CN109324756A - A kind of data safety delet method based on Solid-state disc array - Google Patents
A kind of data safety delet method based on Solid-state disc array Download PDFInfo
- Publication number
- CN109324756A CN109324756A CN201810961762.6A CN201810961762A CN109324756A CN 109324756 A CN109324756 A CN 109324756A CN 201810961762 A CN201810961762 A CN 201810961762A CN 109324756 A CN109324756 A CN 109324756A
- Authority
- CN
- China
- Prior art keywords
- data
- solid
- state disks
- state
- deleting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012217 deletion Methods 0.000 claims abstract description 19
- 230000037430 deletion Effects 0.000 claims abstract description 19
- 238000006243 chemical reaction Methods 0.000 claims abstract description 14
- 239000007787 solid Substances 0.000 claims description 21
- 230000006870 function Effects 0.000 claims description 13
- 238000005538 encapsulation Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 8
- 230000001066 destructive effect Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 6
- 238000013500 data storage Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 229910052739 hydrogen Inorganic materials 0.000 description 3
- 238000004806 packaging method and process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000005299 abrasion Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
- G06F11/108—Parity data distribution in semiconductor storages, e.g. in SSD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
- G06F3/0641—De-duplication techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0683—Plurality of storage devices
- G06F3/0688—Non-volatile semiconductor memory arrays
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data safety delet method based on Solid-state disc array, using solid-state disks multiple in Solid-state disc array can parallel work-flow the characteristics of, conversion process is carried out to data using privacy sharing algorithm, by the data distribution after coding to each solid-state disk, on the one hand, coding guarantees data redundancy, and the data after convert is ciphertexts, raising data reliability and safety;On the other hand, it using the characteristic of fault-tolerant encoding, no longer needs to carry out entire data covering to the deletion of data and writes, but delete partial data, destroy data integrity, restore data can not.It even if attacker obtains code segment data, can not obtain in plain text, achieve the purpose that data safety is deleted.The present invention solve the problems, such as the storage of Solid-state disc array is unreliable, file can not the data storage securities such as safety deleting.
Description
Technical Field
The invention belongs to the technical field of computer data storage, and particularly relates to a data security deletion method based on a solid-state disk array.
Background
Flash-based Solid State Disks (SSDs) are now a powerful replacement for magnetic disks and have gained widespread attention in both academia and industry. Solid state disks are increasingly being used in server and enterprise level data storage systems, in addition to desktop machines. In an enterprise-level data storage system, a single solid state disk obviously cannot meet the requirements of services on the capacity, performance and reliability of the storage system. Therefore, applying a disk array (RAID) algorithm to a solid-state disk storage system, it is necessary to construct a storage system with large capacity, high performance, and high reliability, i.e., a solid-state disk array. Similar to RAID, the performance of a solid state disk array is also affected by the worst performing member disk in the array. Thus, the unreliability of a single solid state disk will cause the array of solid state disks to exhibit severe performance fluctuations.
The solid state disks in the solid state disk array are internally updated in different places, and when a user uses security software to safely delete files in the solid state disks, all the covering operations of target data are transferred to new free physical pages. Thus, sensitive target data is not physically overwritten or erased, but merely marked as invalid data within the solid state disk. That is, the file contents still exist in the flash memory. All changes are only that data of a target file cannot be read from an original logical address, such deleted data is easy to recover, and the security of the data cannot be guaranteed.
The method has two problems for a flash memory type memory, namely ① the method needs to be completed by write operation, but the write operation process in the flash memory is complicated, time consumption is long, and time cost is large, ② the memory keeps redundant blocks for backup in consideration of the life and wear balance of the flash memory, and the method can cause data to remain in the backup blocks in the use process.
Disclosure of Invention
Aiming at the defects or the improvement requirements of the prior art, the invention provides a data security deletion method based on a solid-state disk array, which introduces the basic principle of a secret sharing mechanism into the data security deletion method, destroys the redundancy capability of each solid-state disk data in the solid-state disk array, combines data conversion processing operation, encrypts the residual data after destroying the integrity of the data, and can not obtain the plaintext even if an attacker obtains partial encoded data, thereby achieving the purpose of safely deleting the data.
In order to achieve the above object, the present invention provides a method for safely deleting data based on a solid state disk array, where the method includes:
(1) performing encapsulation conversion on the source data D to obtain encapsulated and converted data (X, t), wherein X is a head part and t is a tail part;
(2) and (2) carrying out redundant coding on the packaged converted data (X, t) obtained in the step (1) through a secret sharing algorithm (n, k, r) to obtain n pieces of coded data, wherein n is the share quantity of the output data coded by the secret sharing algorithm, k is the share quantity of the secret which can be reconstructed, r is the share quantity of the secret which can not be reconstructed, and n > k > r is not less than 0.
(3) Respectively storing the n coded data obtained in the step (2) to n solid-state disks in a solid-state disk array;
(4) and deleting the data on the number of the solid-state disks which destroy the redundancy capability n-r according to the redundancy capability n-r of the secret sharing algorithm, namely finishing the safe deletion of the data.
As a further preferred, the step (1) comprises:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) using h as a key, and encrypting a constant value block C with the same size as D by using an encryption function E () to obtain E (h, C);
(1-3) carrying out XOR operation on the source data D and the source data E (h, C) to obtain a head X of the encapsulation data,
(1-4) processing the head X of the encapsulated data by using a hash function H to obtain H (X), carrying out XOR operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data,further obtaining the encapsulated converted data (X, t) of the source data D.
As a further preferred, the step (2) includes:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k, and marking the equal parts as S0,S1,…Sk-1;
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
As a further preference, the solid state disk comprises: a plurality of mutually independent flash memory solid-state disks; and the array controller is used for carrying out bus scheduling among the solid-state disks and directly controlling the solid-state disks.
As a further preference, when part of data of one or more solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability n-r of the remaining solid-state disks is not damaged, a data reconstruction program can be selected to perform reconstruction recovery on the lost data.
As a further preference, the deletion of data on the solid-state disk may be performed in such a way that physical pages are overwritten with all zeros.
Preferably, the data deletion on the number of solid state disks reaching the destructive redundancy capability n-r is specifically: and deleting or overwriting data which belong to the same source data code and are distributed to n-r solid-state disks from the physical medium, and reconstructing and recovering the lost data through the data on the rest solid-state disks.
In general, compared with the prior art, the above technical solution contemplated by the present invention can achieve the following beneficial effects:
(1) the invention solves the problem that the data in the solid-state disk array can not be safely deleted due to the remote updating characteristic of the solid-state disk in the prior art, on one hand, the reliability and the safety of the data are ensured by adopting a secret sharing algorithm, and the utilization rate of a storage space is greatly improved; on the other hand, by utilizing the characteristic of redundant coding, the deletion of the data does not need to overwrite the whole data, but deletes a part of data blocks to ensure that the data cannot be recovered, the integrity of the data is damaged, and the erasing expense and the abrasion of the solid-state disk are reduced in the deleting process.
(2) The invention carries out redundant coding on the data, enhances the data privacy protection by adopting special data conversion processing before coding, destroys the data integrity by utilizing the characteristic of the redundant coding, and carries out encryption protection on the residual data, so that even if an attacker obtains the data, the attacker can not obtain the plaintext, thereby achieving the purpose of safely deleting the data.
(3) The method and the device utilize the characteristic that the solid-state disks in the solid-state disk array can be operated in parallel, adopt the secret sharing algorithm to encode the data, and when partial data on a single solid-state disk or a plurality of solid-state disks in the solid-state disk array is lost, reconstruct and recover the lost data by executing a data reconstruction program, thereby improving the reliability of the data in the solid-state disk array.
(4) Breaking the conventional thinking. In the invention, the data is safely deleted by utilizing the characteristic that data is unavailable after the data redundancy capability is damaged.
Drawings
FIG. 1 is a hardware block diagram of a solid state disk array of the present invention;
FIG. 2 is a flow chart of a method for safely deleting data based on a solid state disk array according to the present invention;
FIG. 3 is a flowchart of a method for securely deleting data based on a solid-state disk array according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating a data conversion and encoding process according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Fig. 1 is a hardware configuration diagram of a solid-state disk array of the present invention. The array controller performs bus scheduling among the solid-state disks, directly controls the solid-state disks, has a controller in each solid-state disk, and simultaneously generates an Error Correcting Code (ECC) for all write data by using the ECC controller, and performs ECC detection and Error correction for all read data. From the aspect of hardware structure, the solid-state disk array can achieve extremely high data throughput rate by parallel operation of a plurality of solid-state disks, and can enable the data transmission rate to approach the maximum transmission speed of the channel by parallel operation of a plurality of data channels inside each solid-state disk.
Fig. 2 is a flowchart of a method for safely deleting data based on a solid-state disk array according to the present invention, where the method includes the following steps:
(1) performing encapsulation conversion on the source data D, wherein the encapsulation conversion comprises hash (hash) operation and encryption operation;
the packaging conversion in the step (1) specifically comprises the following steps:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) using h as a key, and encrypting a constant value block C with the same size as D by using an encryption function E () to obtain E (h, C);
(1-3) carrying out XOR operation on the source data D and the source data E (h, C) to obtain a head X of the encapsulation data,
(1-4) processing the head X of the encapsulated data by using a hash function H to obtain H (X), carrying out XOR operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data,further obtaining the encapsulated converted data (X, t) of the source data D.
(2) Performing redundant coding on the data obtained in the step (1) after packaging conversion by adopting a secret sharing algorithm;
wherein, secret sharing algorithm (secret sharing) converts the input data secret (secret) into the encoded output data shares (shares), aiming at ensuring the fault tolerance and confidentiality of the secret. The secret sharing algorithm is defined by three parameters (n, k, r): the algorithm encodes the secret into n shares (n > k > r ≧ 0) (i) the secret can be reconstructed by any k shares, and (ii) the secret cannot be inferred by any r shares. The parameters (n, k, r) determine the protection strength of the secret sharing algorithm. In particular, n and k determine the fault tolerance of the secret, which can be accessed as long as any k shares exist. That is, it allows n-k shares to be lost. The parameter r determines the machine density of the secret, which is secure as long as less than r shares are obtained by an attacker.
The step (2) specifically comprises:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k, and marking the equal parts as S0,S1,…Sk-1;
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
(3) Respectively storing the data subjected to redundancy coding on a plurality of solid-state disks in a solid-state disk array;
when part of data of one or more solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability of the remaining solid-state disks is not damaged, a data reconstruction program can be selected to perform reconstruction recovery on the lost data.
(4) And when the safe deletion of the data is executed, deleting the data on the number of the solid-state disks which reach the capacity of destroying the redundancy according to the redundancy capacity of the secret sharing algorithm.
Here, the deletion of data on the solid-state disk may be performed in such a manner that physical pages are overwritten with all zeros.
Fig. 3 is a flowchart of a method for safely deleting data based on a solid-state disk array according to an embodiment of the present invention, which specifically includes the following steps:
(10) marking the source data as D, namely, the source data is in a data initial state;
(20) packaging the data in the step (10), using D as an input value of a hash function H, generating a hash value H, namely H ═ H (D), and marking as (D, H);
(30) performing XOR operation on the source data D and the source data E (h, C) to obtain a data-encapsulated head X,wherein,for exclusive-or operation, C is a constant value block of the same size as D, E is an encryption function that encrypts C with h as the key;
(40) the tail of the data encapsulation is t,the data is finally encapsulated as (X, t);
(50) dividing (X, t) in the step (40) into k equal parts, and marking as S0,S1,…Sk-1,k=1,2,...,K;
(60) Using redundant coding algorithm to pair S0,S1,…Sk-1Performing coding calculation to generate n equal parts F0,F1,…Fn-1The method includes the steps of storing the data on N solid-state disks of a solid-state disk array, wherein N is 1, 2.
(70) And when the safe deletion of the data is executed, deleting the data on the number of (n-r) solid-state disks which reach the capacity of destroying the redundancy according to the redundancy capacity of the redundancy code, wherein r-k-1.
FIG. 4 is a diagram illustrating a data conversion and encoding process according to an embodiment of the present invention. In this embodiment, n is 4, k is 3, and r is 2. Taking the source data D as an input of a hash function H (such as SHA-256) to obtain a hash value H, H ═ H (D); to obtain high security, we convert (D, h) to (X, t), whereC is a constant value block of the same size as D, E is an encryption function (e.g., AES-256), h is used as a key to encrypt C,h' ═ h (x); finally (X, t) is divided equally into 3Equal parts, encoding the data using Reed-Solomon codes, yielding 4 shares. According to the characteristics of the code, the source data cannot be deduced through 2 shares, so that when data security deletion is performed, two shares of the data security deletion are destroyed, and the rest shares are protected by encryption, so that the purpose of data security deletion is achieved.
It will be understood by those skilled in the art that the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the invention, and that any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (7)
1. A data security deletion method based on a solid-state disk array is characterized by comprising the following steps:
(1) performing encapsulation conversion on the source data D to obtain encapsulated and converted data (X, t);
wherein X is the head and t is the tail;
(2) performing redundant coding on the encapsulated converted data (X, t) by a secret sharing algorithm (n, k, r) to obtain n coded data;
wherein n is the share number of the output data after being coded by the secret sharing algorithm, k is the share number of the secret which can be reconstructed, r is the share number of the secret which can not be reconstructed, and n > k > r is more than or equal to 0;
(3) respectively storing the n coded data to n solid-state disks in a solid-state disk array;
(4) and according to the redundancy capability n-r of the secret sharing algorithm, deleting the data on the number of the solid-state disks which destroy the redundancy capability n-r, thereby realizing the safe deletion of the data.
2. The method for securely deleting data according to claim 1, wherein the step (1) comprises:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) encrypting a constant value block C with the same size as D by using h as a key by using an encryption function E () to obtain E (h, C);
(1-3) performing exclusive-or operation on the source data D and E (h, C) to obtain a header X, X ═ D ⊕ E (h, C) of the encapsulated data;
(1-4) processing the header X of the encapsulated data by using a hash function H to obtain H (X), performing exclusive or operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data, wherein t is H ⊕ H (X), and further obtaining encapsulated converted data (X, t) of the source data D.
3. The method for securely deleting data according to claim 1, wherein the step (2) comprises:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k which are respectively marked as S0,S1,…Sk-1;
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
4. A method for the secure deletion of data according to any of claims 1 to 3, wherein the solid state disk array comprises:
a plurality of mutually independent flash memory solid-state disks; and
and the array controller is used for carrying out bus scheduling among the solid-state disks and directly controlling the solid-state disks.
5. The method for safely deleting data as claimed in claim 4, wherein when part of data of one or more solid state disks in the solid state disk array is lost, the data reconstruction program can be selectively executed to reconstruct and recover the lost data as long as the data redundancy capability n-r of the remaining solid state disks is not damaged.
6. A method for safely deleting data as claimed in any one of claims 1 to 5, wherein the deletion of data on the solid state disk can be performed by overwriting a physical page with all zeros.
7. The method for safely deleting data according to any one of claims 1 to 6, wherein the data deletion on the number of solid state disks reaching the destructive redundancy capability n-r is specifically: and deleting or overwriting data which belong to the same source data code and are distributed to n-r solid-state disks from the physical medium, and reconstructing and recovering the lost data through the data on the rest solid-state disks.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810961762.6A CN109324756A (en) | 2018-08-22 | 2018-08-22 | A kind of data safety delet method based on Solid-state disc array |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810961762.6A CN109324756A (en) | 2018-08-22 | 2018-08-22 | A kind of data safety delet method based on Solid-state disc array |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109324756A true CN109324756A (en) | 2019-02-12 |
Family
ID=65264254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810961762.6A Pending CN109324756A (en) | 2018-08-22 | 2018-08-22 | A kind of data safety delet method based on Solid-state disc array |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109324756A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110058820A (en) * | 2019-04-23 | 2019-07-26 | 武汉汇迪森信息技术有限公司 | Data safety write-in, deletion, read method and device based on Solid-state disc array |
CN112242878A (en) * | 2019-07-17 | 2021-01-19 | 丁爱民 | Erasure code data segmentation security method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102023815A (en) * | 2009-09-15 | 2011-04-20 | 格雷戈里·伯德 | Implementing RAID in solid state memory |
CN105608394A (en) * | 2015-12-22 | 2016-05-25 | 华中科技大学 | Secure deletion method for data in solid-state disk on basis of flash memory |
KR20180070526A (en) * | 2015-11-02 | 2018-06-26 | 조진영 | Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function |
-
2018
- 2018-08-22 CN CN201810961762.6A patent/CN109324756A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102023815A (en) * | 2009-09-15 | 2011-04-20 | 格雷戈里·伯德 | Implementing RAID in solid state memory |
KR20180070526A (en) * | 2015-11-02 | 2018-06-26 | 조진영 | Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function |
CN105608394A (en) * | 2015-12-22 | 2016-05-25 | 华中科技大学 | Secure deletion method for data in solid-state disk on basis of flash memory |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110058820A (en) * | 2019-04-23 | 2019-07-26 | 武汉汇迪森信息技术有限公司 | Data safety write-in, deletion, read method and device based on Solid-state disc array |
CN112242878A (en) * | 2019-07-17 | 2021-01-19 | 丁爱民 | Erasure code data segmentation security method and device |
CN112242878B (en) * | 2019-07-17 | 2023-07-21 | 丁爱民 | Erasure code data segmentation security method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11233643B1 (en) | Distributed data storage system data decoding and decryption | |
CN105608394B (en) | A kind of data safety delet method of the solid-state disk based on flash memory | |
US9483656B2 (en) | Efficient and secure data storage utilizing a dispersed data storage system | |
US8744071B2 (en) | Dispersed data storage system data encryption and encoding | |
US8656187B2 (en) | Dispersed storage secure data decoding | |
US8135958B2 (en) | Method, system, and apparatus for dynamically validating a data encryption operation | |
US9996413B2 (en) | Ensuring data integrity on a dispersed storage grid | |
US9092439B2 (en) | Virtualized data storage vaults on a dispersed data storage network | |
CN103118089A (en) | Safe storage method based on a plurality of cloud storage systems and system thereof | |
US9465692B2 (en) | High reliability erasure code distribution | |
CN108197484B (en) | Method for realizing node data security in distributed storage environment | |
US20090080659A1 (en) | Systems and methods for hardware key encryption | |
CN104331345B (en) | A kind of data reconstruction method | |
US9235532B2 (en) | Secure storage of full disk encryption keys | |
US10496829B2 (en) | Method and system for data destruction in a phase change memory-based storage device | |
CN109324756A (en) | A kind of data safety delet method based on Solid-state disc array | |
CN110058820B (en) | Data safe writing, deleting and reading method and device based on solid-state disk array | |
CN104484126A (en) | Safe data deleting method and system based on erasure codes | |
US11991280B2 (en) | Randomized transforms in a dispersed data storage system | |
US12061519B2 (en) | Reconstructing data segments in a storage network and methods for use therewith | |
US9450617B2 (en) | Distribution and replication of erasure codes | |
Fu et al. | A scheme of data confidentiality and fault-tolerance in cloud storage | |
Rashid et al. | Proof of retrieval and ownership protocols for enterprise-level data deduplication | |
JP7428335B1 (en) | Secret sharing method, secret sharing system, secret sharing program | |
TWM651394U (en) | Shared encrypted fault-tolerant backup device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190212 |
|
RJ01 | Rejection of invention patent application after publication |