帳號:guest(216.73.216.146)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):潘子芹
作者(外文):Pan, Zih-Cing
論文名稱(中文):OCSSD上的鍵值存儲安全刪除方法
論文名稱(外文):Secure Deletion Approaches for Key-Value Storage on OCSSD
指導教授(中文):石維寬
指導教授(外文):Shih, Wei-Kuan
口試委員(中文):張原豪
梁郁珮
謝昀珊
口試委員(外文):Chang, Yuan-Hao
Liang, Yu-Pei
Hsieh, Yun-Shan
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學號:109062588
出版年(民國):112
畢業學年度:112
語文別:英文
論文頁數:24
中文關鍵詞:LevelDBLSM-treeOCSSD安全刪除
外文關鍵詞:LevelDBLSM-treeOCSSDData Sanitization
相關次數:
  • 推薦推薦:0
  • 點閱點閱:124
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
NVM Memory非揮發性記憶體(例如 NAND 快閃記憶體)中的安全資料刪除在資訊安全的考慮下,對於防止潛在的敏感資料洩露是不可忽視的議題。選擇安全刪除方法除了須考慮所涉及資料的敏感程度,同時在遵循SSD特性下實踐資料安全刪除。本研究中,我們提出了一種基於 LevelDB和 OCSSD 的新方法,針對寫入密集型資料庫,採用WiscKey將鍵值分離儲存的機制並設計了一個名為「Version Table」的溝通中樞,也就是作為資料庫中key和相關各版本的value log所在的中介。此外,當使用者操作「Erase」命令時,會同時觸發Data Snitization。因此當啟動Garbage Collection時,會優先考慮包含更高比例Sanitized data的block作為刪除對象,在不嚴重影響效能的前提下進行對資料安全刪除的操作。
Secure data deletion within non-volatile memory, such as NAND flash memory is necessary to guard sensitive data and thwart potential data breaches. The selection of a secure deletion method should align with the sensitivity of the data in question, while adhering to the best practices considering the characteristic of SSD. In this study, we propose a novel approach based on LSM-tree, LevelDB and OCSSD for write-intensive databases. To begin with, we adopted the strategy of WiscKey, which stores key and value in LSM-tree and value log, respectively. Further, we use a dedicated communication hub known as the "Version Table." This Version Table acts as an intermediary between the database, where keys and associated value logs reside. Moreover, when a user initiates a "Delete" operation, data sanitation procedures are triggered concurrently. Consequently, when the Garbage Collection process is invoked, blocks housing a higher proportion of sanitized data are accorded higher priority in the space reclamation process, optimizing data security and resource utilization.
Contents
Abstract (Chinese) I
Acknowledgements (Chinese) II
Abstract III
Contents IV
List of Figures VI
List of Tables VII
List of Algorithms VIII
1 Introduction 1
2 Background 2
2.1 Key-Value Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.1 Security Deletion of Key-Value Pair . . . . . . . . . . . . . . 2
2.2 LevelDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2.1 WiscKey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3 Open Channel SSDs (OCSSD) . . . . . . . . . . . . . . . . . . . . . 5
2.4 Hot-Cold separation . . . . . . . . . . . . . . . . . . . . . . . . . . 8
IV
3 Methodology 9
3.1 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Version Tracking Strategy . . . . . . . . . . . . . . . . . . . . . . . 9
3.3 Hot-Cold Separation . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4 Data Sanitization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4 Experimental Results 18
4.1 Yahoo! Cloud Serving Benchmark (YCSB) . . . . . . . . . . . . . . 19
4.2 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.3 Results and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3.1 Impact of Model Architecture . . . . . . . . . . . . . . . . . 20
4.3.2 Total Write Page Quantities . . . . . . . . . . . . . . . . . . 20
4.3.3 Garbage Collection and Number of Live Page Copying . . . 21
5 Conclusion 23
Bibliography 24
[1] Justin Sheehy and David Smith. Bitcask – a log-structured hash table for fast key/value data. Basho White Paper, 2010.
[2] J. Dean and S. Ghemawat. Leveidb. [online] Available:
http://code.google.com/p/leveldb, 2011.
[3] Andrea C. Arpaci-Dusseau Lanyue Lu, Thanumalayan Sankaranarayana Pillai and Madison. Remzi H. Arpaci-Dusseau. University of Wisconsin. Wisckey:Separating keys from values in ssd-conscious storage. fast16 2016, pages 1–8,2008.
[4] T.-W. Kuo J.-W. Hsieh and L.-P. Chang. Efficient identification of hot data for flash memory storage systems. ACM Transactions on Storage,vol. 2, (1),2006.
[5] Dongchul Park and David H.C. Du. Hot and cold data identification for flash memory using multiple bloom filters. FAST 11, page 1–11, 2011.
[6] Brian F. Cooper, Adam Silberstein, Erwin Tam, Raghu Ramakrishnan, and Russell Sears. Benchmarking cloud serving systems with ycsb. In Proc. of SoCC, 2010.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *