CN109324756A - A kind of data safety delet method based on Solid-state disc array - Google Patents

A kind of data safety delet method based on Solid-state disc array Download PDF

Info

Publication number
CN109324756A
CN109324756A CN201810961762.6A CN201810961762A CN109324756A CN 109324756 A CN109324756 A CN 109324756A CN 201810961762 A CN201810961762 A CN 201810961762A CN 109324756 A CN109324756 A CN 109324756A
Authority
CN
China
Prior art keywords
data
solid
state disks
state
deleting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810961762.6A
Other languages
Chinese (zh)
Inventor
曾令仿
程稳
涂盛霞
李春艳
桑大邹
王芳
冯丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201810961762.6A priority Critical patent/CN109324756A/en
Publication of CN109324756A publication Critical patent/CN109324756A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1076Parity data used in redundant arrays of independent storages, e.g. in RAID systems
    • G06F11/108Parity data distribution in semiconductor storages, e.g. in SSD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0688Non-volatile semiconductor memory arrays
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data safety delet method based on Solid-state disc array, using solid-state disks multiple in Solid-state disc array can parallel work-flow the characteristics of, conversion process is carried out to data using privacy sharing algorithm, by the data distribution after coding to each solid-state disk, on the one hand, coding guarantees data redundancy, and the data after convert is ciphertexts, raising data reliability and safety;On the other hand, it using the characteristic of fault-tolerant encoding, no longer needs to carry out entire data covering to the deletion of data and writes, but delete partial data, destroy data integrity, restore data can not.It even if attacker obtains code segment data, can not obtain in plain text, achieve the purpose that data safety is deleted.The present invention solve the problems, such as the storage of Solid-state disc array is unreliable, file can not the data storage securities such as safety deleting.

Description

Data safety deleting method based on solid-state disk array
Technical Field
The invention belongs to the technical field of computer data storage, and particularly relates to a data security deletion method based on a solid-state disk array.
Background
Flash-based Solid State Disks (SSDs) are now a powerful replacement for magnetic disks and have gained widespread attention in both academia and industry. Solid state disks are increasingly being used in server and enterprise level data storage systems, in addition to desktop machines. In an enterprise-level data storage system, a single solid state disk obviously cannot meet the requirements of services on the capacity, performance and reliability of the storage system. Therefore, applying a disk array (RAID) algorithm to a solid-state disk storage system, it is necessary to construct a storage system with large capacity, high performance, and high reliability, i.e., a solid-state disk array. Similar to RAID, the performance of a solid state disk array is also affected by the worst performing member disk in the array. Thus, the unreliability of a single solid state disk will cause the array of solid state disks to exhibit severe performance fluctuations.
The solid state disks in the solid state disk array are internally updated in different places, and when a user uses security software to safely delete files in the solid state disks, all the covering operations of target data are transferred to new free physical pages. Thus, sensitive target data is not physically overwritten or erased, but merely marked as invalid data within the solid state disk. That is, the file contents still exist in the flash memory. All changes are only that data of a target file cannot be read from an original logical address, such deleted data is easy to recover, and the security of the data cannot be guaranteed.
The method has two problems for a flash memory type memory, namely ① the method needs to be completed by write operation, but the write operation process in the flash memory is complicated, time consumption is long, and time cost is large, ② the memory keeps redundant blocks for backup in consideration of the life and wear balance of the flash memory, and the method can cause data to remain in the backup blocks in the use process.
Disclosure of Invention
Aiming at the defects or the improvement requirements of the prior art, the invention provides a data security deletion method based on a solid-state disk array, which introduces the basic principle of a secret sharing mechanism into the data security deletion method, destroys the redundancy capability of each solid-state disk data in the solid-state disk array, combines data conversion processing operation, encrypts the residual data after destroying the integrity of the data, and can not obtain the plaintext even if an attacker obtains partial encoded data, thereby achieving the purpose of safely deleting the data.
In order to achieve the above object, the present invention provides a method for safely deleting data based on a solid state disk array, where the method includes:
(1) performing encapsulation conversion on the source data D to obtain encapsulated and converted data (X, t), wherein X is a head part and t is a tail part;
(2) and (2) carrying out redundant coding on the packaged converted data (X, t) obtained in the step (1) through a secret sharing algorithm (n, k, r) to obtain n pieces of coded data, wherein n is the share quantity of the output data coded by the secret sharing algorithm, k is the share quantity of the secret which can be reconstructed, r is the share quantity of the secret which can not be reconstructed, and n > k > r is not less than 0.
(3) Respectively storing the n coded data obtained in the step (2) to n solid-state disks in a solid-state disk array;
(4) and deleting the data on the number of the solid-state disks which destroy the redundancy capability n-r according to the redundancy capability n-r of the secret sharing algorithm, namely finishing the safe deletion of the data.
As a further preferred, the step (1) comprises:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) using h as a key, and encrypting a constant value block C with the same size as D by using an encryption function E () to obtain E (h, C);
(1-3) carrying out XOR operation on the source data D and the source data E (h, C) to obtain a head X of the encapsulation data,
(1-4) processing the head X of the encapsulated data by using a hash function H to obtain H (X), carrying out XOR operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data,further obtaining the encapsulated converted data (X, t) of the source data D.
As a further preferred, the step (2) includes:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k, and marking the equal parts as S0,S1,…Sk-1
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
As a further preference, the solid state disk comprises: a plurality of mutually independent flash memory solid-state disks; and the array controller is used for carrying out bus scheduling among the solid-state disks and directly controlling the solid-state disks.
As a further preference, when part of data of one or more solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability n-r of the remaining solid-state disks is not damaged, a data reconstruction program can be selected to perform reconstruction recovery on the lost data.
As a further preference, the deletion of data on the solid-state disk may be performed in such a way that physical pages are overwritten with all zeros.
Preferably, the data deletion on the number of solid state disks reaching the destructive redundancy capability n-r is specifically: and deleting or overwriting data which belong to the same source data code and are distributed to n-r solid-state disks from the physical medium, and reconstructing and recovering the lost data through the data on the rest solid-state disks.
In general, compared with the prior art, the above technical solution contemplated by the present invention can achieve the following beneficial effects:
(1) the invention solves the problem that the data in the solid-state disk array can not be safely deleted due to the remote updating characteristic of the solid-state disk in the prior art, on one hand, the reliability and the safety of the data are ensured by adopting a secret sharing algorithm, and the utilization rate of a storage space is greatly improved; on the other hand, by utilizing the characteristic of redundant coding, the deletion of the data does not need to overwrite the whole data, but deletes a part of data blocks to ensure that the data cannot be recovered, the integrity of the data is damaged, and the erasing expense and the abrasion of the solid-state disk are reduced in the deleting process.
(2) The invention carries out redundant coding on the data, enhances the data privacy protection by adopting special data conversion processing before coding, destroys the data integrity by utilizing the characteristic of the redundant coding, and carries out encryption protection on the residual data, so that even if an attacker obtains the data, the attacker can not obtain the plaintext, thereby achieving the purpose of safely deleting the data.
(3) The method and the device utilize the characteristic that the solid-state disks in the solid-state disk array can be operated in parallel, adopt the secret sharing algorithm to encode the data, and when partial data on a single solid-state disk or a plurality of solid-state disks in the solid-state disk array is lost, reconstruct and recover the lost data by executing a data reconstruction program, thereby improving the reliability of the data in the solid-state disk array.
(4) Breaking the conventional thinking. In the invention, the data is safely deleted by utilizing the characteristic that data is unavailable after the data redundancy capability is damaged.
Drawings
FIG. 1 is a hardware block diagram of a solid state disk array of the present invention;
FIG. 2 is a flow chart of a method for safely deleting data based on a solid state disk array according to the present invention;
FIG. 3 is a flowchart of a method for securely deleting data based on a solid-state disk array according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating a data conversion and encoding process according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Fig. 1 is a hardware configuration diagram of a solid-state disk array of the present invention. The array controller performs bus scheduling among the solid-state disks, directly controls the solid-state disks, has a controller in each solid-state disk, and simultaneously generates an Error Correcting Code (ECC) for all write data by using the ECC controller, and performs ECC detection and Error correction for all read data. From the aspect of hardware structure, the solid-state disk array can achieve extremely high data throughput rate by parallel operation of a plurality of solid-state disks, and can enable the data transmission rate to approach the maximum transmission speed of the channel by parallel operation of a plurality of data channels inside each solid-state disk.
Fig. 2 is a flowchart of a method for safely deleting data based on a solid-state disk array according to the present invention, where the method includes the following steps:
(1) performing encapsulation conversion on the source data D, wherein the encapsulation conversion comprises hash (hash) operation and encryption operation;
the packaging conversion in the step (1) specifically comprises the following steps:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) using h as a key, and encrypting a constant value block C with the same size as D by using an encryption function E () to obtain E (h, C);
(1-3) carrying out XOR operation on the source data D and the source data E (h, C) to obtain a head X of the encapsulation data,
(1-4) processing the head X of the encapsulated data by using a hash function H to obtain H (X), carrying out XOR operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data,further obtaining the encapsulated converted data (X, t) of the source data D.
(2) Performing redundant coding on the data obtained in the step (1) after packaging conversion by adopting a secret sharing algorithm;
wherein, secret sharing algorithm (secret sharing) converts the input data secret (secret) into the encoded output data shares (shares), aiming at ensuring the fault tolerance and confidentiality of the secret. The secret sharing algorithm is defined by three parameters (n, k, r): the algorithm encodes the secret into n shares (n > k > r ≧ 0) (i) the secret can be reconstructed by any k shares, and (ii) the secret cannot be inferred by any r shares. The parameters (n, k, r) determine the protection strength of the secret sharing algorithm. In particular, n and k determine the fault tolerance of the secret, which can be accessed as long as any k shares exist. That is, it allows n-k shares to be lost. The parameter r determines the machine density of the secret, which is secure as long as less than r shares are obtained by an attacker.
The step (2) specifically comprises:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k, and marking the equal parts as S0,S1,…Sk-1
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
(3) Respectively storing the data subjected to redundancy coding on a plurality of solid-state disks in a solid-state disk array;
when part of data of one or more solid-state disks in the solid-state disk array is lost, as long as the data redundancy capability of the remaining solid-state disks is not damaged, a data reconstruction program can be selected to perform reconstruction recovery on the lost data.
(4) And when the safe deletion of the data is executed, deleting the data on the number of the solid-state disks which reach the capacity of destroying the redundancy according to the redundancy capacity of the secret sharing algorithm.
Here, the deletion of data on the solid-state disk may be performed in such a manner that physical pages are overwritten with all zeros.
Fig. 3 is a flowchart of a method for safely deleting data based on a solid-state disk array according to an embodiment of the present invention, which specifically includes the following steps:
(10) marking the source data as D, namely, the source data is in a data initial state;
(20) packaging the data in the step (10), using D as an input value of a hash function H, generating a hash value H, namely H ═ H (D), and marking as (D, H);
(30) performing XOR operation on the source data D and the source data E (h, C) to obtain a data-encapsulated head X,wherein,for exclusive-or operation, C is a constant value block of the same size as D, E is an encryption function that encrypts C with h as the key;
(40) the tail of the data encapsulation is t,the data is finally encapsulated as (X, t);
(50) dividing (X, t) in the step (40) into k equal parts, and marking as S0,S1,…Sk-1,k=1,2,...,K;
(60) Using redundant coding algorithm to pair S0,S1,…Sk-1Performing coding calculation to generate n equal parts F0,F1,…Fn-1The method includes the steps of storing the data on N solid-state disks of a solid-state disk array, wherein N is 1, 2.
(70) And when the safe deletion of the data is executed, deleting the data on the number of (n-r) solid-state disks which reach the capacity of destroying the redundancy according to the redundancy capacity of the redundancy code, wherein r-k-1.
FIG. 4 is a diagram illustrating a data conversion and encoding process according to an embodiment of the present invention. In this embodiment, n is 4, k is 3, and r is 2. Taking the source data D as an input of a hash function H (such as SHA-256) to obtain a hash value H, H ═ H (D); to obtain high security, we convert (D, h) to (X, t), whereC is a constant value block of the same size as D, E is an encryption function (e.g., AES-256), h is used as a key to encrypt C,h' ═ h (x); finally (X, t) is divided equally into 3Equal parts, encoding the data using Reed-Solomon codes, yielding 4 shares. According to the characteristics of the code, the source data cannot be deduced through 2 shares, so that when data security deletion is performed, two shares of the data security deletion are destroyed, and the rest shares are protected by encryption, so that the purpose of data security deletion is achieved.
It will be understood by those skilled in the art that the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the invention, and that any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (7)

1. A data security deletion method based on a solid-state disk array is characterized by comprising the following steps:
(1) performing encapsulation conversion on the source data D to obtain encapsulated and converted data (X, t);
wherein X is the head and t is the tail;
(2) performing redundant coding on the encapsulated converted data (X, t) by a secret sharing algorithm (n, k, r) to obtain n coded data;
wherein n is the share number of the output data after being coded by the secret sharing algorithm, k is the share number of the secret which can be reconstructed, r is the share number of the secret which can not be reconstructed, and n > k > r is more than or equal to 0;
(3) respectively storing the n coded data to n solid-state disks in a solid-state disk array;
(4) and according to the redundancy capability n-r of the secret sharing algorithm, deleting the data on the number of the solid-state disks which destroy the redundancy capability n-r, thereby realizing the safe deletion of the data.
2. The method for securely deleting data according to claim 1, wherein the step (1) comprises:
(1-1) processing the source data by using a hash function H to obtain a hash value H ═ H (D) of the source data D;
(1-2) encrypting a constant value block C with the same size as D by using h as a key by using an encryption function E () to obtain E (h, C);
(1-3) performing exclusive-or operation on the source data D and E (h, C) to obtain a header X, X ═ D ⊕ E (h, C) of the encapsulated data;
(1-4) processing the header X of the encapsulated data by using a hash function H to obtain H (X), performing exclusive or operation on the hash value H of the source data D and H (X) to obtain the tail t of the encapsulated data, wherein t is H ⊕ H (X), and further obtaining encapsulated converted data (X, t) of the source data D.
3. The method for securely deleting data according to claim 1, wherein the step (2) comprises:
(2-1) dividing the data (X, t) after the encapsulation conversion into equal parts of k which are respectively marked as S0,S1,…Sk-1
(2-2) redundancy coding algorithm is adopted to pair S0,S1,…Sk-1And coding is carried out to generate n redundant coded data.
4. A method for the secure deletion of data according to any of claims 1 to 3, wherein the solid state disk array comprises:
a plurality of mutually independent flash memory solid-state disks; and
and the array controller is used for carrying out bus scheduling among the solid-state disks and directly controlling the solid-state disks.
5. The method for safely deleting data as claimed in claim 4, wherein when part of data of one or more solid state disks in the solid state disk array is lost, the data reconstruction program can be selectively executed to reconstruct and recover the lost data as long as the data redundancy capability n-r of the remaining solid state disks is not damaged.
6. A method for safely deleting data as claimed in any one of claims 1 to 5, wherein the deletion of data on the solid state disk can be performed by overwriting a physical page with all zeros.
7. The method for safely deleting data according to any one of claims 1 to 6, wherein the data deletion on the number of solid state disks reaching the destructive redundancy capability n-r is specifically: and deleting or overwriting data which belong to the same source data code and are distributed to n-r solid-state disks from the physical medium, and reconstructing and recovering the lost data through the data on the rest solid-state disks.
CN201810961762.6A 2018-08-22 2018-08-22 A kind of data safety delet method based on Solid-state disc array Pending CN109324756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810961762.6A CN109324756A (en) 2018-08-22 2018-08-22 A kind of data safety delet method based on Solid-state disc array

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810961762.6A CN109324756A (en) 2018-08-22 2018-08-22 A kind of data safety delet method based on Solid-state disc array

Publications (1)

Publication Number Publication Date
CN109324756A true CN109324756A (en) 2019-02-12

Family

ID=65264254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810961762.6A Pending CN109324756A (en) 2018-08-22 2018-08-22 A kind of data safety delet method based on Solid-state disc array

Country Status (1)

Country Link
CN (1) CN109324756A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110058820A (en) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 Data safety write-in, deletion, read method and device based on Solid-state disc array
CN112242878A (en) * 2019-07-17 2021-01-19 丁爱民 Erasure code data segmentation security method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102023815A (en) * 2009-09-15 2011-04-20 格雷戈里·伯德 Implementing RAID in solid state memory
CN105608394A (en) * 2015-12-22 2016-05-25 华中科技大学 Secure deletion method for data in solid-state disk on basis of flash memory
KR20180070526A (en) * 2015-11-02 2018-06-26 조진영 Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102023815A (en) * 2009-09-15 2011-04-20 格雷戈里·伯德 Implementing RAID in solid state memory
KR20180070526A (en) * 2015-11-02 2018-06-26 조진영 Usb 3.1 memory device for improving read/write speed by controlling nand flash memory as ssd memory with raid function
CN105608394A (en) * 2015-12-22 2016-05-25 华中科技大学 Secure deletion method for data in solid-state disk on basis of flash memory

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110058820A (en) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 Data safety write-in, deletion, read method and device based on Solid-state disc array
CN112242878A (en) * 2019-07-17 2021-01-19 丁爱民 Erasure code data segmentation security method and device
CN112242878B (en) * 2019-07-17 2023-07-21 丁爱民 Erasure code data segmentation security method and device

Similar Documents

Publication Publication Date Title
US11233643B1 (en) Distributed data storage system data decoding and decryption
CN105608394B (en) A kind of data safety delet method of the solid-state disk based on flash memory
US9483656B2 (en) Efficient and secure data storage utilizing a dispersed data storage system
US8744071B2 (en) Dispersed data storage system data encryption and encoding
US8656187B2 (en) Dispersed storage secure data decoding
US8135958B2 (en) Method, system, and apparatus for dynamically validating a data encryption operation
US9996413B2 (en) Ensuring data integrity on a dispersed storage grid
US9092439B2 (en) Virtualized data storage vaults on a dispersed data storage network
CN103118089A (en) Safe storage method based on a plurality of cloud storage systems and system thereof
US9465692B2 (en) High reliability erasure code distribution
CN108197484B (en) Method for realizing node data security in distributed storage environment
US20090080659A1 (en) Systems and methods for hardware key encryption
CN104331345B (en) A kind of data reconstruction method
US9235532B2 (en) Secure storage of full disk encryption keys
US10496829B2 (en) Method and system for data destruction in a phase change memory-based storage device
CN109324756A (en) A kind of data safety delet method based on Solid-state disc array
CN110058820B (en) Data safe writing, deleting and reading method and device based on solid-state disk array
CN104484126A (en) Safe data deleting method and system based on erasure codes
US11991280B2 (en) Randomized transforms in a dispersed data storage system
US12061519B2 (en) Reconstructing data segments in a storage network and methods for use therewith
US9450617B2 (en) Distribution and replication of erasure codes
Fu et al. A scheme of data confidentiality and fault-tolerance in cloud storage
Rashid et al. Proof of retrieval and ownership protocols for enterprise-level data deduplication
JP7428335B1 (en) Secret sharing method, secret sharing system, secret sharing program
TWM651394U (en) Shared encrypted fault-tolerant backup device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212

RJ01 Rejection of invention patent application after publication