US20070088923A1 - System and method for fast, secure removal of objects from disk storage - Google Patents
System and method for fast, secure removal of objects from disk storage Download PDFInfo
- Publication number
- US20070088923A1 US20070088923A1 US10/795,648 US79564804A US2007088923A1 US 20070088923 A1 US20070088923 A1 US 20070088923A1 US 79564804 A US79564804 A US 79564804A US 2007088923 A1 US2007088923 A1 US 2007088923A1
- Authority
- US
- United States
- Prior art keywords
- data
- storage device
- data bits
- bits
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- the invention generally relates to computer storage systems and methods of storage retrieval, and more particularly to a system and method for quickly and securely deleting an object from a rewriteable storage device.
- Reference Data Data that is written once and seldom retrieved is classified as “Reference Data”.
- the growth of reference data is increasing at a faster rate than traditional customer data like on-line transaction processing (OLTP) data.
- OTP on-line transaction processing
- the customers specify an expiration date for their data.
- the reference storage system has to ensure that this data cannot be accidentally removed and that the data is physically removed from the storage media after the expiration date. For example, many companies prefer to delete regulatory documents immediately after the government regulated mandatory retention time period.
- Reference data can be stored on write-once (WORM) media like DVDs or WORM-tapes, or it can also be stored on non-WORM media like disks and tapes.
- WORM write-once
- Physical deletion of data on WORM media usually amounts to the physical destruction of the DVDs or CDs, whereas, physical deletion of data on non-WORM media requires the storage system to over-write the existing data multiple times with random data.
- the Department of Defense has developed a standard to ensure that detected data is actually unrecoverable.
- the standard requires that storage used to record data be overwritten when the data is deleted, not simply marked for reclamation. In fact, to ensure that the storage does not contain the magnetic signature of the original data, the standard requires that the storage be overwritten multiple times. While this ensures that the data is securely removed, the cost of removing data is several times the cost of writing data normally.
- Another conventional approach is to interleave a file's blocks with one another. Then, securely deleting a subset of the blocks of storage actually destroys data from throughout the file. The problem with this approach is that the rest of the file remains readable. This could allow investigators or malicious users to extract valuable information from the remnants of the data that remain.
- an embodiment of the invention provides a program storage device and a method of optimizing data placement on a storage device, the method comprising establishing a specified time constraint for which the storage device is to delete data stored thereon; dividing a data object into a plurality of data bits; programming a block of data and the data bits with a logic operand, if the storage device is incapable of deleting the data within the specified time constraint; creating an encoded block of data from the programmed block of data and the data bits; organizing the encoded block of data and the data bits in the storage device according to data deletion requirements; and removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data bits are removed using a data shredding process, and wherein the logic operand comprises an exclusive-or (XOR) operator.
- XOR exclusive-or
- the method further comprises restoring the data object by retrieving the encoded block of data and the data bits from the storage device; applying the logic operand to the encoded block of data and the data bits; associating a piece of metadata with the object to identify a correct block of data to be used to form the encoded block of data; using idle cycles to rearrange the encoded block of data and the data bits prior to the step of removing; determining whether the data deletion requirements can be satisfied; and informing a user whether the data deletion requirements cannot be satisfied.
- the invention provides a storage device comprising an encoded block of data comprising a block of data and data bits; a data organizer operable for organizing the encoded block of data according to data deletion requirements; and a data deletion component operable for removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data deletion component removes the data bits using a data shredding process, wherein the logic operand comprises an exclusive-or (XOR) operator, wherein the data organizer is operable for determining whether the data deletion requirements can be satisfied, and wherein the data organizer is operable for informing a user whether the data deletion requirements cannot be satisfied.
- the storage device further comprises a data restoration component.
- the invention achieves several advantages.
- the invention quickens the physical deletion of data in the following novel ways.
- Data objects are placed on disk systems to optimize read or write performance. For example, data is stripped across multiple disks (e.g., RAID 0 ) to improve read performance times.
- RAID 0 disks
- data is stripped across multiple disks (e.g., RAID 0 ) to improve read performance times.
- READ performance e.g., RAID 0
- the data is moved and re-allocated on the disk to speed up delete performance. When this occurs is determined based on the data expiration policy.
- data is stored initially, it is not optimized for delete performance. Only after the invention is applied to the stored data, is the data optimized for delete performance.
- Another feature of the invention is that encrypting the data using a key (salt) is only necessary when the system determines that it cannot delete the data within the prescribed time period. Hence, one does not have to encrypt the data using the salt all the time this is an important point.
- data is placed on disks to optimize delete performance.
- Delete performance is optimized both for user's data as well as the metadata that describes the place of the user's data on the disk.
- the system constantly monitors user's data creation rate, and it proactively warns the user if it cannot delete data within the user specified tolerance window. For example, users might want all of their data to be physically removed from the disk within twenty-four hours of the expiration of the data retention time.
- the system places data to optimize read performance, but subsequently, it dynamically re-organizes the data to optimize delete performance when it gets closer to the data expiration time.
- the system provides the user with an option to encrypt the data so that the data can be logically deleted upon the expiration of the data retention time, and then subsequently physically removed in a so-called “lazy” manner.
- FIG. 1 is a system block diagram according to an embodiment of the invention
- FIG. 2 is a system diagram illustrating an alternative embodiment of the invention
- FIG. 3 is a flow block diagram according to an embodiment of the invention.
- FIG. 4 is a flow diagram illustrating a preferred embodiment of the invention.
- FIG. 5 is a system diagram according to a preferred embodiment of the invention.
- FIG. 6 is a computer system diagram according to a preferred embodiment of the invention.
- FIG. 1 The process of encoding data 100 for storage on a disk 103 is shown in FIG. 1 .
- the process of encoding data 100 occurs if the storage device 103 is incapable of deleting the data 100 within a specified time constraint (for example, a few seconds, minutes, days, months, years, etc.).
- a secure random generator for each object stored, the system uses a secure random generator (not shown) to create a block of ‘salt’ 101 .
- the object may comprise any data format such as text data, audio data, and/or image data.
- the block of salt 101 which is embodied as a bit of data, is stored on the storage device.
- the system divides the object to be stored into a number of data blocks 100 no larger than the size of the block of salt 101 .
- Each block of data 100 is programmed with an exclusive-or (XOR) operator 104 and with the block of salt 101 thereby producing an encoded block or chunk 102 of data.
- the block of salt 101 is smaller than the chunk 102 .
- the chunks 102 of the object are then stored on the storage device (disk) 103 along with the block of salt 101 , as illustrated in FIG. 1 .
- the system retrieves the object's block of salt 101 and all of its chunks 102 . Applying the XOR operator 104 to the encoded blocks 102 and the block of salt 101 , the original data 100 is retrieved.
- the process of reconstructing the data 100 for reading is shown in FIG. 2 .
- the system only needs to securely remove the block of salt 100 , a single block, from the storage device 103 .
- the block of salt 100 is removed through a process of data shredding, wherein the data 100 is overwritten several times.
- the approach provided by the invention allows objects of any size to be securely deleted at the cost of securely removing only a single block from the storage device 103 .
- the invention also provides an additional layer of encryption further protecting the data from users or tools trying to access the data through out-of-band means (data is not available in plain text even if users or applications do not use any form of encryption). In other words, if one encrypts data 100 on the disk 103 , then even if the disk 103 is stolen and accessed (out-of-band access) then the data 100 will still be unreadable. Thus, the encryption prevents out-of-band access.
- the invention functions by creating a dependence of every byte of data in a file or object on a single block of data. No portion of the data 100 can be recovered without the block of salt 101 .
- the invention can be implemented in a number of file systems or integrated storage solutions. To implement the invention, one simply needs to associate an additional piece of metadata with each file or object to identify the block of salt 101 to be used to encode and decode chunks 102 of the object.
- the block of salt 101 can be stored on the same storage device 103 as the metadata and data blocks 100 .
- a low-priority background process is preferably employed to securely remove a file's chunks 102 after the block of salt 101 has been removed.
- the data 100 cannot be read without the block of salt 101 .
- an attacker could collect the encoded blocks 102 of data and try to reconstruct the block of salt 101 .
- using idle cycles to remove the chunks 102 from a disk 103 further mitigates the risk of discovery.
- An idle cycle means that this task of block deletion is performed in low priority mode. That is, highest priority is given to normal read/write tasks, and data deletion tasks are given a lower priority.
- some data 100 could be considered so valuable that the process of removing the salt 101 immediately and allowing the background process to remove the encoded chunks 102 is performed in conjunction with a second process of removal.
- a user, administrator, or application may elect to optimize the system for security instead of throughput.
- all blocks belonging to a file are shredded immediately.
- a low-priority background process can use idle cycles to rearrange blocks belonging to objects that will be deleted in the near future so that they can be overwritten at maximum throughput.
- the blocks would be allocated consecutively on the disk; for a multi-disk system, the blocks would be striped across the disks to take advantage of the aggregate bandwidth of the disks.
- FIG. 3 illustrates the deletion process under two scenarios: (1) the object can be deleted within the user-specified time window and (2) the object cannot be deleted within the user-specified time window.
- the deletion process begins 300 by the determination of whether the object can or cannot be deleted within the user-specified time window. If the object can be deleted within the time window, then the blocks are stored 305 on the disk 103 (read optimized). Then, the blocks are re-ordered 307 for delete optimization as per the deletion time constraint policy established by the user. Then, the data 100 is immediately shredded 309 . This completes 310 the data deletion process under the first scenario. If the object cannot be deleted within the time window, then the data 100 is encrypted and stored 315 . Next, the invention eagerly shreds 317 the salt 101 after the data time window has expired. Then, the data blocks are lazily removed 319 . According to the second scenario, the data deletion process is now completed 310 .
- the invention comprises the following steps, which are further described in the flow diagram of FIG. 4 .
- users specify 400 the data retention time during the time of data creation.
- the users also specify their tolerance for the amount of time data can reside on the disk after the expiration of the data retention time period.
- the system then performs 405 a check to see whether it can satisfy the users data deletion requirements. If the system cannot satisfy users requirement then it immediately informs 410 the user. Thereafter, the system places 415 the data on the disk to optimize read performance. This is significant because government audits mandate that the data be retrieved from the disks within a narrow time window. Subsequently, the system dynamically re-arranges 420 the data to ensure that physical data deletion operations can occur within the guarantees provided to the user.
- the invention provides a method of optimizing data placement on a storage device, the method comprising establishing a specified time constraint for which the storage device is to delete data; dividing a data object into a plurality of data bits; programming a block of data and the data bits with a logic operand if the storage device is incapable of deleting the data within the specified time constraint; creating an encoded block of data from the programmed block of data and the data bits; organizing the encoded block of data and the data bits in the storage device according to data deletion requirements; and removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data bits are removed using a data shredding process, and wherein the logic operand comprises an exclusive-or (XOR) operator.
- XOR exclusive-or
- the method further comprises restoring the data object by retrieving the encoded block of data and the data bits from the storage device; applying the logic operand to the encoded block of data and the data bits; associating a piece of metadata with the object to identify a correct block of data to be used to form the encoded block of data; using idle cycles to rearrange the encoded block of data and the data bits prior to the step of removing; determining whether the data deletion requirements can be satisfied; and informing a user whether the data deletion requirements cannot be satisfied.
- the invention comprises a system 500 comprising a data deletion predictor component 510 , which looks at the current state of the system 500 with respect to the number of objects and their physical deletion dates, the network speed, disk speeds, current normal I/O rate to determine whether data can be deleted as per the user requirements. If data cannot be physically deleted as per users wishes then the system 500 informs the user 502 as such.
- the system 500 allows the users to encrypt their data, so that the data can be logically deleted upon the expiration of data retention time, and subsequently physically deleted in a so-called “lazy” manner.
- a “lazy” manner means that the data will be deleted using a low priority background manner. The low priority process becomes active when there are no higher priority (normal read and write) tasks to be performed.
- the system 500 also comprises a data re-arranging component 515 .
- the system 500 initially places the data on the disks 520 to optimize for read performance. However, when the data expiration time comes closer, as determined by timer 530 , then the system 500 re-organizes the data on the disks 520 to reduce the data deletion time period. Data is moved to low activity disks 525 so that when the data is being deleted, there is not much interference from other disk I/O traffic. Data is also re-organized on tracks to amortize disk seek and rotational delay times.
- the system further comprises a physical data deletion component 535 , which physically writes random characters on the disk 520 to erase previously existing data content.
- the system embodiment of the invention provides a storage device comprising an encoded block of data comprising a block of data and data bits; a data organizer operable for organizing the encoded block of data according to data deletion requirements; and a data deletion component operable for removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement.
- FIG. 6 illustrates a typical hardware configuration of an information handling/computer system in accordance with the invention, having at least one processor or central processing unit (CPU) 10 .
- the CPUs 10 are interconnected via system bus 12 to random access memory (RAM) 14 , read-only memory (ROM) 16 , an input/output (I/O) adapter 18 for connecting peripheral devices, such as disk units 11 and tape drives 13 , to bus 12 , user interface adapter 19 for connecting keyboard 15 , mouse 17 , speaker 24 , microphone 22 , and/or other user interface devices such as a touch screen device (not shown) to bus 12 , communication adapter 20 for connecting the information handling system to a data processing network, and display adapter 21 for connecting bus 12 to display device 23 .
- a program storage device readable by the disk or tape units is used to load the instructions, which operate the invention, which is loaded onto the computer system.
- the invention achieves several advantages.
- the invention quickens the physical deletion of data in the following novel ways.
- Data objects are placed on disk systems to optimize read or write performance. For example, data is stripped across multiple disks (e.g., RAID 0 ) to improve read performance times.
- RAID 0 disks
- data is stripped across multiple disks (e.g., RAID 0 ) to improve read performance times.
- READ performance e.g., RAID 0
- the data is moved and re-allocated on the disk to speed up delete performance. When this occurs is determined based on the data expiration policy.
- data is stored initially, it is not optimized for delete performance. Only after the invention is applied to the stored data, is the data optimized for delete performance.
- Another feature of the invention is that encrypting the data using a key (salt) is only necessary when the system determines that it cannot delete the data within the prescribed time period. Hence, one does not have to encrypt the data using the salt all the time this is an important point. Moreover, the invention provides a generalized approach which is adaptable to several different technologies and uses.
- data is placed on disks to optimize delete performance.
- Delete performance is optimized both for user's data as well as the metadata that describes the place of the user's data on the disk.
- the system constantly monitors user's data creation rate, and it proactively warns the user if it cannot delete data within the user specified tolerance window. For example, users might want all of their data to be physically removed from the disk within twenty-four hours of the expiration of the data retention time.
- the system places data to optimize read performance, but subsequently, it dynamically re-organizes the data to optimize delete performance when it gets closer to the data expiration time.
- the system provides the user with an option to encrypt the data so that the data can be logically deleted upon the expiration of the data retention time, and then subsequently physically removed in a so-called “lazy” manner.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A system, program storage device, and method of optimizing data placement on a storage device, the method comprising establishing a specified time constraint for which the storage device is to delete data stored thereon; dividing a data object into a plurality of data bits; programming a block of data and the data bits with a logic operand if the storage device is incapable of deleting the data within the specified time constraint; creating an encoded block of data from the programmed block of data and the data bits; organizing the encoded block of data and the data bits in the storage device according to data deletion requirements; and removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data bits are removed using a data shredding process, and wherein the logic operand comprises an exclusive-or (XOR) operator.
Description
- 1. Field of the Invention
- The invention generally relates to computer storage systems and methods of storage retrieval, and more particularly to a system and method for quickly and securely deleting an object from a rewriteable storage device.
- 2. Description of the Related Art
- Data that is written once and seldom retrieved is classified as “Reference Data”. The growth of reference data is increasing at a faster rate than traditional customer data like on-line transaction processing (OLTP) data. In reference storage systems, the customers specify an expiration date for their data. The reference storage system has to ensure that this data cannot be accidentally removed and that the data is physically removed from the storage media after the expiration date. For example, many companies prefer to delete regulatory documents immediately after the government regulated mandatory retention time period.
- Reference data can be stored on write-once (WORM) media like DVDs or WORM-tapes, or it can also be stored on non-WORM media like disks and tapes. Physical deletion of data on WORM media usually amounts to the physical destruction of the DVDs or CDs, whereas, physical deletion of data on non-WORM media requires the storage system to over-write the existing data multiple times with random data.
- When customers have large amounts of data, the physical deletion of data after the expiration date can take many hours/days (depending upon the amount of data). In many traditional storage systems, when a user requests that an object be deleted from storage, the computer system marks that the space storing the object may be reused, but actually the computer system does not really remove the bits from the media. An investigator or malicious user can use special tools to retrieve data that has been marked for deletion but not yet overwritten. This is a liability for users with sensitive or valuable data.
- To guard against the disclosure of data after it has been deleted, the Department of Defense has developed a standard to ensure that detected data is actually unrecoverable. The standard requires that storage used to record data be overwritten when the data is deleted, not simply marked for reclamation. In fact, to ensure that the storage does not contain the magnetic signature of the original data, the standard requires that the storage be overwritten multiple times. While this ensures that the data is securely removed, the cost of removing data is several times the cost of writing data normally.
- Another conventional approach is to interleave a file's blocks with one another. Then, securely deleting a subset of the blocks of storage actually destroys data from throughout the file. The problem with this approach is that the rest of the file remains readable. This could allow investigators or malicious users to extract valuable information from the remnants of the data that remain.
- However, due to the drawbacks and limitations of the conventional systems and methods there remains a need for a system and method for quickly and securely deleting an object from a rewriteable storage device.
- In view of the foregoing, an embodiment of the invention provides a program storage device and a method of optimizing data placement on a storage device, the method comprising establishing a specified time constraint for which the storage device is to delete data stored thereon; dividing a data object into a plurality of data bits; programming a block of data and the data bits with a logic operand, if the storage device is incapable of deleting the data within the specified time constraint; creating an encoded block of data from the programmed block of data and the data bits; organizing the encoded block of data and the data bits in the storage device according to data deletion requirements; and removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data bits are removed using a data shredding process, and wherein the logic operand comprises an exclusive-or (XOR) operator. The method further comprises restoring the data object by retrieving the encoded block of data and the data bits from the storage device; applying the logic operand to the encoded block of data and the data bits; associating a piece of metadata with the object to identify a correct block of data to be used to form the encoded block of data; using idle cycles to rearrange the encoded block of data and the data bits prior to the step of removing; determining whether the data deletion requirements can be satisfied; and informing a user whether the data deletion requirements cannot be satisfied.
- According to another embodiment, the invention provides a storage device comprising an encoded block of data comprising a block of data and data bits; a data organizer operable for organizing the encoded block of data according to data deletion requirements; and a data deletion component operable for removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data deletion component removes the data bits using a data shredding process, wherein the logic operand comprises an exclusive-or (XOR) operator, wherein the data organizer is operable for determining whether the data deletion requirements can be satisfied, and wherein the data organizer is operable for informing a user whether the data deletion requirements cannot be satisfied. The storage device further comprises a data restoration component.
- The invention achieves several advantages. The invention quickens the physical deletion of data in the following novel ways. Data objects are placed on disk systems to optimize read or write performance. For example, data is stripped across multiple disks (e.g., RAID 0) to improve read performance times. Generally, when data is initially stored, it is stored to improve READ performance. Subsequently, the data is moved and re-allocated on the disk to speed up delete performance. When this occurs is determined based on the data expiration policy. Thus, when data is stored initially, it is not optimized for delete performance. Only after the invention is applied to the stored data, is the data optimized for delete performance. Another feature of the invention is that encrypting the data using a key (salt) is only necessary when the system determines that it cannot delete the data within the prescribed time period. Hence, one does not have to encrypt the data using the salt all the time this is an important point.
- According to the invention data is placed on disks to optimize delete performance. Delete performance is optimized both for user's data as well as the metadata that describes the place of the user's data on the disk. The system constantly monitors user's data creation rate, and it proactively warns the user if it cannot delete data within the user specified tolerance window. For example, users might want all of their data to be physically removed from the disk within twenty-four hours of the expiration of the data retention time. The system places data to optimize read performance, but subsequently, it dynamically re-organizes the data to optimize delete performance when it gets closer to the data expiration time. If the data cannot be physically deleted in the user desired time window, then the system provides the user with an option to encrypt the data so that the data can be logically deleted upon the expiration of the data retention time, and then subsequently physically removed in a so-called “lazy” manner.
- These, and other aspects and advantages of the invention will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following description, while indicating preferred embodiments of the invention and numerous specific details thereof, is given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the invention without departing from the spirit thereof, and the invention includes all such modifications.
- The invention will be better understood from the following detailed description with reference to the drawings, in which:
-
FIG. 1 is a system block diagram according to an embodiment of the invention; -
FIG. 2 is a system diagram illustrating an alternative embodiment of the invention; -
FIG. 3 is a flow block diagram according to an embodiment of the invention; -
FIG. 4 is a flow diagram illustrating a preferred embodiment of the invention; -
FIG. 5 is a system diagram according to a preferred embodiment of the invention; and -
FIG. 6 is a computer system diagram according to a preferred embodiment of the invention. - The invention and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. It should be noted that the features illustrated in the drawings are not necessarily drawn to scale. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the invention. The examples used herein are intended merely to facilitate an understanding of ways in which the invention may be practiced and to further enable those of skill in the art to practice the invention. Accordingly, the examples should not be construed as limiting the scope of the invention.
- As mentioned, there is a need for a system and method for quickly and securely deleting an object from a rewriteable storage device. Referring now to the drawings and more particularly to
FIGS. 1 through 6 , there are shown preferred embodiments of the invention. The process of encodingdata 100 for storage on adisk 103 is shown inFIG. 1 . The process of encodingdata 100 occurs if thestorage device 103 is incapable of deleting thedata 100 within a specified time constraint (for example, a few seconds, minutes, days, months, years, etc.). According to the invention, for each object stored, the system uses a secure random generator (not shown) to create a block of ‘salt’ 101. The object may comprise any data format such as text data, audio data, and/or image data. The block ofsalt 101, which is embodied as a bit of data, is stored on the storage device. The system divides the object to be stored into a number of data blocks 100 no larger than the size of the block ofsalt 101. Each block ofdata 100 is programmed with an exclusive-or (XOR)operator 104 and with the block ofsalt 101 thereby producing an encoded block orchunk 102 of data. The block ofsalt 101 is smaller than thechunk 102. Thechunks 102 of the object are then stored on the storage device (disk) 103 along with the block ofsalt 101, as illustrated inFIG. 1 . To read the object, the system retrieves the object's block ofsalt 101 and all of itschunks 102. Applying theXOR operator 104 to the encodedblocks 102 and the block ofsalt 101, theoriginal data 100 is retrieved. The process of reconstructing thedata 100 for reading is shown inFIG. 2 . - Because the object cannot be read without the block of
salt 101 to decode the encodedblocks 102, to securely delete thedata 100, the system only needs to securely remove the block ofsalt 100, a single block, from thestorage device 103. The block ofsalt 100 is removed through a process of data shredding, wherein thedata 100 is overwritten several times. - The approach provided by the invention allows objects of any size to be securely deleted at the cost of securely removing only a single block from the
storage device 103. The invention also provides an additional layer of encryption further protecting the data from users or tools trying to access the data through out-of-band means (data is not available in plain text even if users or applications do not use any form of encryption). In other words, if one encryptsdata 100 on thedisk 103, then even if thedisk 103 is stolen and accessed (out-of-band access) then thedata 100 will still be unreadable. Thus, the encryption prevents out-of-band access. - The invention functions by creating a dependence of every byte of data in a file or object on a single block of data. No portion of the
data 100 can be recovered without the block ofsalt 101. Moreover, the invention can be implemented in a number of file systems or integrated storage solutions. To implement the invention, one simply needs to associate an additional piece of metadata with each file or object to identify the block ofsalt 101 to be used to encode and decodechunks 102 of the object. The block ofsalt 101 can be stored on thesame storage device 103 as the metadata and data blocks 100. - Furthermore, the invention can be combined with several other techniques to ensure that valuable or sensitive data is deleted in an unrecoverable manner. This occurs as follows. First, a low-priority background process is preferably employed to securely remove a file's
chunks 102 after the block ofsalt 101 has been removed. Thedata 100 cannot be read without the block ofsalt 101. However, even after removing thesalt 101 from the system, an attacker could collect the encodedblocks 102 of data and try to reconstruct the block ofsalt 101. However, using idle cycles to remove thechunks 102 from adisk 103 further mitigates the risk of discovery. An idle cycle means that this task of block deletion is performed in low priority mode. That is, highest priority is given to normal read/write tasks, and data deletion tasks are given a lower priority. - Finally, some
data 100 could be considered so valuable that the process of removing thesalt 101 immediately and allowing the background process to remove the encodedchunks 102 is performed in conjunction with a second process of removal. In such cases, a user, administrator, or application may elect to optimize the system for security instead of throughput. In a system optimized for security, all blocks belonging to a file are shredded immediately. To minimize the cost of this operation, a low-priority background process can use idle cycles to rearrange blocks belonging to objects that will be deleted in the near future so that they can be overwritten at maximum throughput. For a single disk system, the blocks would be allocated consecutively on the disk; for a multi-disk system, the blocks would be striped across the disks to take advantage of the aggregate bandwidth of the disks. -
FIG. 3 illustrates the deletion process under two scenarios: (1) the object can be deleted within the user-specified time window and (2) the object cannot be deleted within the user-specified time window. As shown inFIG. 3 , the deletion process begins 300 by the determination of whether the object can or cannot be deleted within the user-specified time window. If the object can be deleted within the time window, then the blocks are stored 305 on the disk 103 (read optimized). Then, the blocks are re-ordered 307 for delete optimization as per the deletion time constraint policy established by the user. Then, thedata 100 is immediately shredded 309. This completes 310 the data deletion process under the first scenario. If the object cannot be deleted within the time window, then thedata 100 is encrypted and stored 315. Next, the invention eagerly shreds 317 thesalt 101 after the data time window has expired. Then, the data blocks are lazily removed 319. According to the second scenario, the data deletion process is now completed 310. - Generally, the invention comprises the following steps, which are further described in the flow diagram of
FIG. 4 . First, users specify 400 the data retention time during the time of data creation. The users also specify their tolerance for the amount of time data can reside on the disk after the expiration of the data retention time period. The system then performs 405 a check to see whether it can satisfy the users data deletion requirements. If the system cannot satisfy users requirement then it immediately informs 410 the user. Thereafter, the system places 415 the data on the disk to optimize read performance. This is significant because government audits mandate that the data be retrieved from the disks within a narrow time window. Subsequently, the system dynamically re-arranges 420 the data to ensure that physical data deletion operations can occur within the guarantees provided to the user. - In other words, the invention provides a method of optimizing data placement on a storage device, the method comprising establishing a specified time constraint for which the storage device is to delete data; dividing a data object into a plurality of data bits; programming a block of data and the data bits with a logic operand if the storage device is incapable of deleting the data within the specified time constraint; creating an encoded block of data from the programmed block of data and the data bits; organizing the encoded block of data and the data bits in the storage device according to data deletion requirements; and removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement, wherein the data bits are removed using a data shredding process, and wherein the logic operand comprises an exclusive-or (XOR) operator. The method further comprises restoring the data object by retrieving the encoded block of data and the data bits from the storage device; applying the logic operand to the encoded block of data and the data bits; associating a piece of metadata with the object to identify a correct block of data to be used to form the encoded block of data; using idle cycles to rearrange the encoded block of data and the data bits prior to the step of removing; determining whether the data deletion requirements can be satisfied; and informing a user whether the data deletion requirements cannot be satisfied.
- As shown in
FIG. 5 , the invention comprises asystem 500 comprising a datadeletion predictor component 510, which looks at the current state of thesystem 500 with respect to the number of objects and their physical deletion dates, the network speed, disk speeds, current normal I/O rate to determine whether data can be deleted as per the user requirements. If data cannot be physically deleted as per users wishes then thesystem 500 informs theuser 502 as such. Thesystem 500 allows the users to encrypt their data, so that the data can be logically deleted upon the expiration of data retention time, and subsequently physically deleted in a so-called “lazy” manner. A “lazy” manner means that the data will be deleted using a low priority background manner. The low priority process becomes active when there are no higher priority (normal read and write) tasks to be performed. - The
system 500 also comprises adata re-arranging component 515. Thesystem 500 initially places the data on thedisks 520 to optimize for read performance. However, when the data expiration time comes closer, as determined bytimer 530, then thesystem 500 re-organizes the data on thedisks 520 to reduce the data deletion time period. Data is moved tolow activity disks 525 so that when the data is being deleted, there is not much interference from other disk I/O traffic. Data is also re-organized on tracks to amortize disk seek and rotational delay times. The system further comprises a physicaldata deletion component 535, which physically writes random characters on thedisk 520 to erase previously existing data content. Generally, the system embodiment of the invention provides a storage device comprising an encoded block of data comprising a block of data and data bits; a data organizer operable for organizing the encoded block of data according to data deletion requirements; and a data deletion component operable for removing the data bits from the storage device if the data bits are organized within a specified data deletion requirement. - A representative hardware environment for practicing the present invention is depicted in
FIG. 6 , which illustrates a typical hardware configuration of an information handling/computer system in accordance with the invention, having at least one processor or central processing unit (CPU) 10. TheCPUs 10 are interconnected viasystem bus 12 to random access memory (RAM) 14, read-only memory (ROM) 16, an input/output (I/O)adapter 18 for connecting peripheral devices, such asdisk units 11 and tape drives 13, tobus 12,user interface adapter 19 for connectingkeyboard 15,mouse 17,speaker 24,microphone 22, and/or other user interface devices such as a touch screen device (not shown) tobus 12,communication adapter 20 for connecting the information handling system to a data processing network, anddisplay adapter 21 for connectingbus 12 to displaydevice 23. A program storage device readable by the disk or tape units is used to load the instructions, which operate the invention, which is loaded onto the computer system. - The invention achieves several advantages. The invention quickens the physical deletion of data in the following novel ways. There is an instant shredding of data within a user specified time limit. Data objects are placed on disk systems to optimize read or write performance. For example, data is stripped across multiple disks (e.g., RAID 0) to improve read performance times. Generally, when data is initially stored, it is stored to improve READ performance. Subsequently, the data is moved and re-allocated on the disk to speed up delete performance. When this occurs is determined based on the data expiration policy. Thus, when data is stored initially, it is not optimized for delete performance. Only after the invention is applied to the stored data, is the data optimized for delete performance. Another feature of the invention is that encrypting the data using a key (salt) is only necessary when the system determines that it cannot delete the data within the prescribed time period. Hence, one does not have to encrypt the data using the salt all the time this is an important point. Moreover, the invention provides a generalized approach which is adaptable to several different technologies and uses.
- According to the invention data is placed on disks to optimize delete performance. Delete performance is optimized both for user's data as well as the metadata that describes the place of the user's data on the disk. The system constantly monitors user's data creation rate, and it proactively warns the user if it cannot delete data within the user specified tolerance window. For example, users might want all of their data to be physically removed from the disk within twenty-four hours of the expiration of the data retention time. The system places data to optimize read performance, but subsequently, it dynamically re-organizes the data to optimize delete performance when it gets closer to the data expiration time. If the data cannot be physically deleted in the user desired time window, then the system provides the user with an option to encrypt the data so that the data can be logically deleted upon the expiration of the data retention time, and then subsequently physically removed in a so-called “lazy” manner.
- The foregoing description of the specific embodiments will so fully reveal the general nature of the invention that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the invention has been described in terms of preferred embodiments, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.
Claims (22)
1. A method of optimizing data placement on a storage device, said method comprising:
establishing a specified time constraint for which said storage device is to delete data stored thereon;
dividing a data object into a plurality of data bits;
programming a block of data and said data bits with a logic operand, if said storage device is incapable of deleting said data within said specified time constraint;
creating an encoded block of data from the programmed block of data and said data bits;
organizing said encoded block of data and said data bits in said storage device according to data deletion requirements;
providing a user with an option to encrypt said data bits prior to removal of said data bits from said storage device when said data deletion requirements cannot be satisfied within said specified time constraint;
removing said data bits from said storage device if said data bits are organized within a specified data deletion requirement;
dynamically re-organizing said data bits when an expiration of said specified time constraint is nearly reached in order to optimize the removing process; and
removing said data bits from said storage device upon the expiration of said specified time constraint if said data bits are encrypted.
2. The method of claim 1 , wherein said data bits are removed using a data shredding process.
3. The method of claim 1 , wherein said logic operand comprises an exclusive-or (XOR) operator.
4. The method of claim 3 , further comprising restoring said data object by:
retrieving said encoded block of data and said data bits from said storage device; and
applying said logic operand to said encoded block of data and said data bits.
5. The method of claim 1 , further comprising associating a piece of metadata with said data object to identify a correct block of data to be used to form said encoded block of data.
6. The method of claim 1 , further comprising using idle cycles to rearrange said encoded block of data and said data bits prior to said step of removing.
7. The method of claim 1 , further comprising determining whether said data deletion requirements can be satisfied.
8. (cancelled).
9. A storage device comprising:
an encoded block of data comprising a block of data and data bits;
a data organizer operable for organizing said encoded block of data according to data deletion requirements;
a system adapted to provide a user with an option to encrypt said data bits if said data bits cannot be physically deleted from said storage device within a user-defined specified data deletion time constraint;
a data deletion component operable for removing said data bits from said storage device if said data bits are organized within a specified data deletion requirement, wherein said data deletion component is adapted to remove said data bits from said storage device upon the expiration of said specified time constraint if said data bits are encrypted,
wherein said data organizer is operable for dynamically re-organizing said data bits when an expiration of said specified time constraint is nearly reached in order to optimize the removal of said data bits from said storage device.
10. The storage device of claim 9 , wherein said data deletion component removes said data bits using a data shredding process.
11. The storage device of claim 9 , wherein said block of data and said data bits are adapted to be programmed with a logic operand, and wherein said logic operand comprises an exclusive-or (XOR) operator.
12. The storage device of claim 11 , fiber comprising a data restoration component.
13. The storage device of claim 9 , wherein said data organizer is operable for determining whether said data deletion requirements can be satisfied.
14. The storage device of claim 9 , wherein said data organizer is operable for informing a user whether said data deletion requirements cannot be satisfied.
15. A program storage device readable by computer, tangibly embodying a program of instructions executable by said computer to perform a method optimizing data placement on a storage disk said method comprising:
establishing a specified time constraint for which said storage device is to delete data stored thereon;
dividing a data object into a plurality of data bits;
programming a block of data and said data bits with a logic operand, if said storage device is incapable of deleting said data within said specified time constraint;
creating an encoded block of data from the programmed block of data and said data bits;
organizing said encoded block of data and said data bits in said storage device according to data deletion requirements;
providing a user with an option to encrypt said data bits prior to removal of said data bits from said storage device when said data deletion requirements cannot be satisfied within said specified time constraint;
removing said data bits from said storage device if said data bits are organized within a specified data deletion requirement;
dynamically re-organizing said data bits when an expiration of said specified time constraint is nearly reached in order to optimize the removing process; and
removing said data bits from said storage device upon the expiration of said specified time constraint if said data bits are encrypted.
16. The program storage device of claim 15 , wherein said data bits are removed using a data shredding process.
17. The program storage device of claim 15 , wherein said logic operand comprises an exclusive-or (XOR) operator.
18. The program storage device of claim 17 , further comprising restoring said data object by:
retrieving said encoded block of data and said data bits from said storage disk; and
applying said logic operand to said encoded block of data and said data bits.
19. The program storage device of claim 15 , further comprising associating a piece of metadata with said data object to identify a correct block of data to be used to form said encoded block of data.
20. The program storage device of claim 15 , further comprising using idle cycles to rearrange said encoded block of data and said data bits prior to said step of removing.
21. The program storage device of claim 15 , further comprising determining whether said data deletion requirements can be satisfied.
22. A method of optimizing data placement on a storage device, said method comprising:
establishing a specified time constraint for which said storage device is to delete data stored thereon;
dividing a data object into a plurality of data bits;
programming a block of data and said data bits with a logic operand, if said storage device is incapable of deleting said data within said specified time constraint;
creating an encoded block of data from the programmed block of data and said data bits;
associating a piece of metadata with said data object to identify a correct block of data to be used to form said encoded block of data;
organizing said encoded block of data and sad data bits in said storage device according to data deletion requirements;
informing a user whether said data deletion requirements cannot be satisfied within said specified time constraint;
using idle cycles to rearrange said encoded block of data and said data bits;
using a shredding process to remove said data bits from said storage device if said data bits are organized within a specified data deletion requirement;
dynamically re-organizing said data bits when an expiration of said specified time constraint is nearly reached in order to optimize the removing process; and
removing said data bits from said storage device upon the expiration of said specified time constraint if said data bits encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/795,648 US7216207B1 (en) | 2004-03-08 | 2004-03-08 | System and method for fast, secure removal of objects from disk storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/795,648 US7216207B1 (en) | 2004-03-08 | 2004-03-08 | System and method for fast, secure removal of objects from disk storage |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070088923A1 true US20070088923A1 (en) | 2007-04-19 |
US7216207B1 US7216207B1 (en) | 2007-05-08 |
Family
ID=37949458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/795,648 Expired - Fee Related US7216207B1 (en) | 2004-03-08 | 2004-03-08 | System and method for fast, secure removal of objects from disk storage |
Country Status (1)
Country | Link |
---|---|
US (1) | US7216207B1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218113A1 (en) * | 2005-03-22 | 2006-09-28 | International Business Machines Corporation | Method and system for shredding data within a data storage subsystem |
US20070204141A1 (en) * | 2006-02-27 | 2007-08-30 | Matsushita Electric Industrial Co., Ltd. | Recording medium, data management method, and program |
EP2026538A1 (en) * | 2007-08-15 | 2009-02-18 | Hitachi, Ltd. | System and method for data protection management for network storage |
US20120303587A1 (en) * | 2004-12-31 | 2012-11-29 | Emc Corporation | Backup information management |
US8676862B2 (en) | 2004-12-31 | 2014-03-18 | Emc Corporation | Information management |
US8745011B2 (en) | 2005-03-22 | 2014-06-03 | International Business Machines Corporation | Method and system for scrubbing data within a data storage subsystem |
US9026512B2 (en) | 2005-08-18 | 2015-05-05 | Emc Corporation | Data object search and retrieval |
US20150324130A1 (en) * | 2014-05-08 | 2015-11-12 | Unisys Corporation | Sensitive data file attribute |
CN105516548A (en) * | 2015-11-27 | 2016-04-20 | 中央电视台 | File pre-reading method and device |
US10976950B1 (en) | 2019-01-15 | 2021-04-13 | Twitter, Inc. | Distributed dataset modification, retention, and replication |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0511919D0 (en) * | 2005-06-11 | 2005-07-20 | Ibm | Device permitting partial disabling of information retrievability on worm media |
JP4769853B2 (en) * | 2008-09-19 | 2011-09-07 | 株式会社日立製作所 | Storage control device and data erasing method of storage device |
US9171004B2 (en) * | 2009-03-09 | 2015-10-27 | Sandisk Il Ltd. | System and method to respond to a data file deletion instruction |
WO2011104742A1 (en) * | 2010-02-23 | 2011-09-01 | Hitachi, Ltd. | Information processing device and data shredding method |
US9172990B2 (en) | 2011-06-24 | 2015-10-27 | Google Technology Holdings LLC | Method and device for optimizing storage of recorded video programs |
US9081672B1 (en) | 2013-05-30 | 2015-07-14 | Richard Michael Nemes | Methods and apparatus for information storage and retrieval using a caching technique with external-chain hashing and dynamic resource-dependent data shedding |
US10536538B2 (en) | 2016-09-16 | 2020-01-14 | Microsoft Technology Licensing, Llc | Secure data erasure verification in hyperscale computing systems |
US11768763B2 (en) * | 2020-07-08 | 2023-09-26 | Pure Storage, Inc. | Flash secure erase |
US11604760B2 (en) * | 2021-03-16 | 2023-03-14 | International Business Machines Corporation | Dynamic determination of retention periods for digital content |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US110353A (en) * | 1870-12-20 | Improvement in breech-loading fire-arms | ||
US4965828A (en) * | 1989-04-05 | 1990-10-23 | Quadri Corporation | Non-volatile semiconductor memory with SCRAM hold cycle prior to SCRAM-to-E2 PROM backup transfer |
US5893120A (en) * | 1997-01-02 | 1999-04-06 | Nemes; Richard Michael | Methods and apparatus for information storage and retrieval using a hashing technique with external chaining and on-the-fly removal of expired data |
US6134660A (en) * | 1997-06-30 | 2000-10-17 | Telcordia Technologies, Inc. | Method for revoking computer backup files using cryptographic techniques |
US6324676B1 (en) * | 1999-01-14 | 2001-11-27 | Xilinx, Inc. | FPGA customizable to accept selected macros |
US20020083081A1 (en) * | 2000-08-18 | 2002-06-27 | Chen Raymond C. | Manipulation of zombie files and evil-twin files |
US20030115263A1 (en) * | 2001-09-28 | 2003-06-19 | De Tran | Network projector interface system |
US20030182566A1 (en) * | 2001-03-09 | 2003-09-25 | Ryoko Kohara | Data storage apparatus |
US20040205088A1 (en) * | 2003-04-14 | 2004-10-14 | Novell, Inc. | Method and apparatus for moving data between storage devices |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6609176B1 (en) | 1999-12-27 | 2003-08-19 | Kabushiki Kaisha Toshiba | Disk control system and data rearrangement method |
JP3431581B2 (en) | 2000-06-29 | 2003-07-28 | 株式会社東芝 | Disk control system and data relocation method |
US7088910B2 (en) | 2001-02-09 | 2006-08-08 | Microsoft Corporation | Optimizing use of storage space in a video data recording system |
-
2004
- 2004-03-08 US US10/795,648 patent/US7216207B1/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US110353A (en) * | 1870-12-20 | Improvement in breech-loading fire-arms | ||
US4965828A (en) * | 1989-04-05 | 1990-10-23 | Quadri Corporation | Non-volatile semiconductor memory with SCRAM hold cycle prior to SCRAM-to-E2 PROM backup transfer |
US5893120A (en) * | 1997-01-02 | 1999-04-06 | Nemes; Richard Michael | Methods and apparatus for information storage and retrieval using a hashing technique with external chaining and on-the-fly removal of expired data |
US6134660A (en) * | 1997-06-30 | 2000-10-17 | Telcordia Technologies, Inc. | Method for revoking computer backup files using cryptographic techniques |
US6324676B1 (en) * | 1999-01-14 | 2001-11-27 | Xilinx, Inc. | FPGA customizable to accept selected macros |
US20020083081A1 (en) * | 2000-08-18 | 2002-06-27 | Chen Raymond C. | Manipulation of zombie files and evil-twin files |
US20030182566A1 (en) * | 2001-03-09 | 2003-09-25 | Ryoko Kohara | Data storage apparatus |
US20030115263A1 (en) * | 2001-09-28 | 2003-06-19 | De Tran | Network projector interface system |
US20040205088A1 (en) * | 2003-04-14 | 2004-10-14 | Novell, Inc. | Method and apparatus for moving data between storage devices |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120303587A1 (en) * | 2004-12-31 | 2012-11-29 | Emc Corporation | Backup information management |
US9454440B2 (en) | 2004-12-31 | 2016-09-27 | Emc Corporation | Versatile information management |
US8914328B2 (en) * | 2004-12-31 | 2014-12-16 | Emc Corporation | Backup information management |
US8676862B2 (en) | 2004-12-31 | 2014-03-18 | Emc Corporation | Information management |
US9892136B2 (en) | 2005-03-22 | 2018-02-13 | International Business Machines Corporation | Method and system for scrubbing data within a data storage subsystem |
US9208182B2 (en) | 2005-03-22 | 2015-12-08 | International Business Machines Corporation | Method and system for scrubbing data within a data storage subsystem |
US10169383B2 (en) | 2005-03-22 | 2019-01-01 | International Business Machines Corporation | Method and system for scrubbing data within a data storage subsystem |
US8745011B2 (en) | 2005-03-22 | 2014-06-03 | International Business Machines Corporation | Method and system for scrubbing data within a data storage subsystem |
US7308543B2 (en) * | 2005-03-22 | 2007-12-11 | International Business Machines Corporation | Method and system for shredding data within a data storage subsystem |
US20060218113A1 (en) * | 2005-03-22 | 2006-09-28 | International Business Machines Corporation | Method and system for shredding data within a data storage subsystem |
US9026512B2 (en) | 2005-08-18 | 2015-05-05 | Emc Corporation | Data object search and retrieval |
US20070204141A1 (en) * | 2006-02-27 | 2007-08-30 | Matsushita Electric Industrial Co., Ltd. | Recording medium, data management method, and program |
US20090049236A1 (en) * | 2007-08-15 | 2009-02-19 | Hitachi, Ltd. | System and method for data protection management for network storage |
EP2026538A1 (en) * | 2007-08-15 | 2009-02-18 | Hitachi, Ltd. | System and method for data protection management for network storage |
US20150324130A1 (en) * | 2014-05-08 | 2015-11-12 | Unisys Corporation | Sensitive data file attribute |
US9411513B2 (en) * | 2014-05-08 | 2016-08-09 | Unisys Corporation | Sensitive data file attribute |
CN105516548A (en) * | 2015-11-27 | 2016-04-20 | 中央电视台 | File pre-reading method and device |
CN105516548B (en) * | 2015-11-27 | 2019-01-11 | 中央电视台 | File pre-reading method and device |
US10976950B1 (en) | 2019-01-15 | 2021-04-13 | Twitter, Inc. | Distributed dataset modification, retention, and replication |
US11531484B1 (en) | 2019-01-15 | 2022-12-20 | Twitter, Inc. | Distributed dataset modification, retention, and replication |
Also Published As
Publication number | Publication date |
---|---|
US7216207B1 (en) | 2007-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7216207B1 (en) | System and method for fast, secure removal of objects from disk storage | |
US11586734B2 (en) | Systems and methods for protecting SSDs against threats | |
US8892905B2 (en) | Method and apparatus for performing selective encryption/decryption in a data storage system | |
US10158483B1 (en) | Systems and methods for efficiently and securely storing data in a distributed data storage system | |
Garfinkel et al. | Remembrance of data passed: A study of disk sanitization practices | |
US7570560B2 (en) | System and method for logical shredding of data stored on WORM media | |
US7571176B2 (en) | Selective file erasure using metadata modifications | |
US20140025963A1 (en) | Discarding sensitive data from persistent point-in-time image | |
Reardon et al. | On secure data deletion | |
CN107563192B (en) | Lesso software protection method and device, electronic equipment and storage medium | |
US20110185190A1 (en) | System and method for protecting content on a storage device | |
US11328069B2 (en) | Method and system for verifying a data erasure process | |
CN104572762B (en) | The method and apparatus for deleting and restoring video file | |
WO2007091652A1 (en) | Tally information management method and management device | |
CN109766215B (en) | Data processing method and device | |
JP4101975B2 (en) | Data recording / reproducing apparatus using portable storage medium | |
US8990589B1 (en) | System and method for robust full-drive encryption | |
US10762240B2 (en) | Anonymizing a file for diagnosis | |
US20110010559A1 (en) | Method for encrypting digital file, method for decrypting digital file, apparatus for processing digital file and apparatus for converting encryption format | |
AU2008344947B2 (en) | System and method for securely storing information | |
RU96433U1 (en) | FILE REMOVAL SYSTEM (FILE SHREDDER) | |
CN112214778A (en) | Method and system for realizing discrete encryption of local file through virtual file | |
US10956080B2 (en) | Erasure of data from a memory of a data storage apparatus by identifying available free space in the memory and iteratively writing a sequence of files decreasing size to the memory using a file-based protocol | |
US10324624B2 (en) | Decommissioning of source storages | |
JP2007316707A (en) | Delete data management system and method for database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20150508 |