The present invention relates generally to the data storage field, and more particularly, relates to a method and apparatus for implementing secure erase for solid state drives (SSDs).
United States Patent Application 2009/0119191, application Ser. No. 11/923,123 filed Oct. 24, 2007 to Marco Sanvido et al., and assigned to the present assignee discloses techniques for encrypting data stored on data storage devices using an intermediate key. A data storage device encrypts data stored in non-volatile memory using a bulk encryption key. The data storage device uses a key derivation function to generate an initial encryption key. The data storage device then wraps an intermediate encryption key with the initial encryption key and stores the wrapped intermediate key in the non-volatile memory. The data storage device wraps the bulk encryption key with the intermediate encryption key and stores the wrapped bulk encryption key in the non-volatile memory. The data storage device can unwrap the wrapped intermediate key to generate the intermediate encryption key using the initial encryption key. The data storage device can unwrap the wrapped bulk encryption key to generate the bulk encryption key using the intermediate encryption key. The data storage device decrypts data stored in the non-volatile memory using the bulk encryption key. Bulk encrypting data prevents hard disk drives (HDDs) with user data from being disclosed to unauthorized individuals. Bulk encryption can also be used to enable a fast secure erase of data on a HDD, or to simplify the redeployment and decommissioning of used systems.
In solid state drives (SSDs), extra memory cells beyond what is allocated to the file system are used for wear leveling. The wear-leveling feature distributes data across that larger area to extend the life of the SSD. These cells may be swapped in and out of the area used by the file system.
It is desirable to use bulk encryption to simplify the erasure task for SSDs. A need exists to provide effective, secure and efficient secure erase functionality for solid state drives (SSDs).
Aspects of the present invention are to provide a method and apparatus for implementing secure erase for solid state drives (SSDs). Other important aspects of the present invention are to provide such method and apparatus substantially without negative effect and that overcome some of the disadvantages of prior art arrangements.
In brief, a method and apparatus are provided for implementing secure erase for solid state drives (SSDs). An encryption key is used to encrypt data being written to SSD. A controller identifies a key storage option, and responsive to the identified key storage option, stores a key for data encryption and decryption. The controller responsive to the identified key storage option, deletes the key within the SSD and data is effectively erased.
The present invention together with the above and other objects and advantages may best be understood from the following detailed description of the preferred embodiments of the invention illustrated in the drawings, wherein:
In the following detailed description of embodiments of the invention, reference is made to the accompanying drawings, which illustrate example embodiments by which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the invention.
Having reference now to the drawings, in
SSD 102 implements secure erase, ensuring that once a key used for bulk encryption is deleted, the key is not recoverable in accordance with embodiments of the invention. The controller 106 of SSD 102 includes firmware that is given direct access to erase flash blocks 112. The firmware of controller 106 of SSD 102 is given information on the flash translation layer/wear leveling functional block 110, for searching and deletion and overwriting keys in the flash block 112, and for garbage collection to delete duplicate keys created from wear-leveling.
Referring now to
Erasing the key with the key distribution 200 or split key storage option 200 of
In
In
Key A stored on all physical addresses with same residue A mod p.
Host 104 erases block A, controller 106 erases all blocks with physical addresses N, such that N mod p=A.
When the key needs to be erased, the firmware of controller 106 erases the key and requests garbage collection so that all the locations containing the key and that were not reused are erased for effectively and securely erasing data.
In
As indicated at a block 406 when the flash option, such as illustrated in
In
As indicated at a block 414 with the flash option, such as illustrated in
As indicated at a block 416, another embodiment of the invention includes the controller 106, upon receiving a host instruction to purge date, first disabling host access and blocking remapping, then entering a selected purging mode. The purging mode can employ operations for effectively and securely erasing data as indicated at a block 418, or as indicated at a block 420 or both operations at blocks 418, and 420. Searching for keys within the flash, then deletion/overwriting of the keys are performed at block 418. At block 420, garbage collection is performed to delete duplicate keys created from wear-leveling.
Referring now to
A sequence of program instructions or a logical assembly of one or more interrelated modules defined by the recorded program means or control code 504, 506, 508, 510, direct SSD controller 106 of the system 100 for implementing secure erase of the embodiments of the invention.
While the present invention has been described with reference to the details of the embodiments of the invention shown in the drawing, these details are not intended to limit the scope of the invention as claimed in the appended claims.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5623546 | Hardy et al. | Apr 1997 | A |
| 20020019935 | Andrew et al. | Feb 2002 | A1 |
| 20030084290 | Murty et al. | May 2003 | A1 |
| 20030110382 | Leporini et al. | Jun 2003 | A1 |
| 20030174840 | Bogan | Sep 2003 | A1 |
| 20050138374 | Zheng et al. | Jun 2005 | A1 |
| 20080065905 | Salessi | Mar 2008 | A1 |
| 20080183953 | Flynn et al. | Jul 2008 | A1 |
| 20080282027 | Chen et al. | Nov 2008 | A1 |
| 20080313453 | Booth et al. | Dec 2008 | A1 |
| 20090043831 | Antonopoulos et al. | Feb 2009 | A1 |
| 20090044003 | Berthiaume et al. | Feb 2009 | A1 |
| 20090094406 | Ashwood | Apr 2009 | A1 |
| 20090110191 | Sanvido et al. | Apr 2009 | A1 |
| 20100154053 | Dodgson et al. | Jun 2010 | A1 |
| 20100229005 | Herman et al. | Sep 2010 | A1 |
| 20110035813 | Trantham | Feb 2011 | A1 |
| 20110041039 | Harari et al. | Feb 2011 | A1 |
| 20110085657 | Matthews, Jr. | Apr 2011 | A1 |
| 20110087896 | Thom et al. | Apr 2011 | A1 |
| Number | Date | Country | |
|---|---|---|---|
| 20110154060 A1 | Jun 2011 | US |