Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.5.1141

Sanitization of Open-Source Based Deduplicated Filesystem  

Cho, Hyeonwoong (Graduate School of Information, Yonsei University)
Kim, SeulGi (Graduate School of Information, Yonsei University)
Kwon, Taekyoung (Graduate School of Information, Yonsei University)
Abstract
Deduplicated filesystem can reduce usage of storage. However, it be able to recover deleted block. We studied sanitization of deduplicated filesystem, LessFS which is based on FUSE(Filesystem in USErspace). First, we show a vulnerability recover deleted data in the deduplicated filesystem. We implement sanitization of deduplicated filesystem considering the part of fingerprint DB with data blocks. It takes 60~70 times compared to without sanitization. Which means access time to fingerprint DB and overhead derived from increase of number of chunk have a critical impact on sanitization time. But in case of more than 65,536 Byte of chunksize, it is faster than normal filesystem without deduplication.
Keywords
deduplication; sanitization; FUSE; LessFS; filesystem;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. Kissel, M. Scholl, S. Skolochenko, and X. Li, "Guidelines for Media Sanitization," September 2006, National Institute of Standards and Technology, 2006.
2 M. Y. C. Wei, L. M. Grupp, F. E. Spada, and S. Swanson, "Reliably Erasing Data From Flash-Based Solid State Drives", 9th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, pp. 105-117, 2011.
3 F. C. Botelho, P. Shilane, N. Garg, and W. Hsu, "Memory efficient Sanitization of a Deduplicated Storage System", 11th USENIX Conference on File and Storage Technologies, San Jose, CA, USA, pp. 81-94, 2013.
4 D. Bhagwat, K. Eshghi, D. D. Long, and M. Lillibridge, "Extreme binning: scalable, parallel deduplication for chunk-based file backup", In Proceedings of the 17th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp. 1-9, 2009.
5 Detecting duplicate and near-duplicate files, US Patent 6658423 Issued on December 2, 2003.
6 D. Harnik, E. Khaitzin, and D. Sotnikov (2016), "Estimating Unseen Deduplication-from Theory to Practice", 14th USENIX Conference on File and Storage Technologies, Santa Clara, CA, USA, pp. 277-290, 2016.
7 Sung-ouk Jung, and, Hoon Choi, "Performance Analysis of Open Source BasedDistributed Deduplication File System", KIISE Transactions on Computing Practices, Vol.20, No. 12, pp. 623-631, 2014.   DOI
8 Val Henson, An analysis of compare-by-hash, 9th Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
9 D. Meister and A. Brinkmann, "Multi-level Comparison of Data Deduplication in a Backup Scenario", In Proceedings of the 2nd Israeli Experimental Systems Conference (SYSTOR), pp. 8:1-8:12, (2009).
10 P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," USENIX Security Symposium, pp. 77-89, 1996,
11 D. T. Meyer, and W. J. Bolosky (2011), "A Study of Practical Deduplication", 9th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, pp. 1-14, 2011.