Schemes for Privacy Data Destruction in a NAND Flash Memory
- Authors
- Ahn, Na-Young; Lee, Dong Hoon
- Issue Date
- 2019
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- NAND flash memory; privacy data; destruction; multi-level cell programming; partial overwriting; SLC programming; deletion duty pulse; garbage collection; data center
- Citation
- IEEE ACCESS, v.7, pp.181305 - 181313
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 7
- Start Page
- 181305
- End Page
- 181313
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/68991
- DOI
- 10.1109/ACCESS.2019.2958628
- ISSN
- 2169-3536
- Abstract
- We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privacy data is erased from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management problem arising from characteristics of a program operation and an erase operation of NAND flash memories. When updating pages or performing a garbage collection, there is a problem that valid data remains in at least one unmapped memory block. Is it possible to impose an obligation to delete privacy data from an existing NAND flash memory? This paper is the answer to this question. We propose a partial overwriting scheme, an SLC programming scheme, and a deletion duty pulse application scheme for invalid pages to effectively address privacy data destruction issues caused by the remaining data. Such privacy data destruction schemes basically utilize at least one state in which data can be written to programmed cells based on a multi-level cell program operation. Our privacy data destruction schemes have advantages in terms of block management as compared with conventional erasing schemes, and are significantly economical in terms of time and cost. The proposed privacy data destruction schemes may be easily applied to many storage devices and data centers using a NAND flash memory.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.