{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:03:55Z","timestamp":1764403435094,"version":"3.41.2"},"reference-count":53,"publisher":"Oxford University Press (OUP)","issue":"7","license":[{"start":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T00:00:00Z","timestamp":1740355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The \u2018out-of-place\u2019 update nature of Solid State Drives (SSDs) introduces a security risk. Scrubbing, a secure deletion method, mitigates this issue but negatively affects SSD endurance and requires redundant data for recovery due to page errors. Previously, the RAID-5 based scheme was used to manage redundant data. While effective for reading, it causes significant write latency due to the channel blocking issue. In response, we propose FlashFox, which integrates secret sharing and Reed-Solomon coding into SSDs, enabling the application of scrubbing within an encrypted storage environment. This innovation ensures secure deletion by cleaning up sensitive data, thereby reducing wear on SSD endurance. Furthermore, we have developed a RAID-4-based scheme for implementing FlashFox on SSDs. This scheme, by assigning specific channels to manage redundant data, successfully avoids the channel blocking issue prevalent in RAID-5. Experimental results show FlashFox reduces endurance wear by at least 15% compared to traditional scrubbing methods and writing response delay by at least 8$\\times $ compared to RAID-5 based scheme.<\/jats:p>","DOI":"10.1093\/comjnl\/bxae145","type":"journal-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T23:21:22Z","timestamp":1738884082000},"page":"734-748","source":"Crossref","is-referenced-by-count":1,"title":["FlashFox: a secret-sharing approach to securing data deletion for Flash-based SSD"],"prefix":"10.1093","volume":"68","author":[{"given":"Wen","family":"Cheng","sequence":"first","affiliation":[{"name":"Zhejiang Lab , Hangzhou 310000 ,","place":["China"]}]},{"given":"Shengxia","family":"Tu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co Ltd , Shenzhen 518055 ,","place":["China"]}]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang Lab , Hangzhou 310000 ,","place":["China"]}]},{"given":"Lingfang","family":"Zeng","sequence":"additional","affiliation":[{"name":"Zhejiang Lab , Hangzhou 310000 ,","place":["China"]}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology , Chinese Academy of Sciences, Shenzhen 518055 ,","place":["China"]}]},{"given":"Andr\u00e9","family":"Brinkmann","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johannes Gutenberg-University Mainz , Mainz 55128 ,","place":["Germany"]}]}],"member":"286","published-online":{"date-parts":[[2025,2,24]]},"reference":[{"key":"2025071900320092400_ref1","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1109\/JPROC.2017.2725738","article-title":"Reliability of solid-state drives based on NAND flash memory","volume":"105","author":"Mielke","year":"2017","journal-title":"Proc IEEE"},{"key":"2025071900320092400_ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/DAC56929.2023.10247911","article-title":"A fast secure deletion strategy for high-density flash memory through wom-v codes","volume-title":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","author":"Cui","year":"2023"},{"key":"2025071900320092400_ref3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1631\/FITEE.2200317","article-title":"A survey on design and application of open-channel solid-state drives","volume":"24","author":"Chen","year":"2023","journal-title":"Front Inf Technol Electr Eng"},{"key":"2025071900320092400_ref4","first-page":"1","article-title":"Mitigating negative impacts of read disturb in SSDs","volume":"26","author":"Li","year":"2020","journal-title":"ACM Trans Des Autom Electr Syst"},{"key":"2025071900320092400_ref5","first-page":"359","article-title":"LightNVM: The linux Open-ChannelSSD subsystem","volume-title":"15th USENIX conference on file and storage technologies (FAST 17)","author":"Bj\u00f8rling","year":"2017"},{"key":"2025071900320092400_ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3579371.3589071","article-title":"Venice: improving solid-state drive parallelism at low cost via conflict-free accesses","volume-title":"Proceedings of the 50th annual international symposium on computer architecture","author":"Nadig","year":"2023"},{"key":"2025071900320092400_ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0599-3_9","volume-title":"Reliability Issues in Flash-Memory-Based Solid-State Drives: Experimental Analysis, Mitigation, Recovery. Springer Series in Advanced Microelectronics","author":"Cai","year":"2018"},{"key":"2025071900320092400_ref8","first-page":"341","article-title":"Press: Persistence relaxation for efficient and secure data sanitization on zoned namespace storage: (invited paper)","volume-title":"2024 29th Asia and South Pacific design automation conference (ASP-DAC)","author":"Hsieh"},{"key":"2025071900320092400_ref9","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/SP.2019.00088","article-title":"Self-encrypting deception: weaknesses in the encryption of solid state drives","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Meijer","year":"2019"},{"key":"2025071900320092400_ref10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3639826","article-title":"Polling sanitization to balance i\/o latency and data security of high-density SSDs","volume":"20","author":"Wu","journal-title":"ACM Trans Storage"},{"key":"2025071900320092400_ref11","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/Indo-TaiwanICAN48429.2020.9181335","article-title":"Challenges and designs for secure deletion in storage systems","volume-title":"2020 Indo\u2013Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","author":"Wang","year":"2020"},{"key":"2025071900320092400_ref12","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.23919\/CCC50068.2020.9189542","article-title":"Review of NAND flash information erasure based on overwrite technology","volume-title":"2020 39th Chinese Control Conference (CCC)","author":"Wang","year":"2020"},{"key":"2025071900320092400_ref13","doi-asserted-by":"crossref","DOI":"10.1145\/3488932.3523255","article-title":"Duplicates also matter! Towards secure deletion on flash-based storage media by removing duplicates","volume-title":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","author":"Chen","year":"2022"},{"key":"2025071900320092400_ref14","doi-asserted-by":"publisher","first-page":"2790","DOI":"10.1109\/TCAD.2018.2857260","article-title":"Scrubbing-aware secure deletion for 3-D NAND flash","volume":"37","author":"Wang","year":"2018","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"2025071900320092400_ref15","article-title":"Solid state drives data reliability and lifetime","volume-title":"Imation White Paper","author":"Olson","year":"2008"},{"key":"2025071900320092400_ref16","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.mee.2008.08.007","article-title":"Future challenges of flash memory technologies","volume":"86","author":"Lu","year":"2009","journal-title":"Microelectron Eng"},{"key":"2025071900320092400_ref17","doi-asserted-by":"publisher","first-page":"022079","DOI":"10.1088\/1742-6596\/1679\/2\/022079","article-title":"Theoretical analysis of the data recovery time in the fault-tolerant disk arrays RAID-5 and RAID-6 with data striping","volume":"1679","author":"Rahman","year":"2020","journal-title":"J Phys: Conf Ser"},{"key":"2025071900320092400_ref18","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/978-3-642-38027-3_54","article-title":"Per-file secure deletion combining with enhanced reliability for SSDs","volume-title":"Grid and pervasive computing: 8th international conference, GPC 2013 and Colocated workshops,","author":"Qin","year":"2013"},{"key":"2025071900320092400_ref19","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1109\/TPDS.2013.279","article-title":"A new parity-based migration method to expand RAID-5","volume":"25","author":"Mao","year":"2013","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2025071900320092400_ref20","first-page":"1","article-title":"Per-file secure deletion for flash-based solid state drives","volume-title":"Proceeding of the IEEE International Conference on Networking, Architecture and Storage (NAS)","author":"Xiao","year":"2019"},{"key":"2025071900320092400_ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SoutheastCon44009.2020.9249760","article-title":"Survey of solid state drives, characteristics, technology, and applications","volume-title":"2020 SoutheastCon","author":"Riggs","year":"2020"},{"key":"2025071900320092400_ref22","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/TCAD.2020.3020495","article-title":"Leveraging the interplay of RAID and SSD for lifetime optimization of flash-based SSD RAID","volume":"40","author":"Shen","year":"2020","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"2025071900320092400_ref23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","article-title":"Secret-sharing schemes: a survey","volume-title":"International conference on coding and cryptology","author":"Beimel","year":"2011"},{"key":"2025071900320092400_ref24","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"Reed","year":"1960","journal-title":"J Soc Ind Appl Math"},{"key":"2025071900320092400_ref25","first-page":"218","article-title":"Dual RAID: a scheme for high reliable all flash array","volume-title":"Proceeding of the International Joint Conference on Computer Science and Software Engineering","author":"Yi","year":"2014"},{"key":"2025071900320092400_ref26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1669112.1669118","article-title":"Characterizing flash memory: anomalies, observations, and applications","volume-title":"Proceedings of the 42nd annual IEEE\/ACM international symposium on microarchitecture","author":"Grupp","year":"2009"},{"key":"2025071900320092400_ref27","first-page":"333","article-title":"Data node encrypted file system: efficient secure deletion for flash memory","volume-title":"21st USENIX security symposium (USENIX security 12)","author":"Reardon","year":"2012"},{"key":"2025071900320092400_ref28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2009.89","article-title":"Disposal of disk and tape data by secure sanitization","volume":"7","author":"Hughes","year":"2009","journal-title":"IEEE Secur Priv"},{"key":"2025071900320092400_ref29","first-page":"521","article-title":"SafeVanish: an improved data self-destruction for protecting data privacy","volume-title":"Proceeding of the 2nd IEEE International Conference on Cloud Computing Technology and Science","author":"Zeng","year":"2010"},{"key":"2025071900320092400_ref30","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TDSC.2012.49","article-title":"Secure overlay cloud storage with access control and assured deletion","volume":"9","author":"Yang","year":"2012","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"2025071900320092400_ref31","doi-asserted-by":"crossref","DOI":"10.1145\/3240765.3240773","article-title":"Achieving fast sanitization with zero live data copy for mlc flash memory","volume-title":"Proceeding of the IEEE\/ACM international conference on computer-aided design (ICCAD)","author":"Lin","year":"2018"},{"key":"2025071900320092400_ref32","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/3338840.3355639","article-title":"A data sanitization method for mobile devices with NAND flash memory","volume-title":"Proceedings of the conference on research in adaptive and convergent systems (RACS), September","author":"Wu","year":"2019"},{"key":"2025071900320092400_ref33","doi-asserted-by":"crossref","DOI":"10.1145\/3578353.3589541","article-title":"Lethe: secure deletion by addition","volume-title":"Proceedings of the 3rd Workshop on Challenges and Opportunities of Efficient and Performant Storage Systems","author":"Chou","year":"2023"},{"key":"2025071900320092400_ref34","doi-asserted-by":"crossref","DOI":"10.1109\/ICAICA54878.2022.9844604","article-title":"CPSD: a data security deletion algorithm based on copyback command","volume-title":"2022 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","author":"Zhu","year":"2022"},{"key":"2025071900320092400_ref35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/ICCD50377.2020.00041","article-title":"AetEC: adaptive error-tolerant erasure coding scheme within SSDs","volume-title":"2020 IEEE 38th International Conference on Computer Design (ICCD)","author":"Zhan","year":"2020"},{"key":"2025071900320092400_ref36","first-page":"203","article-title":"Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization","volume-title":"Proceedings of the 23rd ACM symposium on operating systems principles (SOSP)","author":"Zhang","year":"2011"},{"key":"2025071900320092400_ref37","doi-asserted-by":"publisher","first-page":"2548","DOI":"10.1109\/TMAG.2013.2248138","article-title":"SeDas: a self-destructing data system based on active storage framework","volume":"49","author":"Zeng","year":"2013","journal-title":"IEEE Trans Magn"},{"key":"2025071900320092400_ref38","article-title":"Defeating vanish with low-cost Sybil attacks against large DHTs","volume-title":"Proceeding of the 17th network and distributed system security symposium (NDSS)","author":"Wolchok","year":"2010"},{"key":"2025071900320092400_ref39","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun ACM"},{"key":"2025071900320092400_ref40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.01.038","article-title":"Secret sharing with secure secret reconstruction","volume":"519","author":"Harn","year":"2020","journal-title":"Inform Sci"},{"key":"2025071900320092400_ref41","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1109\/TC.2023.3262922","article-title":"Reed-Solomon coding algorithms based on reed-muller transform for any number of parities","volume":"72","author":"Yu","year":"2023","journal-title":"IEEE Trans Comput"},{"key":"2025071900320092400_ref42","doi-asserted-by":"crossref","DOI":"10.1145\/3618260.3649634","article-title":"Randomly punctured Reed\u2013Solomon codes achieve list-decoding capacity over linear-sized fields","volume-title":"Proceedings of the 56th annual ACM symposium on theory of computing STOC \u201824","author":"Alrabiah","year":"2024"},{"key":"2025071900320092400_ref43","article-title":"AONT-RS: blending security and performance in dispersed storage systems","volume-title":"9th USENIX conference on file and storage technologies (FAST 11)","author":"Resch","year":"2011"},{"key":"2025071900320092400_ref44","article-title":"Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds","volume-title":"6th USENIX workshop on hot topics in storage and file systems (HotStorage 14)","author":"Li","year":"2014"},{"article-title":"An XOR-based erasure-resilient coding scheme","year":"1995","author":"Bloemer","key":"2025071900320092400_ref45"},{"key":"2025071900320092400_ref46","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/1995896.1995912","article-title":"Performance impact and interplay of SSD parallelism through advanced commands, allocation strategy and data granularity","volume-title":"Proceedings of the international conference on supercomputing (ICS \u201811)","author":"Hu","year":"2011"},{"volume-title":"Oltp Application i\/o","author":"UMassTraceRepository","key":"2025071900320092400_ref47"},{"volume-title":"Microsoft Production Server Traces: Development Tools Release","author":"storage, A. and information technology","key":"2025071900320092400_ref48"},{"volume-title":"Microsoft Production Server Traces: Msn Storage File Server","author":"storage, A. and information technology","key":"2025071900320092400_ref49"},{"key":"2025071900320092400_ref50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MSST.2010.5496997","article-title":"Delayed partial parity scheme for reliable and high-performance flash memory SSD","volume-title":"2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)","author":"Im","year":"2010"},{"key":"2025071900320092400_ref51","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1145\/1982185.1982266","article-title":"A lifespan-aware reliability scheme for RAID-based flash storage","volume-title":"Proceedings of the 2011 ACM symposium on applied computing","author":"Lee","year":"2011"},{"author":"OpenSSL, Inc","key":"2025071900320092400_ref52"},{"article-title":"SAFE: fast, verifiable sanitization for SSDs","year":"2010","author":"Swanson","key":"2025071900320092400_ref53"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/7\/734\/62083360\/bxae145.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/7\/734\/62083360\/bxae145.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T04:32:16Z","timestamp":1752899536000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/68\/7\/734\/8034846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,24]]},"references-count":53,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,2,24]]},"published-print":{"date-parts":[[2025,7,16]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxae145","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2025,7]]},"published":{"date-parts":[[2025,2,24]]}}}