Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flash memory secure deletion method and system based on file-level granularity

A security deletion, file-level technology, applied in the direction of input/output to the record carrier, etc., can solve the problems of large delay and low efficiency

Active Publication Date: 2017-08-11
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Aiming at the above defects or improvement needs of the prior art, the present invention provides a method and system for securely deleting flash memory based on file-level granularity, the purpose of which is to transfer files to the bottom layer by assigning a GUID number to each file information, so that the device can grasp the storage location of the file data block and record the invalid physical pages generated by each file in real time; when the user deletes a file, the device can find all invalid physical pages and all valid physical pages corresponding to the file through the delete command , and then use the physical page overwriting method to overwrite all the physical pages of the file to achieve the purpose of securely deleting the file, thereby solving the technical problems of low efficiency and large delay in the existing flash memory secure deletion technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flash memory secure deletion method and system based on file-level granularity
  • Flash memory secure deletion method and system based on file-level granularity
  • Flash memory secure deletion method and system based on file-level granularity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084]In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0085] Such as figure 2 Shown, the inventive method comprises the following steps:

[0086] (1) GUID allocation and encapsulation: assign a globally unique identifier GUID for each file, and encapsulate the GUID of the file into the write and delete request of the file; if it is a write request, then enter step (2); if it is a delete request, then Go to step (5);

[0087] (2) Write medium jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a flash memory secure deletion method based on file-level granularity and belongs to the field of computer storage. According to the method, a globally unique identifier (GUID) is distributed for each file, each GUID is encapsulated to each writing request and each deletion request of the corresponding file, and meanwhile a GUID-page adjacency list is constructed and used for recording invalid physical pages corresponding to each file in real time; and when a user deletes a certain file, equipment can find all the invalid physical pages and all valid physical pages corresponding to the file through a deletion command, and then a physical page overwriting technology is used for overwriting all the physical pages of the file to achieve the purpose of deleting the file securely. The invention furthermore discloses a flash memory secure deletion system based on file-level granularity. Through the technical scheme, the problem that a single file cannot be deleted efficiently and securely through an existing solid-state disk based on a flash memory medium is solved, and influences of secure deletion on read-write performance are reduced on the basis of securely deleting a single file through the solid-state disk.

Description

technical field [0001] The invention belongs to the field of computer storage, and more specifically relates to a method and system for securely deleting flash memory based on file-level granularity. Background technique [0002] With the development of data recovery technology, it is difficult for the current computer system to completely delete files. By recovering and processing the remaining data on the storage medium, attackers can steal the deleted confidential information, which has become an important hidden danger to the information security of the storage system. A survey report in 2016 found that from more than 200 second-hand hard drives (93% were mechanical hard drives, and the rest were SSDs), it was found that more than 78% of second-hand hard drives had residual data, and 67% of them could recover personal secrets information, 11% of hard drives contain sensitive company data. In addition, the survey shows that 36% of the hard disks contain residual data, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06
Inventor 童薇刘景宁冯丹雷霞方才华高阳蒋瑜魏学亮
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products