Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/2009 1.

Slides:



Advertisements
Similar presentations
Paper by: Yu Li, Jianliang Xu, Byron Choi, and Haibo Hu Department of Computer Science Hong Kong Baptist University Slides and Presentation By: Justin.
Advertisements

Flash storage memory and Design Trade offs for SSD performance
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
Chapter 10: File-System Interface
Chapter 11: File System Implementation
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 8: Troubleshooting Storage Devices and Display Devices.
File Management Systems
File System Implementation
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
Chapter 11 Operating Systems
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Operating Systems.
File System Reliability. Main Points Problem posed by machine/disk failures Transaction concept Reliability – Careful sequencing of file system operations.
CSE 451: Operating Systems Winter 2010 Module 13 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura.
File System. NET+OS 6 File System Architecture Design Goals File System Layer Design Storage Services Layer Design RAM Services Layer Design Flash Services.
Transactions and Reliability. File system components Disk management Naming Reliability  What are the reliability issues in file systems? Security.
Data Communications and Networks
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Objectives Learn what a file system does
 FILE S SYSTEM  DIFFERENT FILE SYSTEMS  FILE SYSTEM COMPONENTS  FILE OPERATIONS  LOG STRUCTERD FILE SYSTEM  FILE EXAMPLES.
Rensselaer Polytechnic Institute CSCI-4210 – Operating Systems David Goldschmidt, Ph.D.
Chapter 10 Storage and File Structure Yonsei University 2 nd Semester, 2013 Sanghyun Park.
Redundant Array of Inexpensive Disks aka Redundant Array of Independent Disks (RAID) Modified from CCT slides.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
REST.  REST is an acronym standing for Representational State Transfer  A software architecture style for building scalable web services  Typically,
I/O Systems I/O Hardware Application I/O Interface
Multiple Device Driver and Flash FTL Sarah Diesburg COP 5641.
TrueErase: Secure Deletion on Flash Storage Sarah Diesburg, Chris Meyers, An-I Andy Wang 10/8/2015.
Managing Disks and Drives Chapter 13 powered by dj.
UNIX File and Directory Caching How UNIX Optimizes File System Performance and Presents Data to User Processes Using a Virtual File System.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 11: File System Implementation.
Eduardo Gutarra Velez. Outline Distributed Filesystems Motivation Google Filesystem Architecture The Metadata Consistency Model File Mutation.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem.
CE Operating Systems Lecture 17 File systems – interface and implementation.
Oracle 10g Database Administrator: Implementation and Administration Chapter 5 Basic Storage Concepts and Settings.
CS333 Intro to Operating Systems Jonathan Walpole.
Silberschatz, Galvin and Gagne  Operating System Concepts Six Step Process to Perform DMA Transfer.
Lecture 22 SSD. LFS review Good for …? Bad for …? How to write in LFS? How to read in LFS?
4P13 Week 12 Talking Points Device Drivers 1.Auto-configuration and initialization routines 2.Routines for servicing I/O requests (the top half)
2007/5/ Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1 Data Hiding in Journaling File Systems Knut Eckstein, Marko Jahnke 報告人:陳晉煒.
File Systems 2. 2 File 1 File 2 Disk Blocks File-Allocation Table (FAT)
11.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 11.5 Free-Space Management Bit vector (n blocks) … 012n-1 bit[i] =  1  block[i]
Storage Systems CSE 598d, Spring 2007 OS Support for DB Management DB File System April 3, 2007 Mark Johnson.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
TrueErase: Full-storage-data-path Per-file Secure Deletion Sarah Diesburg  Christopher Meyers  Mark Stanovich Michael Mitchell  Justin Marshall  Julia.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 2: The Linux System Part 5.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
W4118 Operating Systems Instructor: Junfeng Yang.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
Storage Systems CSE 598d, Spring 2007 Lecture 13: File Systems March 8, 2007.
Chapter 13: I/O Systems Modified by Dr. Neerja Mhaskar for CS 3SH3.
Jonathan Walpole Computer Science Portland State University
Work-in-Progress: Full-Datapath Secure Deletion
Operating System Structure
TrueErase: Secure Deletion on Electronic Storage
Oracle 10g Database Administrator: Implementation and Administration
Review.
CSE 451: Operating Systems Winter 2009 Module 13 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura 1.
Mark Zbikowski and Gary Kimura
CSE 451: Operating Systems Winter 2012 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura 1.
Lecture 11: Flash Memory and File System Abstraction
CSE451 File System Introduction and Disk Drivers Autumn 2002
Storage Management Lecture 7.
File System Performance
Chapter 13: I/O Systems.
Recap – Intro to Project 3 and FAT32
Introduction to Operating Systems
Presentation transcript:

Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/2009 1

Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide assumptions Research  Holistic way to perform secure deletion 2

The Problem Decommissioned drives and storage devices leak sensitive information Problem State of the Art Research 3

The Problem Most users believe that files cannot be retrieved once  Files are no longer visible  The trashcan is emptied  The partition is formatted Problem State of the Art Research 4

Ideal Secure Deletion Irrevocably delete corresponding data and file/directory information Be easy to use Allow per-file granularity of deletion Achieve acceptable performance Behave correctly in the presence of failures Work with modern file systems Work with emerging storage media 5 Problem State of the Art Research

Secure Deletion Problem No ideal solution exists  Why? Conventional secure deletion methods are isolated  Make assumptions of other components  Secure deletion may fail 6 Problem State of the Art Research

General Secure Deletion Methods Methods include 1. Physical destruction 2. Data overwriting 3. Encryption with key erasure Physical destruction does not provide per- file deletion  Concentrate on methods (2) and (3) 7 Problem State of the Art Research

Layer-specific Methods Application- and file-system-layer solutions  Rely on in-place overwrites, which may not be honored by lower layers (e.g. RAID, journaling)  Write can preempt other writes to same location Storage-medium-specific solutions  Limited information from higher layers  No knowledge If block is sensitive, alive, dead  No per-file flash solutions 8 Problem State of the Art Research

Review of Research Goal We want easy to use, per-file, secure deletion to work with all datapath components  Type of storage should not matter  Type of file system should not matter Proposed solution: add secure semantics that span entire datapath 9 Problem State of the Art Research

Full Datapath Secure Deletion Components  User interaction Mark sensitive files using file system  Datapath extensions File system Storage management  Secure deletion semantics in storage management 10 Problem State of the Art Research

Data Path Expansion Lower layers do not know  Which files are sensitive  Which files are deleted Need to send information down somehow  Out-of-band  Hybrid  In-band 11 Problem State of the Art Research

Out-of-band Approach Add two FS requests to communicate out-of-band information  Secure allocate  Secure deallocate Extend storage management to handle new requests 12 Problem State of the Art Research

Out-of-band Challenges +Simple design – just add what we need - Crash scenarios  Metadata updated, delete request not make it  Delete request makes it, metadata not updated  Not easy to journal new requests - Files must be securely marked in both file system and flash  Problem occurs when media writes not in-place 13 Problem State of the Art Research

Hybrid Approach Pass secure information in-band Communicate secure delete out-of-band Tailor storage management accordingly 14 Problem State of the Art Research

Hybrid Challenges +Files only need to be securely marked in file system -Crash scenarios  Metadata updated, delete request not make it  Delete request makes it, metadata not updated  Not easy to journal new request or in-band info Does not discern secure info from file updates 15 Problem State of the Art Research

In-band Approach Write of 0’s implies secure deletion Information piggybacked on existing request structure Tailor storage management accordingly 16 Problem State of the Art Research

In-band Challenges + No new requests - Writing 0’s means a number of things 1. Writing data of all 0s 2. Marking file region as empty Partial FS block write 17 Problem State of the Art Research

Secure Deletion Semantics Concentrate on flash storage management Flash has different constraints than hard drives 18 Problem State of the Art Research

Flash Background Flash constraints  Data area must be explicitly erased before written  Erasures are slow  A data location can be erased up to 100,000 times Solution  Put in-place writes elsewhere on flash!  Avoid erasing data whenever possible 19 Problem State of the Art Research

20 Default Flash Write Behavior Flash management software rotates the usage of locations OS secrets Flash Logical AddressPhysical Address secrets 20 Problem State of the Art Research

21 Default Flash Write Behavior Flash management software rotates the usage of locations OS Logical AddressPhysical Address Write random bits to 1 secrets Flash secrets 21 Problem State of the Art Research

22 Default Flash Write Behavior Logical AddressPhysical Address Write random bits to 1 secrets Flash randomsecrets 22 Problem State of the Art Research OS Overwrites go to new block instead of original block Dead data left behind until that block is erased

Is this a problem? 23 Removal via hot airUniversal chip reader We must somehow erase sensitive data! 23 Problem State of the Art Research Raw flash chips can be removed and placed in a reader

Storage Management Secure Deletion Semantics Secure write Secure delete 24 Problem State of the Art Research

25 Secure Write We could modify the flash management software to delete dead, sensitive data on in-place update OS Logical AddressPhysical Address Secure write new to 1 secrets Flash secrets 25 Problem State of the Art Research

26 Secure Write OS Logical AddressPhysical Address Flash new secret secrets Erase! Secure write new to 1 26 Problem State of the Art Research Regular writes occur as normal

27 Secure Deletion We could modify the flash management software to delete sensitive data during file deletion OS Delete 1 secrets Flash secrets 27 Problem State of the Art Research Logical AddressPhysical Address 00 11

28 Secure Deletion Just erase corresponding location OS Flash secrets Erase! Delete 1 28 Problem State of the Art Research Logical AddressPhysical Address 00

Extra Challenges Atomicity of relevant file-system updates  Some operations must happen at once Dealing with asynchronous requests Incorporating journaling Optimizing future flash media management 29 Problem State of the Art Research

Summary This research will provide a full-datapath secure deletion model that is Easy to use With acceptable performance Crash resistant Compatible to modern file systems as well as with emerging solid-state storage 30

Questions? 31

BACKUP SLIDES 32

Thesis Statement Secure deletion can be accomplished through a full-datapath solution Research objectives 1. Demonstrate working full-datapath secure deletion framework 2. Optimize framework for an emerging storage media for which current methods do not work  Flash media 33 Problem State of the Art Research

Anticipated Challenges Correct full-datapath secure deletion model  Correct data categorization  System failures (e.g. journal, page cache, FTL) Creating efficient models for future flash management software  Acceptable performance  Reducing number of slow flash operations 34 Problem State of the Art Research

File System Methods Two types of secure deletion file systems exist:  Block-based file systems  Storage-specific file systems 35

File Systems Typical file systems expect disk  Block layer interface converts FS blocks into sectors Storage-specific file systems directly manage underlying storage units  No page cache  May implement own journal 36

Storage-specific FS Secure Deletion Limitations Optimized for specific type of storage  Cannot put hard drive under flash file system, etc. Deletes all files securely  User cannot specify specific files  Performance disadvantage 37

Crash Scenarios File system  Data erased, metadata not updated  Metadata updated, data not erased Block layer  Erase command in page cache during power- outage Flash  Copying good flash pages first during erase command 38

AON Transform Transform that is hard hard to invert unless all of the output is known 39 H  H  H  H  K = Encrypted data E( ) random key H( ) plaintext ciphertext tab