IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances

08/09/2023
by   Na-Young Ahn, et al.
0

NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT security, these retention issues are significant and require a robust solution for secure deletion. Secure deletion methods can be categorized into off-chip and on-chip schemes. Off-chip secure deletion schemes, based on block-level erasure operations, are unable to perform real-time trim operations. Consequently, they are vulnerable to hacking threats. On the other hand, on-chip secure deletion schemes enable real-time trim operations by performing deletion on a page-by-page basis. However, the on-chip scheme introduces a challenge of program disturbance for neighboring page data. The proposed on-chip deletion scheme tackles this problem by utilizing ECC code modulation through a partial program operation. This approach significantly reduces the program disturbance issue associated with neighboring page data. Moreover, the proposed code modulation secure deletion scheme allows for real-time verification of the deletion of original data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/10/2023

Accelerating Secure and Verifiable Data Deletion in Cloud Storage via SGX and Blockchain

Secure data deletion enables data owners to fully control the erasure of...
research
08/02/2022

Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

NAND flash memory-based IoT device can potentially still leave behind or...
research
12/28/2019

Schemes for Privacy Data Destruction in a NAND Flash Memory

We propose schemes for efficiently destroying privacy data in a NAND fla...
research
11/04/2017

Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

Energy harvesting is a promising solution to power Internet of Things (I...
research
04/09/2018

Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications

The advances of cloud computing, fog computing and Internet of Things (I...
research
07/23/2023

ACE: A Consent-Embedded privacy-preserving search on genomic database

In this paper, we introduce ACE, a consent-embedded searchable encryptio...

Please sign up or login with your details

Forgot password? Click here to reset