the computer  Open files from a folder.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Building Secure Software Chapter 9 Race Conditions.
Chapter 11 Operating Systems
COMPREHENSIVE Windows Tutorial 10 Improving Your Computer’s Performance.
Format Scandisk Defragmentation Antivirus Compression Software
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 What is electronic data?  Information stored electronically, e.g. pictures, music, documents, etc.  Where can you store your data?  Cell phones 
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
New School Websites Teacher Pages. Visit the SCUSD Website for videos tutorials: For more information.
File System. NET+OS 6 File System Architecture Design Goals File System Layer Design Storage Services Layer Design RAM Services Layer Design Flash Services.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Go to our website, and click on the eMedia Catalog link To find books, either click on the advanced search (which I will.
PPOUG, 05-OCT-01 Agenda RMAN Architecture Why Use RMAN? Implementation Decisions RMAN Oracle9i New Features.
 FILE S SYSTEM  DIFFERENT FILE SYSTEMS  FILE SYSTEM COMPONENTS  FILE OPERATIONS  LOG STRUCTERD FILE SYSTEM  FILE EXAMPLES.
Configuring the MagicInfo Pro Display
LOD Surveillance System Jamie Creech Software Engineer.
Window NT File System JianJing Cao (#98284).
Sistem Operasi IKH311 Masukan Luaran (Input/Output)
Multiple Device Driver and Flash FTL Sarah Diesburg COP 5641.
File Systems Long-term Information Storage Store large amounts of information Information must survive the termination of the process using it Multiple.
Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/
Higher Systems Computer Software. Operating System (O/S) ► The O/S controls the computer. It controls communication with peripheral devices. It loads.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
1 What is a computer? A computer is an electronic device that allows you to process and store data (information). Data is entered into the computer by.
1 iPhone Forensics Ruben Gonzalez. 2 Agenda I am the iPhone iPhone Components OS and System Architecture Let’s Dive into iPhone Forensics Evidence Left.
Chapter 4 File Basics. 2Practical PC 5 th Edition Chapter 4 Getting Started In this Chapter, you will learn: − What is a file − How to save a file − How.
UNIX Unit 1- Architecture of Unix - By Pratima.
Disk formatting Magnetic disks come in various sizes and so each use different disk drives. Different computers have different ways of organizing data.
Porting a large scale enterprise application from Tcl/Tk 8.4 to 8.5 Prashant Thakre, Tushar Gupta {prashant_thakre, Gaurav Bansal.
CS451 Software Implementation and Integration Yugi Lee STB #555 (816) Note: This lecture was designed.
2007/5/ Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1 Data Hiding in Journaling File Systems Knut Eckstein, Marko Jahnke 報告人:陳晉煒.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Hyperion :High Volume Stream Archival Divya Muthukumaran.
Helpful Hints for Paper Writing Let’s get it right the first time…
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
TrueErase: Full-storage-data-path Per-file Secure Deletion Sarah Diesburg  Christopher Meyers  Mark Stanovich Michael Mitchell  Justin Marshall  Julia.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
Click on “My Courses”. Please note that only summative assignments can be uploaded on the new virtual campus. Formative assignments are now available online.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Written by : Oren Frenkel Intel Confidential ® C CD SDS.
PDF Recovery Tool Fix Portable Document File Format.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Training Guide for Residents
Kernel Design & Implementation
Training Guide for Faculty
Know About MS Access Database
TRANSACTION PROCESSING SYSTEM (TPS)
Work-in-Progress: Full-Datapath Secure Deletion
TrueErase: Secure Deletion on Electronic Storage
Introduction to Computers
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Training Guide for Faculty
Solutions of Hotmail Problems Source Hotmail Issue.
Proposal Approval Routing
Jeopardy Data Hardware & Software Files and Folders Networking Q $100
Claims Upload and Security
1.2 Types of information storage media
Lecture 11: Flash Memory and File System Abstraction
Scripts In Matlab.
TERMS AND CONDITIONS   These PowerPoint slides are a tool for lecturers, and as such: YOU MAY add content to the slides, delete content from the slides,
Presentation transcript:

TrueErase: Secure Deletion on Flash Storage Sarah Diesburg, Chris Meyers, An-I Andy Wang 10/8/2015

The Problem Most users believe that files cannot be retrieved once  Files are no longer visible  The trashcan is emptied  The partition is formatted In reality, only link to the file is deleted  Actual data remains 2

The Problem Decommissioned storage devices leak sensitive information 3

What is Secure Deletion? Secure deletion means rendering files completely irrecoverable  No forensic analysis should be able to recover data from media 4

Secure Deletion Complications 5 Flash electronic storage can make it nearly impossible to erase files

Flash Characteristics Locations must first be erased before new data can be written  But it can take awhile to erase a location Locations can only be written or erased a small amount of times The flash solution is to rotate locations for writes. 6

7 Flash Write Behavior Flash management software rotates the usage of locations Flash Operating System

8 Flash Write Behavior Flash management software rotates the usage of locations Write gibberish to 2 Flash Operating System

9 Flash Write Behavior Write gibberish to 2 Flash Overwrites go to new location instead of original block Dead data left behind until that location is erased Operating System

Is this a problem? 10 Removal via hot airUniversal chip reader We must somehow erase sensitive data! 10 Raw flash chips can be removed and placed in a reader

Achieving Secure Deletion Need to send erase command to flash to erase sensitive information  Flash has no information about the security of the file – only the file system knows this  Currently, file systems only understand read and write commands, not erase commands 11

TrueErase Components 1. Centralized module that passes secure deletion information from file system to lower layers 2. Extension to storage block layer to take advantage of above information  Issue secure overwrite command  Call storage-specific secure deletion command 12

TrueErase Datapath View Applications File System Block Layer Storage User Kernel Secure Deletion Module Block # Add Check Secure delete commands 13 Block #

14 Securely erase my file! Secure delete Operating System TrueErase User View

15 TrueErase Flash Behavior We can now tell the flash to erase locations Securely delete 2 Flash Operating System

16 TrueErase Flash Behavior Flash The location can be securely deleted! Operating System Erase!

Why is this challenging? Flash management not easily changeable  Performance implications  Rotating the right locations File systems not designed for erase  Backward compatibility issues Handling crashes during secure deletion  Correctness issues 17

Current Development – TrueErase 18

Current Development – TrueErase Programming complete prototype  Fixing final bugs Expected to be done for conference paper submission in early January 19

Questions? For more information about TrueErase, visit 20