Method and system for policy-based secure destruction of data
First Claim
Patent Images
1. A method for policy-based secure destruction of data, the method comprising:
- storing a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device;
referencing the data destruction policy to obtain the at least one predetermined data destruction parameter in response to a predetermined data operation;
identifying an entire stored data object to be destroyed based on the data destruction policy in response to the predetermined data operation, the entire stored data object associated with a stored object header; and
executing a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the entire stored data object has been destroyed by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object, wherein the entire stored data object is unusable; and
auditing a selected storage volume to determine whether the data destruction policy has been accurately applied, the selected storage volume comprising the entire stored data object, wherein auditing includes determining whether the stored object header has been overwritten with the dummy header.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus, system, and method are disclosed for policy-based secure destruction of data. The method for policy-based secure destruction of data is provided. In one embodiment, the method includes storing a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter. The method may also include referencing the data destruction policy to obtain the data destruction parameters in response to a predetermined data operation. In a further embodiment, the method may include executing a data destruction process in accordance with the data destruction parameters.
14 Citations
16 Claims
-
1. A method for policy-based secure destruction of data, the method comprising:
-
storing a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device; referencing the data destruction policy to obtain the at least one predetermined data destruction parameter in response to a predetermined data operation; identifying an entire stored data object to be destroyed based on the data destruction policy in response to the predetermined data operation, the entire stored data object associated with a stored object header; and executing a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the entire stored data object has been destroyed by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object, wherein the entire stored data object is unusable; and auditing a selected storage volume to determine whether the data destruction policy has been accurately applied, the selected storage volume comprising the entire stored data object, wherein auditing includes determining whether the stored object header has been overwritten with the dummy header. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for policy-based secure destruction of data, the system comprising:
-
a storage server configured to; store a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device; reference the data destruction policy to obtain the at least one data destruction parameter in response to a predetermined data operation, the at least one data destruction parameter specifying at least how the stored data is to be destroyed according to one of a plurality of data destruction protocols in response to the predetermined data operation; identify an entire data object to be destroyed based on the data destruction policy in response to the predetermined data operation, the entire stored data object associated with a stored object header; and execute a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the stored data object has been destroyed by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object, wherein the entire data object is unusable; audit a selected storage volume to determine whether the data destruction policy has been accurately applied, the selected storage volume comprising the entire stored data object, wherein auditing includes determining whether the stored object header has been overwritten with the dummy header; and a storage medium in communication with the storage server, configured to store data objects for the storage server. - View Dependent Claims (9, 10)
-
-
11. A computer program product comprising a non-transitory computer useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to perform operations for policy-based secure destruction of data, the operations comprising:
-
storing a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device; referencing the data destruction policy to obtain the at least one predetermined data destruction parameter in response to a predetermined data operation, the at least one data destruction parameter specifying at least how the stored data is to be destroyed according to one of a plurality of data destruction protocols in response to the predetermined data operation; identifying an entire stored data object to be destroyed based on the data destruction policy in response to the predetermined data operation, the entire stored data object associated with a stored object header; executing a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the over overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the stored data object has been destroyed by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object; and auditing a selected storage volume to determine whether the data destruction policy has been accurately applied, the selected storage volume comprising the entire stored data object, wherein auditing includes determining whether the stored object header has been overwritten with the dummy header. - View Dependent Claims (12, 13)
-
-
14. An apparatus for policy-based secure destruction of data, the apparatus comprising:
-
a memory configured to store a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device; a referencing module configured to identify an stored entire data object to be destroyed based on the data destruction policy and reference the data destruction policy to obtain the at least one data destruction parameter in response to a predetermined data operation, the at least one data destruction parameter specifying at least how the stored data is to be destroyed according to one of a plurality of data destruction protocols in response to the predetermined data operation; a processor configured to execute a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the entire stored data object has been overwritten by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object; and an audit module configured to audit a selected storage volume to determine whether the data destruction policy has been accurately applied, wherein auditing includes determining whether data object header values associated with data objects match expected data object header values. - View Dependent Claims (15, 16)
-
Specification