Movatterモバイル変換


[0]ホーム

URL:


CN109324756A - A data security deletion method based on solid state disk array - Google Patents

A data security deletion method based on solid state disk array
Download PDF

Info

Publication number
CN109324756A
CN109324756ACN201810961762.6ACN201810961762ACN109324756ACN 109324756 ACN109324756 ACN 109324756ACN 201810961762 ACN201810961762 ACN 201810961762ACN 109324756 ACN109324756 ACN 109324756A
Authority
CN
China
Prior art keywords
data
solid
state disks
state disk
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810961762.6A
Other languages
Chinese (zh)
Inventor
曾令仿
程稳
涂盛霞
李春艳
桑大邹
王芳
冯丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and TechnologyfiledCriticalHuazhong University of Science and Technology
Priority to CN201810961762.6ApriorityCriticalpatent/CN109324756A/en
Publication of CN109324756ApublicationCriticalpatent/CN109324756A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of data safety delet method based on Solid-state disc array, using solid-state disks multiple in Solid-state disc array can parallel work-flow the characteristics of, conversion process is carried out to data using privacy sharing algorithm, by the data distribution after coding to each solid-state disk, on the one hand, coding guarantees data redundancy, and the data after convert is ciphertexts, raising data reliability and safety;On the other hand, it using the characteristic of fault-tolerant encoding, no longer needs to carry out entire data covering to the deletion of data and writes, but delete partial data, destroy data integrity, restore data can not.It even if attacker obtains code segment data, can not obtain in plain text, achieve the purpose that data safety is deleted.The present invention solve the problems, such as the storage of Solid-state disc array is unreliable, file can not the data storage securities such as safety deleting.

Description

Translated fromChinese
一种基于固态盘阵列的数据安全删除方法A data security deletion method based on solid state disk array

技术领域technical field

本发明属于计算机数据存储技术领域,更具体地,涉及一种基于固态盘阵列的数据安全删除方法。The invention belongs to the technical field of computer data storage, and more particularly, relates to a data security deletion method based on a solid state disk array.

背景技术Background technique

目前,基于闪存的固态盘(SSD)已成为磁盘的有力替代品,并且得到了学术界和工业界的广泛关注。固态盘除了应用于桌面机之外,也渐渐应用于服务器和企业级数据存储系统中。在企业级数据存储系统中,单个固态盘显然无法满足服务对存储系统容量、性能和可靠性的要求。因此,将磁盘阵列(RAID)算法应用到固态盘存储系统中,构建大容量、高性能和高可靠的存储系统非常有必要,即固态盘阵列。类似于RAID,固态盘阵列的性能也受到阵列中性能最差的成员盘的影响。因此,单个固态盘的不可靠将使得固态盘阵列表现出严重的性能波动。At present, flash-based solid-state disks (SSDs) have become a powerful alternative to magnetic disks and have received extensive attention from academia and industry. In addition to being used in desktop computers, SSDs are also gradually being used in servers and enterprise-level data storage systems. In an enterprise-level data storage system, a single solid-state disk obviously cannot meet the service requirements for storage system capacity, performance and reliability. Therefore, it is very necessary to build a large-capacity, high-performance and highly reliable storage system by applying the RAID array (RAID) algorithm to the solid-state disk storage system, that is, the solid-state disk array. Similar to RAID, the performance of an SSD array is also affected by the worst performing member drive in the array. Therefore, the unreliability of a single SSD will cause the SSD array to exhibit severe performance fluctuations.

固态盘阵列中的固态盘在内部都采用异地更新的操作方式,当用户使用安全软件对固态盘中的文件进行安全删除时,对目标数据的覆盖操作全部都被转移到新的空闲物理页。因此,敏感的目标数据不会被物理覆盖或擦除,而仅仅是在固态盘内被标记为无效数据。也就是说,文件内容依然会存在于闪存之中。所有的改变仅仅是,从原来的逻辑地址无法读取到目标文件的数据而已,此类被删除的数据很容易被恢复,数据的安全性无法保障。The SSD in the SSD array adopts the operation mode of off-site update internally. When the user uses the security software to securely delete the files in the SSD, the overwrite operation of the target data is all transferred to a new free physical page. Therefore, sensitive target data is not physically overwritten or erased, but simply marked as invalid data within the SSD. That is, the file contents will still exist in flash memory. All the changes are only that the data of the target file cannot be read from the original logical address. Such deleted data can be easily recovered, and the security of the data cannot be guaranteed.

基于闪存芯片的固态盘中数据安全删除问题研究,现有的主要手段是通过主机对设备目标数据进行数据填充的方式来实现数据的销毁或清除。这种方法对于闪存型存储器存在两方面问题:①该方法需要通过写操作来完成,而在闪存中写操作过程繁琐,耗时较长,时间开销很大;②出于对闪存寿命及磨损平衡的考虑,存储器保留有用于备份的冗余块,该方法在使用过程中会导致数据残留在备份块中。Based on the research on data security deletion in solid-state disks based on flash memory chips, the existing main method is to destroy or clear data by filling the target data of the device with the host. This method has two problems for flash memory: ① This method needs to be completed by write operation, while the write operation process in flash memory is cumbersome, time-consuming and time-consuming; Considering that the storage retains redundant blocks for backup, this method will cause data to remain in the backup blocks during use.

发明内容SUMMARY OF THE INVENTION

针对现有技术的以上缺陷或改进需求,本发明提出一种基于固态盘阵列的数据安全删除方法,将秘密共享机制的基本原理引入其中,通过破坏固态盘阵列中各固态盘数据的冗余能力,结合数据转换处理操作,在破坏数据完整性后,剩余数据均已加密,即使攻击者得到部分编码数据,也不能获取明文,从而达到安全删除数据的目的,相应地可有效解决现有技术中由于固态盘的异地更新特性导致数据无法安全删除,固态盘阵列的数据存储安全问题,以及大量覆盖写影响闪存寿命及磨损平衡等问题。In view of the above defects or improvement requirements of the prior art, the present invention proposes a data security deletion method based on a solid-state disk array, which introduces the basic principle of the secret sharing mechanism, and destroys the data redundancy capability of each solid-state disk in the solid-state disk array. , combined with the data conversion processing operation, after the data integrity is destroyed, the remaining data is encrypted, even if the attacker obtains part of the encoded data, he cannot obtain the plaintext, so as to achieve the purpose of safely deleting the data, which can effectively solve the problem in the prior art. Due to the off-site update feature of SSDs, data cannot be safely deleted, data storage security issues in SSD arrays, and a large number of overwrites affect flash memory life and wear balance.

为实现上述目的,本发明提供一种基于固态盘阵列的数据安全删除方法,所述方法包括:To achieve the above purpose, the present invention provides a method for securely deleting data based on a solid state disk array, the method comprising:

(1)对源数据D进行封装转换,得到封装转换后数据(X,t),其中X为头部,t为尾部;(1) Encapsulate and transform the source data D to obtain the encapsulated and transformed data (X, t), where X is the head and t is the tail;

(2)通过秘密共享算法(n,k,r)对步骤(1)得到的封装转换后数据(X,t)进行冗余编码,得到n个编码后数据,其中n为秘密共享算法编码后输出数据的份额数量,k为秘密可进行重构的份额数量,r为秘密不能进行重构的份额数量,n>k>r≥0。(2) Redundant coding is performed on the encapsulated and converted data (X, t) obtained in step (1) by the secret sharing algorithm (n, k, r) to obtain n coded data, where n is the encrypted data of the secret sharing algorithm. The number of shares of the output data, k is the number of shares for which the secret can be reconstructed, r is the number of shares for which the secret cannot be reconstructed, n>k>r≥0.

(3)将步骤(2)得到的n个编码后数据分别存放到固态盘阵列中的n个固态盘上;(3) the n encoded data obtained in step (2) are respectively stored on the n solid state disks in the solid state disk array;

(4)根据所述秘密共享算法的冗余能力n-r,将达到破坏冗余能力n-r的固态盘数目上的数据删除,即可完成数据的安全删除。(4) According to the redundancy capability n-r of the secret sharing algorithm, delete the data on the number of solid-state disks that destroy the redundancy capability n-r, so as to complete the safe deletion of the data.

作为进一步优选的,所述步骤(1)包括:As further preferred, described step (1) comprises:

(1-1)利用哈希函数H对源数据进行处理,得到源数据D的哈希值h=H(D);(1-1) Use the hash function H to process the source data to obtain the hash value h=H(D) of the source data D;

(1-2)将h作为密钥,对与D相同大小的恒定值块C利用加密函数E()进行加密,得到E(h,C);(1-2) Using h as the key, encrypt the constant value block C of the same size as D using the encryption function E() to obtain E(h, C);

(1-3)将源数据D与E(h,C)进行异或运算,得到封装数据的头部X,(1-3) XOR the source data D and E(h, C) to obtain the header X of the encapsulated data,

(1-4)利用哈希函数H对封装数据的头部X进行处理,得到H(X),将源数据D的哈希值h与H(X)进行异或运算,得到封装数据的尾部t,进一步得到源数据D的封装转换后数据(X,t)。(1-4) Use the hash function H to process the header X of the encapsulated data to obtain H(X), and perform XOR operation on the hash value h of the source data D and H(X) to obtain the tail of the encapsulated data t, The encapsulated and transformed data (X, t) of the source data D is further obtained.

作为进一步优选的,所述步骤(2)包括:As further preferred, described step (2) comprises:

(2-1)将封装转换后数据(X,t)均分为k等份,标识为S0,S1,…Sk-1(2-1) Divide the encapsulated and converted data (X, t) into k equal parts, and identify them as S0 , S1 , . . . Sk-1 ;

(2-2)采用冗余编码算法对S0,S1,…Sk-1进行编码,生成n个冗余编码后数据。(2-2) Encode S0 , S1 , ... Sk-1 by using a redundant encoding algorithm to generate n redundant encoded data.

作为进一步优选的,所述固态盘包括:多个相互独立的闪存固态盘;以及阵列控制器,用于在各个固态盘之间进行总线调度,对各个固态盘进行直接控制。As a further preferred option, the solid-state disk includes: a plurality of mutually independent flash solid-state disks; and an array controller configured to perform bus scheduling among the solid-state disks and directly control each of the solid-state disks.

作为进一步优选的,当所述固态盘阵列中单个或多个固态盘的部分数据丢失时,只要剩下固态盘的数据冗余能力n-r没被破坏,可选择执行数据重构程序,对丢失的数据进行重构恢复。As a further preference, when part of the data of a single or multiple solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability n-r of the remaining solid-state disks is not destroyed, a data reconstruction program can be selected to execute the data reconstruction program to restore the lost data. The data is reconstructed and restored.

作为进一步优选的,对固态盘上数据的删除可采取全零覆写物理页的方式进行。As a further preference, the deletion of data on the solid state disk may be performed by overwriting the physical page with all zeros.

作为进一步优选的,所述达到破坏冗余能力n-r的固态盘数目上的数据删除具体为:从物理介质上删除或覆盖属于同一源数据编码分发到n-r个固态盘上的数据,且通过剩余固态盘上的数据无法对丢失的数据进行重构恢复。As a further preference, the data deletion on the number of solid-state disks that can destroy the redundancy capability of n-r is specifically: deleting or overwriting from the physical medium the data encoded and distributed to the n-r solid-state disks belonging to the same source, and using the remaining solid-state disks The data on the disk cannot be reconstructed to restore the lost data.

总体而言,通过本发明所构思的以上技术方案与现有技术相比,能够取得下列有益效果:In general, compared with the prior art, the above technical solutions conceived by the present invention can achieve the following beneficial effects:

(1)本发明解决了现有技术中由于固态盘的异地更新特性导致固态盘阵列中的数据无法安全删除的问题,一方面,采用了秘密共享算法来保障数据的可靠性和安全性,大大提升了存储空间利用率;另一方面,利用冗余编码的特性,对数据的删除不再需要对整个数据进行覆盖写,而是删除部分数据块来保证数据无法恢复,破坏了数据的完整性,删除过程减小了擦除开销以及对固态盘的磨损。(1) The present invention solves the problem in the prior art that the data in the solid-state disk array cannot be safely deleted due to the off-site update characteristics of the solid-state disk. On the one hand, the secret sharing algorithm is adopted to ensure the reliability and security of the data, greatly Improve the utilization of storage space; on the other hand, using the feature of redundant coding, the deletion of data no longer requires overwriting the entire data, but deletes some data blocks to ensure that the data cannot be recovered, destroying the integrity of the data , the deletion process reduces the erasure overhead and wear on the SSD.

(2)本发明对数据进行冗余编码,通过在编码前采取特殊的数据转换处理,增强数据隐私保护,利用冗余编码的特性,破坏数据完整性,残余数据被加密保护,即使攻击者得到数据,也不能获取明文,达到数据安全删除的目的。(2) The present invention performs redundant encoding on the data. By adopting special data conversion processing before encoding, data privacy protection is enhanced, and the characteristics of redundant encoding are used to destroy data integrity. The residual data is encrypted and protected, even if the attacker obtains The data cannot be obtained in plaintext, so as to achieve the purpose of safe data deletion.

(3)本发明利用固态盘阵列中固态盘可并行操作的特点,采用秘密共享算法对数据编码,当固态盘阵列中单个或多个固态盘上的部分数据丢失时,通过执行数据重构程序,对丢失的数据进行重构恢复,提升了固态盘阵列中数据的可靠性。(3) The present invention utilizes the feature that solid-state disks in the solid-state disk array can operate in parallel, and uses a secret sharing algorithm to encode data. When part of the data on a single or multiple solid-state disks in the solid-state disk array is lost, the data reconstruction program is executed. , reconstructing and restoring the lost data, improving the reliability of the data in the SSD array.

(4)打破常规思维。传统方案中冗余技术是用来保障数据可靠性,在本发明中利用其数据冗余能力被破坏后数据不可获取的特性,实现了数据安全删除。(4) Break the conventional thinking. In the traditional scheme, the redundancy technology is used to ensure the reliability of the data. In the present invention, the data security deletion is realized by utilizing the feature that the data cannot be obtained after the data redundancy capability is destroyed.

附图说明Description of drawings

图1为本发明的固态盘阵列的硬件结构图;Fig. 1 is the hardware structure diagram of the solid state disk array of the present invention;

图2为本发明的基于固态盘阵列的数据安全删除方法流程图;Fig. 2 is the flow chart of the data security deletion method based on solid state disk array of the present invention;

图3为本发明实施例的基于固态盘阵列的数据安全删除方法流程图;3 is a flowchart of a method for securely deleting data based on a solid-state disk array according to an embodiment of the present invention;

图4为本发明实施例的数据转换及编码过程示意图。FIG. 4 is a schematic diagram of a data conversion and encoding process according to an embodiment of the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。此外,下面所描述的本发明各个实施方式中所涉及到的技术特征只要彼此之间未构成冲突就可以相互组合。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

图1为本发明的固态盘阵列的硬件结构图。其中阵列控制器在各个固态盘之间进行总线调度,对固态盘进行直接控制,各固态盘内部有自己的控制器,同时使用ECC控制器对所有的写数据生成ECC(Error CorrectingCode,错误纠正码),并对所有读数据进行ECC检测与纠错。从硬件结构上看,固态盘阵列可以通过多个固态盘并行操作,来达到极高的数据吞吐率,并且在各固态盘内部可以通过对多个数据通道进行并行操作,使数据传输率接近通道的最大传输速度。FIG. 1 is a hardware structure diagram of the solid state disk array of the present invention. The array controller performs bus scheduling between each solid-state disk and directly controls the solid-state disk. Each solid-state disk has its own controller. At the same time, the ECC controller is used to generate ECC (Error Correcting Code, Error Correcting Code) for all write data. ), and perform ECC detection and error correction on all read data. From the perspective of hardware structure, the solid-state disk array can achieve extremely high data throughput through the parallel operation of multiple solid-state disks, and multiple data channels can be operated in parallel inside each solid-state disk to make the data transmission rate close to the channel. maximum transfer speed.

图2为本发明的基于固态盘阵列的数据安全删除方法流程图,所述方法包括以下步骤:2 is a flowchart of a method for securely deleting data based on a solid-state disk array of the present invention, and the method includes the following steps:

(1)对源数据D进行封装转换,包括哈希(hash)操作和加密操作;(1) Encapsulate and convert the source data D, including hash operation and encryption operation;

步骤(1)中所述封装转换,具体包括以下步骤:The encapsulation conversion described in step (1) specifically includes the following steps:

(1-1)利用哈希函数H对源数据进行处理,得到源数据D的哈希值h=H(D);(1-1) Use the hash function H to process the source data to obtain the hash value h=H(D) of the source data D;

(1-2)将h作为密钥,对与D相同大小的恒定值块C利用加密函数E()进行加密,得到E(h,C);(1-2) Using h as the key, encrypt the constant value block C of the same size as D using the encryption function E() to obtain E(h, C);

(1-3)将源数据D与E(h,C)进行异或运算,得到封装数据的头部X,(1-3) XOR the source data D and E(h, C) to obtain the header X of the encapsulated data,

(1-4)利用哈希函数H对封装数据的头部X进行处理,得到H(X),将源数据D的哈希值h与H(X)进行异或运算,得到封装数据的尾部t,进一步得到源数据D的封装转换后数据(X,t)。(1-4) Use the hash function H to process the header X of the encapsulated data to obtain H(X), and perform XOR operation on the hash value h of the source data D and H(X) to obtain the tail of the encapsulated data t, The encapsulated and transformed data (X, t) of the source data D is further obtained.

(2)对步骤(1)中所得到的封装转换后的数据,采用秘密共享算法进行冗余编码;(2) to the data after the encapsulation conversion obtained in step (1), adopt the secret sharing algorithm to carry out redundant coding;

其中,秘密共享算法(secret sharing)将输入数据秘密(secret)转换成编码后的输出数据份额(shares),目的在于保障秘密的容错性和保密性。秘密共享算法通过三个参数(n,k,r)进行定义:该算法将秘密编码为n个份额(n>k>r≥0)(i)秘密可以通过任何k个份额进行重构,(ii)秘密不能通过任何r个份额推断出来。参数(n,k,r)决定了秘密共享算法的保护强度。特别的,n和k决定了秘密的容错能力,只要任何k个份额存在,秘密就可以被访问。也就是说,它允许丢失n-k个份额。参数r决定秘密的机密度,只要少于r个份额被攻击者获取,那么秘密就是安全的。Among them, the secret sharing algorithm (secret sharing) converts the input data secret (secret) into the encoded output data share (shares), the purpose is to ensure the fault tolerance and confidentiality of the secret. The secret sharing algorithm is defined by three parameters (n, k, r): the algorithm encodes the secret into n shares (n > k > r ≥ 0) (i) the secret can be reconstructed by any k shares, ( ii) The secret cannot be inferred from any r shares. The parameters (n, k, r) determine the protection strength of the secret sharing algorithm. In particular, n and k determine the fault tolerance of the secret, which can be accessed as long as any k shares exist. That is, it allows n-k shares to be lost. The parameter r determines the confidentiality of the secret. As long as less than r shares are obtained by the attacker, the secret is secure.

所述步骤(2)具体包括:The step (2) specifically includes:

(2-1)将封装转换后数据(X,t)均分为k等份,标识为S0,S1,…Sk-1(2-1) Divide the encapsulated and converted data (X, t) into k equal parts, and identify them as S0 , S1 , . . . Sk-1 ;

(2-2)采用冗余编码算法对S0,S1,…Sk-1进行编码,生成n个冗余编码后数据。(2-2) Encode S0 , S1 , ... Sk-1 by using a redundant encoding algorithm to generate n redundant encoded data.

(3)将冗余编码后的数据分别存放到固态盘阵列中的多个固态盘上;(3) storing the redundantly encoded data on a plurality of solid-state disks in the solid-state disk array;

当所述固态盘阵列中单个或多个固态盘的部分数据丢失时,只要剩下固态盘的数据冗余能力没被破坏,可选择执行数据重构程序,对丢失的数据进行重构恢复。When part of data of single or multiple solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability of the remaining solid-state disks is not damaged, a data reconstruction program can be selected to perform reconstruction and recovery of the lost data.

(4)当执行数据的安全删除时根据所述秘密共享算法的冗余能力,将达到破坏冗余能力的固态盘数目上的数据进行删除。(4) When performing safe deletion of data, according to the redundancy capability of the secret sharing algorithm, delete the data on the number of solid-state disks that destroy the redundancy capability.

这里,对固态盘上数据的删除可采取全零覆写物理页的方式进行。Here, the deletion of data on the solid state disk may be performed by overwriting the physical page with all zeros.

图3为本发明实施例的基于固态盘阵列的数据安全删除方法流程图,具体包括以下步骤:3 is a flowchart of a method for securely deleting data based on a solid-state disk array according to an embodiment of the present invention, which specifically includes the following steps:

(10)将源数据标记为D,即为数据初始状态;(10) Mark the source data as D, which is the initial state of the data;

(20)对步骤(10)中所述数据进行封装,将D作为哈希函数H的输入值,产生一个哈希值h,即h=H(D),标记为(D,h);(20) Encapsulate the data described in step (10), use D as the input value of the hash function H, and generate a hash value h, that is, h=H(D), marked as (D, h);

(30)将源数据D与E(h,C)进行异或运算,得到数据封装的头部X,其中,为异或操作,C为与D相同大小的恒定值块,E是将h作为密钥加密C的一种加密函数;(30) XOR the source data D and E(h, C) to obtain the header X of the data encapsulation, in, is an XOR operation, C is a constant value block of the same size as D, and E is an encryption function that uses h as a key to encrypt C;

(40)数据封装的尾部为t,数据最终封装为(X,t);(40) The tail of the data package is t, The data is finally encapsulated as (X, t);

(50)将步骤(40)中的(X,t)均分为k等份,标识为S0,S1,…Sk-1,k=1,2,...,K;(50) Divide (X, t) in step (40) into k equal parts, which are marked as S0 , S1 ,...Sk-1 , k=1,2,...,K;

(60)采用冗余编码算法对S0,S1,…Sk-1进行编码计算,产生n个等份F0,F1,…Fn-1,分别存放到固态盘阵列的n个固态盘上,n=1,2,...,N,本实施例中采用系统纠删码;(60) Use the redundant coding algorithm to perform coding calculation on S0 , S1 ,...Sk-1 , and generate n equal parts F0 , F1 ,... Fn-1 , which are respectively stored in n pieces of the solid-state disk array On the solid-state disk, n=1, 2,...,N, and a system erasure code is used in this embodiment;

(70)当执行数据的安全删除时根据所述冗余编码的冗余能力,将达到破坏冗余能力的(n-r)个固态盘数目上的数据进行删除,其中r=k-1。(70) When performing safe deletion of data, delete the data on the number of (n-r) solid-state disks that destroy the redundancy according to the redundancy capability of the redundancy code, where r=k-1.

图4为本发明实施例的数据转换及编码过程示意图。该实施例中,以n=4,k=3,r=2为例。将源数据D作为哈希函数H(如SHA-256)的输入,得到一个哈希值h,h=H(D);为了得到高安全性,我们将(D,h)转换成(X,t),其中C为与D相同大小的恒定值块,E为加密函数(如,AES-256),h作为密钥对C进行加密,h’=H(X);最后将(X,t)均分成3等份,使用Reed-Solomon码对数据编码,产生4个份额。根据该编码的特性,通过2个份额是无法推断出源数据的,故当执行数据安全删除时,破坏其中两个份额即可,剩下的份额已被加密保护,达到数据安全删除的目的。FIG. 4 is a schematic diagram of a data conversion and encoding process according to an embodiment of the present invention. In this embodiment, n=4, k=3, r=2 as an example. The source data D is used as the input of the hash function H (such as SHA-256), and a hash value h is obtained, h=H(D); in order to obtain high security, we convert (D, h) into (X, t), where C is a constant value block of the same size as D, E is an encryption function (eg, AES-256), h is used as a key to encrypt C, h'=H(X); finally divide (X, t) into 3 equal parts, use Reed-Solomon code to encode the data, and generate 4 parts. According to the characteristics of this code, the source data cannot be inferred from two shares, so when performing data security deletion, it is enough to destroy two of the shares, and the remaining shares have been encrypted and protected to achieve the purpose of data security deletion.

本领域的技术人员容易理解,以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。Those skilled in the art can easily understand that the above are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention, etc., All should be included within the protection scope of the present invention.

Claims (7)

CN201810961762.6A2018-08-222018-08-22 A data security deletion method based on solid state disk arrayPendingCN109324756A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810961762.6ACN109324756A (en)2018-08-222018-08-22 A data security deletion method based on solid state disk array

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810961762.6ACN109324756A (en)2018-08-222018-08-22 A data security deletion method based on solid state disk array

Publications (1)

Publication NumberPublication Date
CN109324756Atrue CN109324756A (en)2019-02-12

Family

ID=65264254

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810961762.6APendingCN109324756A (en)2018-08-222018-08-22 A data security deletion method based on solid state disk array

Country Status (1)

CountryLink
CN (1)CN109324756A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110058820A (en)*2019-04-232019-07-26武汉汇迪森信息技术有限公司Data safety write-in, deletion, read method and device based on Solid-state disc array
CN112242878A (en)*2019-07-172021-01-19丁爱民Erasure code data segmentation security method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102023815A (en)*2009-09-152011-04-20格雷戈里·伯德Implementing RAID in solid state memory
CN105608394A (en)*2015-12-222016-05-25华中科技大学Secure deletion method for data in solid-state disk on basis of flash memory
KR20180070526A (en)*2015-11-022018-06-26조진영Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102023815A (en)*2009-09-152011-04-20格雷戈里·伯德Implementing RAID in solid state memory
KR20180070526A (en)*2015-11-022018-06-26조진영Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function
CN105608394A (en)*2015-12-222016-05-25华中科技大学Secure deletion method for data in solid-state disk on basis of flash memory

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110058820A (en)*2019-04-232019-07-26武汉汇迪森信息技术有限公司Data safety write-in, deletion, read method and device based on Solid-state disc array
CN112242878A (en)*2019-07-172021-01-19丁爱民Erasure code data segmentation security method and device
CN112242878B (en)*2019-07-172023-07-21丁爱民Erasure code data segmentation security method and device

Similar Documents

PublicationPublication DateTitle
CN105608394B (en)A kind of data safety delet method of the solid-state disk based on flash memory
US11233643B1 (en)Distributed data storage system data decoding and decryption
US10642522B2 (en)Method and system for in-line deduplication in a storage drive based on a non-collision hash
CN105282171B (en)A kind of safe and reliable distributed cloud storage method
US9740403B2 (en)Methods for managing storage in a data storage cluster with distributed zones based on parity values and devices thereof
US8744071B2 (en)Dispersed data storage system data encryption and encoding
US9483656B2 (en)Efficient and secure data storage utilizing a dispersed data storage system
US8135958B2 (en)Method, system, and apparatus for dynamically validating a data encryption operation
EP2588961B1 (en)Method and system to improve the performance and/or reliability of a solid-state drive
US8656187B2 (en)Dispersed storage secure data decoding
US9626517B2 (en)Non-deterministic encryption
US20120047339A1 (en)Redundant array of independent clouds
CN108701197A (en) Secure Slicing with Efficient Secret Key Encryption
US11423158B2 (en)Dynamic compression with dynamic multi-stage encryption for a data storage system
CN103118089A (en)Safe storage method based on a plurality of cloud storage systems and system thereof
WO2014056381A1 (en)Data redundancy implementation method and device
KR20220021186A (en)Apparatus and method for sharing data in a data processing system
US20190087587A1 (en)Method and system for data destruction in a phase change memory-based storage device
US11991280B2 (en)Randomized transforms in a dispersed data storage system
JP2020038650A (en)Vector processor storage
US9235532B2 (en)Secure storage of full disk encryption keys
CN107977285A (en)A kind of data modification method, device and the medium of correcting and eleting codes memory mechanism
CN109324756A (en) A data security deletion method based on solid state disk array
US10802958B2 (en)Storage device, its controlling method, and storage system having the storage device
US20190073318A1 (en)Secured Access Control In A Storage System

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190212


[8]ページ先頭

©2009-2025 Movatter.jp