Secure data erasure verification in hyperscale computing systems
Techniques of implementing out-of-band data erasure verification in computing systems are disclosed herein. In one embodiment, a method includes receiving a verification instruction from a system administrator. In response to and based on the received verification instruction, the method includes se...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques of implementing out-of-band data erasure verification in computing systems are disclosed herein. In one embodiment, a method includes receiving a verification instruction from a system administrator. In response to and based on the received verification instruction, the method includes selecting a set of persistent storage devices to which data erasure verification is to be performed. The method also includes relaying the verification instruction to additional computing devices in additional enclosures, thereby causing data erasure verification on one or more additional persistent storage devices in the additional enclosures be performed generally in parallel to performing data erasure verification on the subset of persistent storage devices in one of the enclosures. |
---|