Towards Tamper-evident Storage on Patterned Media

We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irreversibly by precise local heating. We discuss the main issues of designing a tamper-evident storage device and file system using the properties of the medium.

[1]  Mark Taylor,et al.  The EU Data Retention Directive , 2006, Comput. Law Secur. Rev..

[2]  L. Abelmann,et al.  Magnetic force microscopy of thin film media for high density magnetic recording , 1998 .

[3]  Sean Matthew Dorward,et al.  Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .

[4]  S. Naberhuis Probe-based recording technology , 2002 .

[5]  Aiko Pras,et al.  Data on Retention , 2005, DSOM.

[6]  Peter Gutmann,et al.  Secure deletion of data from magnetic and solid-state memory , 1996 .

[7]  B. Terris,et al.  Nanofabricated and self-assembled magnetic structures as data storage media , 2005 .

[8]  Noga Alon,et al.  Scalable Secure Storage When Half the System Is Faulty , 2000, Inf. Comput..

[9]  Isaak D. Mayergoyz,et al.  Magnetic imaging on a spin-stand , 2000 .

[10]  Sara McMains,et al.  File System Logging versus Clustering: A Performance Comparison , 1995, USENIX.

[11]  L. Abelmann,et al.  Heat-assisted magnetic probe recording onto a thin film with perpendicular magnetic anisotropy , 2008 .

[12]  L. Abelmann,et al.  Probe recording on CoNi/Pt multilayered thin films by using an MFM tip , 2004 .

[13]  William Yurcik,et al.  A statistical analysis of disclosed storage security breaches , 2006, StorageSS '06.

[14]  Y. Gendron Reforming Auditor Independence: Voicing and Acting upon Auditors’ Concerns and Criticisms , 2006 .

[15]  Xueshi Yang,et al.  Future read channel technologies and challenges for high density data storage applications , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[16]  Bruce D. Terris,et al.  Characterization of the magnetic modification of Co/Pt multilayer films by He+, Ar+, and Ga+ ion irradiation , 2002 .

[17]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[18]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[19]  F. O. Sequeda,et al.  Design and material selection for a thin film magneto-optic disk , 1992 .

[20]  Mark Taylor,et al.  Managing corporate computer forensics , 2006 .

[21]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[22]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[23]  Thermal Stability of Nanoscale Co/Cu Multilayers , 2001, International Journal of Materials Research.

[24]  Eoghan Casey,et al.  Investigating sophisticated security breaches , 2006, CACM.

[25]  Peter Vettiger,et al.  Ion-beam patterning of magnetic films using stencil masks , 1999 .

[26]  Moni Naor,et al.  Deterministic History-Independent Strategies for Storing Information on Write-Once Memories , 2007, Theory Comput..

[27]  Noga Alon,et al.  Scalable Secure Storage when Half the System Is Faulty , 2000, ICALP.

[28]  Windsor W. Hsu,et al.  Fossilized index: the linchpin of trustworthy non-alterable electronic records , 2005, SIGMOD '05.

[29]  Suzanne L. Holcombe United States Patent and Trademark Office , 2008 .

[30]  C. Ross,et al.  Fabrication and magnetic properties of hexagonal arrays of NiFe elongated nanomagnets , 2007 .

[31]  David A. Wagner,et al.  Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[32]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[33]  Thermal stability and switching field distribution of CoNi/Pt patterned media , 2006 .

[34]  Yongge Wang,et al.  Fast and Secure Magnetic WORM Storage Systems , 2003, Second IEEE International Security in Storage Workshop.

[35]  Miko Elwenspoek,et al.  Modeling, design and testing of the electrostatic shuffle motor , 1998 .

[36]  Bo Hong,et al.  Using MEMS-based storage in computer systems---MEMS storage architectures , 2006, TOS.

[37]  Windsor W. Hsu,et al.  Technical Forum : WORM storage is not enough , 2007, IBM Syst. J..

[38]  William Yurcik,et al.  The techniques and challenges of immutable storage with applications in multimedia , 2005, IS&T/SPIE Electronic Imaging.

[39]  A. Knoll,et al.  Scanning Probes Entering Data Storage: From Promise to Reality , 2006, 2006 IEEE Conference on Emerging Technologies - Nanoelectronics.

[40]  Simon Shiu,et al.  Enabling shared audit data , 2004, International Journal of Information Security.

[41]  William Yurcik,et al.  The evolution of storage service providers: techniques and challenges to outsourcing storage , 2005, StorageSS '05.

[42]  Frank Adelstein,et al.  Live forensics: diagnosing your system without killing it first , 2006, CACM.

[43]  John Patzakis New Accounting Reform Laws Push for Technology-Based Document Retention Practices , 2003, Int. J. Digit. EVid..

[44]  Mendel Rosenblum,et al.  The design and implementation of a log-structured file system , 1991, SOSP '91.

[45]  Terry McDaniel,et al.  Issues in heat-assisted perpendicular recording , 2004 .

[46]  Euisik Yoon,et al.  Thermo-piezoelectric Si3N4 cantilever array on CMOS circuit for high density probe-based data storage , 2007 .

[47]  Craig A. N. Soules,et al.  Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[48]  D. Weller,et al.  Interface anisotropy and chemistry of magnetic multilayers: Au/Co, Pt/Co and Pd/Co , 1991 .

[49]  Richard J. Lipton,et al.  A Revocable Backup System , 1996, USENIX Security Symposium.

[50]  William Yurcik,et al.  Toward a threat model for storage systems , 2005, StorageSS '05.

[51]  H. Fujita,et al.  Fabrication and Characterization of an Electrostatic Contraction Beams Micromotor , 2006, 19th IEEE International Conference on Micro Electro Mechanical Systems.

[52]  Axelle Apvrille,et al.  Streamed or detached triple integrity for a time stamped secure storage system , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..

[53]  Mary Baker,et al.  Secure History Preservation Through Timeline Entanglement , 2002, USENIX Security Symposium.

[54]  Guohan Hu,et al.  Patterned media for future magnetic data storage , 2006 .

[55]  Seungbum Hong,et al.  Design and Analysis of the Position Detection Algorithm for a Probe Storage , 2006, IEEE Sensors Journal.