CN108701197A - 高效的秘密密钥加密的安全切片 - Google Patents

高效的秘密密钥加密的安全切片 Download PDF

Info

Publication number
CN108701197A
CN108701197A CN201780008333.0A CN201780008333A CN108701197A CN 108701197 A CN108701197 A CN 108701197A CN 201780008333 A CN201780008333 A CN 201780008333A CN 108701197 A CN108701197 A CN 108701197A
Authority
CN
China
Prior art keywords
data
random key
coded data
key
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780008333.0A
Other languages
English (en)
Inventor
J·雷施
I·沃尔沃夫斯基
M·D·西伯恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN108701197A publication Critical patent/CN108701197A/zh
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1076Parity data used in redundant arrays of independent storages, e.g. in RAID systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0727Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a storage system, e.g. in a DASD or network based storage system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2094Redundant storage or storage space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3034Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a storage system, e.g. DASD based or network based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4004Coupling between buses
    • G06F13/4022Coupling between buses using switching circuits, e.g. switching matrix, connection or expansion network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0605Improving or facilitating administration, e.g. storage management by facilitating the interaction with a user or administrator
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0653Monitoring storage devices or systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0659Command handling arrangements, e.g. command buffers, queues, command scheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/10Interfaces, programming languages or software development kits, e.g. for simulating neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063116Schedule adjustment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06316Sequencing of tasks or work
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/13Linear codes
    • H03M13/15Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes
    • H03M13/151Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes using error location or error correction polynomials
    • H03M13/1515Reed-Solomon codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2906Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes using block codes
    • H03M13/2909Product codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/3761Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35 using code combining, i.e. using combining of codeword portions which may have been transmitted separately, e.g. Digital Fountain codes, Raptor codes or Luby Transform [LT] codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/61Aspects and characteristics of methods and arrangements for error correction or error detection, not provided for otherwise
    • H03M13/615Use of computational or mathematical techniques
    • H03M13/616Matrix operations, especially for generator matrices or check matrices, e.g. column or row permutations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Abstract

加密模块(84)使用随机密钥(102)加密起始数据(82)以产生加密数据(85)。哈希模块(86)使用秘密密钥(98)对加密数据(85)执行安全哈希函数以产生哈希值(104)。处理电路(106)使用哈希值(104)屏蔽随机密钥(102)以产生被屏蔽的随机密钥(108),并组合加密的数据(85)和被屏蔽的随机密钥(108)以产生安全包(96)。分布式存储和任务模块(88)对安全包(96)进行编码以产生编码数据切片组。包括在编码数据切片组中的编码数据切片的秘密密钥(98)和解码阈值数足以恢复安全包(96)和起始数据(82)。编码数据切片组存储在存储单元(22)组中。

Description

高效的秘密密钥加密的安全切片
技术领域
本发明一般涉及计算机网络,更具体地说,涉及分散错误编码数据。
背景技术
众所周知可以用计算设备传送数据,处理数据和/或存储数据。这样的计算设备包括无线智能电话,笔记本电脑,平板电脑,个人计算机(PC),工作站和视频游戏设备,以及每天支持数百万网络搜索,股票交易或在线购买的数据中心。通常,计算设备包括中央处理单元(CPU),存储器系统,用户输入/输出接口,外围设备接口和互连总线结构。
如进一步已知的,计算机可以通过使用“云计算”代表计算机执行一个或多个计算功能(例如,服务,应用,算法,算术逻辑功能等)来有效地扩展其CPU。此外,对于大型服务,应用和/或功能,云计算可以由分布式方式由多个云计算资源执行,以改善完成服务,应用和/或功能的响应时间。例如,Hadoop是一个开源软件框架,支持分布式应用程序,使数千台计算机能够执行应用程序。
除了云计算之外,计算机可以使用“云存储”作为其存储系统的一部分。众所周知,云存储使用户能够通过其计算机在因特网存储系统上存储文件,应用程序等。因特网存储系统可以包括RAID(独立磁盘冗余阵列)系统和/或分散存储系统,其使用纠错方案来编码用于存储的数据。
传统的秘密共享方案为安全性提供了一些好处。通常,这些方案在暴露数据之前至少需要违规的阈值数。在某些情况下,这比加密安全得多,至少当一个人控制存储这些共享的硬件时。但在其它情况下,当一个人无法控制存储硬件时,数据所有者必须相信控制硬件的实体不会使用其职位来访问共享的阈值数。
为了减少对硬件托管人的完全信任的需要,常规系统可以使用传统的密钥加密来加密数据,然后将其发送以存储在硬件中。因此,传统上使用两个单独的加密步骤的过程:1)在发送数据用于存储之前要存储的数据的初始加密;2)第二个单独的加密步骤,它使用秘密共享方案再次加密加密数据(encrypted data),用于将数据部分存储在存储硬件中。然而,传统的两步过程在计算开销方面是昂贵的,因为对数据执行了两个单独的加密操作。
附图说明
现在将参考附图仅通过示例的方式描述本发明的实施例,附图中:
图1是根据本发明的分散或分布式存储网络(DSN)的实施例的示意框图。
图2是根据本发明的计算核心的实施例的示意框图。
图3是根据本发明的数据的分散存储错误编码的示例的示意框图。
图4是根据本发明的错误编码功能的一般例子的示意框图。
图5是根据本发明的错误编码功能的具体例子的示意框图。
图6是根据本发明的编码数据切片(EDS)的切片名称的示例的示意框图。
图7是根据本发明的数据的分散存储错误解码的例子的示意框图。
图8是根据本发明的错误解码功能的一般例子的示意方框图。
图9是根据本发明的分散存储网络的另一实施例的示意框图。
图10是示出根据本发明的安全存储数据的示例的流程图。
具体实施方式
图1是分散或分布式存储网络(DSN)10的实施例的示意性框图,其包括多个计算设备12-16,管理单元18,完整性处理单元20和DSN存储器22。DSN 10的组件耦合到网络24,网络24可以包括一个或多个无线和/或有线通信系统;一个或多个非公共内联网系统和/或公共互联网系统;和/或一个或多个局域网(LAN)和/或广域网(WAN)。
DSN存储器22包括多个存储单元36,其可以位于地理上不同的站点(例如,芝加哥的一个站点,密尔沃基的一个站点等),公共站点或其组合。例如,如果DSN存储器22包括八个存储单元36,则每个存储单元位于不同的站点。作为另一示例,如果DSN存储器22包括八个存储单元36,则所有八个存储单元都位于相同的站点。作为又一示例,如果DSN存储器22包括八个存储单元36,则第一对存储单元位于第一公共站点,第二对存储单元位于第二公共站点,第三对存储单元位于第三公共站点,第四对存储单元位于第四公共站点。注意,DSN存储器22可以包括多于或少于八个存储单元36。进一步注意,每个存储单元36包括计算核心(如图2所示,或其组件)和用于存储分散的错误编码的数据的多个存储器设备。
计算设备12-16,管理单元18和完整性处理单元20中的每一个包括计算核心26,其包括网络接口30-33。计算设备12-16每个可以是便携式计算设备和/或固定计算设备。便携式计算设备可以是社交网络设备,游戏设备,手机,智能电话,数字助理,数字音乐播放器,数字视频播放器,膝上型计算机,手持式计算机,平板电脑,视频游戏控制器和/或包括计算核心的任何其他便携式设备。固定计算设备可以是计算机(PC),计算机服务器,有线机顶盒,卫星接收器,电视机,打印机,传真机,家庭娱乐设备,视频游戏控制台和/或任何类型的家庭或办公室计算设备。注意,管理单元18和完整性处理单元20中的每一个可以是单独的计算设备,可以是公共计算设备,和/或可以集成到一个或多个计算设备12-16中和/或集成到一个或多个存储单元36中。
每个接口30,32和33包括通过网络24间接和/或直接支持一个或多个通信链路的软件和硬件。例如,接口30支持计算设备14和16之间的通信链路(例如,有线,无线,直接,经由LAN,经由网络24等)。作为另一示例,接口32支持计算设备12和16以及DSN存储器22之间的通信链路(例如,有线连接,无线连接,LAN连接和/或到/从网络24的任何其他类型的连接)。作为又一示例,接口33支持管理单元18和完整性处理单元20中的每一个到网络24的通信链路。
计算设备12和16包括分散存储(DS)客户端模块34,其使得计算设备能够分散存储错误编码和解码数据(例如,数据40),如随后参考图3-8中的一个或多个所描述的。在该示例实施例中,计算设备16用作计算设备14的分散存储处理代理。在该角色中,计算设备16代表计算设备14分散存储错误编码和解码数据。使用分散存储错误编码和解码时,DSN 10容忍大量存储单元故障(故障的数量基于分散的存储错误编码功能的参数)而不丢失数据并且不需要数据的冗余或备份副本。此外,DSN 10以无限期的时间存储数据而没有数据丢失并且以安全的方式存储(例如,系统非常抵抗未经授权的访问数据的尝试)。
在操作中,管理单元18执行DS管理服务。例如,管理单元18分别为计算设备12-14或作为一组用户设备的一部分建立分布式数据存储参数(例如,库创建,分布式存储参数,安全参数,计费信息,用户简档信息等)。作为具体示例,管理单元18协调在用于用户设备,一组设备或用于公共访问的DSN存储器22内的库创建(例如,与DSN的整个命名空间的一部分相关联的虚拟存储器块)并为库建立每库分散存储(DS)错误编码参数。管理单元18通过更新DSN 10的注册表信息来促进每个库的DS错误编码参数的存储,其中注册表信息可以存储在DSN存储器22,计算设备12-16,管理单元18和/或完整性处理单元20中。
管理单元18在本地存储器中和/或DSN存储器22的存储器内创建和存储用户简档信息(例如,访问控制列表(ACL))。用户简档信息包括认证信息,许可和/或安全性参数。安全参数可以包括加密/解密方案,一个或多个加密密钥,密钥生成方案和/或数据编码/解码方案。
管理单元18为特定用户,用户组,库访问,公共库访问等创建计费信息。例如,管理单元18跟踪用户访问非公共库和/或公共的次数,其可用于生成按访问计费信息。在另一实例中,管理单元18跟踪由用户设备和/或用户组存储和/或检索的数据量,其可用于生成每数据量的计费信息。
作为另一示例,管理单元18执行网络操作,网络管理和/或网络维护。网络操作包括验证用户数据分配请求(例如,读取和/或写入请求),管理库的创建,为用户设备建立认证凭证,添加/删除组件(例如,用户设备,存储单元和/或具有DS客户端模块34的计算设备)到/来自DSN 10,和/或为存储单元36建立认证凭证。网络管理包括监视设备和/或单元的故障,维护库信息,确定设备和/或单元激活状态,确定设备和/或单元加载,和/或确定影响DSN 10的性能级别的任何其他系统级操作。网络维护包括促进替换,升级,修复和/或扩展DSN10的设备和/或单元。
完整性处理单元20执行“坏”或丢失编码数据切片的重建。在高级别,完整性处理单元20通过周期性地尝试从DSN存储器22检索/列出编码数据切片和/或编码数据切片的切片名称来执行重建。对于检索到的编码切片,检查它们由于数据损坏,过期版本等的错误。如果切片包含错误,则将其标记为“坏”切片。对于未接收和/或未列出的编码数据切片,它们被标记为丢失切片。随后使用被认为是良好切片的其他检索的编码数据切片来重建坏的和/或丢失的切片以产生重建的切片。重建的切片存储在DSN存储器22中。
图2是计算核心26的实施例的示意性框图,计算核心26包括处理模块50,存储器控制器52,主存储器54,视频图形处理单元55,输入/输出(IO)控制器56,外围设备组件互连(PCI)接口58,IO接口模块60,至少一个IO设备接口模块62,只读存储器(ROM)基本输入输出系统(BIOS)64,以及一个或多个存储器接口模块。一个或多个存储器接口模块包括通用串行总线(USB)接口模块66,主机总线适配器(HBA)接口模块68,网络接口模块70,闪存接口模块72,硬盘驱动器接口模块74和DSN接口模块76。
DSN接口模块76用于模仿传统的操作系统(OS)文件系统接口(例如,网络文件系统(NFS),闪存文件系统(FFS),磁盘文件系统(DFS),文件传输协议(FTP),基于web的分布式创作和版本控制(WebDAV)等))和/或块存储器接口(例如,小型计算机系统接口(SCSI),互联网小型计算机系统接口(iSCSI)等))。DSN接口模块76和/或网络接口模块70可以用作图1的接口30-33中的一个或多个。注意,IO设备接口模块62和/或存储器接口模块66-76可以被联合或单独称为IO端口。
图3是数据分散存储错误编码的示例的示意性框图。当计算设备12或16具有存储它的数据时,基于分散存储错误编码参数,根据分散存储错误编码流程对数据进行分散存储错误编码。分散存储错误编码参数包括编码功能(例如,信息分散算法,Reed-Solomon,Cauchy Reed-Solomon,系统编码,非系统编码,在线代码等),数据分段协议(例如,数据段大小,固定,变量等)和每个数据段编码值。每数据段编码值包括每数据段编码(即,在一组编码数据切片中)的编码数据切片的总数或柱宽,每数据段(即,在编码数据切片组中)编码的编码数据切片的数量(T);需要恢复数据段的编码数据切片组的编码数据切片的解码阈值数(D);编码数据切片读取阈值数(R),用于指示要从用于解码数据段的存储器读取的每组编码数据切片的数量;和/或写入阈值数(W),用于指示在编码数据段被认为已被正确存储之前必须准确存储的每组编码数据切片的数量。分散的存储错误编码参数还可以包括切片信息(例如,将为每个数据段创建的编码数据切片的数量)和/或切片安全信息(例如,每编码数据切片加密,压缩,完整性校验和等)。
在本示例中,已选择柯西里德所罗门(Cauchy Reed-Solomon)作为编码函数(图4中示出了一般示例,并且图5中示出了具体示例);数据分段协议是将数据对象划分为固定大小的数据段;每个数据段编码值包括:支柱宽度为5,解码阈值为3,读取阈值为4,写入阈值为4。根据数据分段协议,计算设备12或16划分数据(例如,文件(例如,文本,视频,音频等),数据对象或其他数据排列)到多个固定大小的数据段(例如,在千字节Kilo-bytes到万亿字节Tera-bytes范围内的固定大小的1到Y)。创建的数据段的数量取决于数据的大小和数据分段协议。
然后,计算设备12或16使用所选择的编码函数(例如,Cauchy Reed-Solomon)来分散存储错误对数据段进行编码,以产生一组编码数据切片。图4示出了通用的Cauchy Reed-Solomon编码函数,其包括编码矩阵(encoding matrix)(EM),数据矩阵(DM)和被编码的矩阵(coded matrix)(CM)。编码矩阵(EM)的大小取决于所选择的每数据段编码值柱宽度数(T)和解码阈值数(D)。为了产生数据矩阵(DM),数据段被分成多个数据块,数据块被排列成D行,每行Z个数据块。注意,Z是从数据段创建的数据块的数量和解码阈值数(D)的函数。通过矩阵将数据矩阵乘以编码矩阵来产生被编码的矩阵。
图5示出了Cauchy Reed-Solomon编码的具体示例,其中柱数(T)为5并且解码阈值数为3。在该示例中,第一数据段被分成12个数据块(D1-D12)。被编码的矩阵包括五行编码数据块,其中X11-X14的第一行对应于第一编码数据切片(EDS 1_1),X21-X24的第二行对应于第二编码数据切片(EDS 2_1),X31-X34的第三行对应于第三编码数据切片(EDS 3_1),X41-X44的第四行对应于第四编码数据切片(EDS 4_1),X51-X54的第五行对应于第五编码数据切片(EDS 5_1)。注意,EDS指定的第二个数字对应于数据段号。
返回到图3的讨论,计算设备还为该组编码数据切片中的每个编码数据切片(EDS)创建切片名称(SN)。切片名称80的典型格式如图6所示。如图所示,切片名称(SN)80包括编码数据切片(例如,1-T之一)的柱编号,数据段编号(例如,1-Y之一),库标识符(ID),数据对象标识符(ID),还可以包括编码数据切片的修订级别信息。片名称用作编码数据片的DSN地址的至少一部分,用于从DSN存储器22存储和检索。
作为编码的结果,计算设备12或16产生多组编码数据切片,这些编码数据切片以其各自的切片名称提供给存储单元用于存储。如图所示,第一组编码数据切片包括EDS 1_1至EDS 5_1,并且第一组切片名称包括SN 1_1至SN 5_1,并且最后一组编码数据切片包括EDS 1_Y至EDS 5_Y以及最后一组切片名称包括SN 1_Y到SN 5_Y。
图7是在图4的示例中分散存储错误编码和存储的数据对象的分散存储错误解码的示例的示意性框图。在该示例中,计算设备12或16从存储单元检索至少每数据段的编码数据切片的解码阈值数。作为具体示例,计算设备检索读取阈值数的编码数据切片。
为了从编码数据切片的解码阈值数恢复数据段,计算设备使用如图8所示的解码功能。如图所示,解码功能基本上是图4的编码功能的逆过程。被编码的矩阵包括解码阈值行数(例如,在该示例中为3)和编码矩阵的反转中的解码矩阵,编码矩阵包括被编码的矩阵的对应行。例如,如果被编码的矩阵包括行1,2和4,则编码矩阵被缩减为行1,2和4,然后被反转以产生解码矩阵。
接下来参考图9和10,讨论了可以用于使用秘密密钥有效地将数据加密成安全切片的各种实施例。在至少一些实施例中,仅需要单个加密步骤来提供使用两个单独的加密步骤的优点,但是比执行两个单独的加密步骤需要更少的计算资源。在各种实施例中,如下所述,提供两个输入作为加密设备的输入:秘密密钥(secret key)S和输入数据D。设备本身可以生成随机密钥,或者随机密钥R也可以作为输入提供。期望值V可以可选地附加到D,然后用随机密钥R加密结果以产生加密数据(encrypted data)E。密钥哈希(keyed-hash)(例如,密钥哈希H消息认证码HMAC(E,S)或者替代地(哈希(E)XOR S),或使用密钥在加密数据E上计算的任何类似的哈希函数,以产生密钥哈希H。
然后将密钥哈希H与随机密钥R组合(例如通过XOR,或模块化添加,或者在不知道H的情况下难以反转的任何可逆方式)以产生可以附加(或者前置或以其他方式添加)到加密数据E以完成编码并产生最终值F的被屏蔽密钥M(masked-key)。最终值F可以由信息分散算法(information dispersal algorithm,IDA)或纠删码算法(erasure code algorithm)分割或处理。结果只能用至少阈值数量的切片和S的知识来解码。鉴于这些,解码操作如下:至少解码切片的IDA阈值以恢复F;F分为E和M;S用于重新计算E的密钥哈希(Keyed-Hash),即H;H从M中解除组合以恢复随机加密密钥R;R用于解密E并恢复原始数据D(可选地附加预期值V);并且如果存在,则预期值V被验证并被剥离。如果V有效或未添加,则返回D。
图9是分散存储网络(DSN)的另一实施例的示意性框图,该DSN包括图1的加密模块84,密钥哈希(keyed-hash)模块86,屏蔽(masking)模块106,组合模块87,分布式存储和任务(DST)客户端模块88,DSN存储器22,有时称为分布式任务网络(DSTN)模块,DST客户端模块89,解组合模块90,密钥哈希(keyed-hash)模块91,去屏蔽模块114和解密模块94。每个加密模块84,密钥哈希(keyed-hash)模块1-2,屏蔽模块106,组合模块88,解组合模块90,去屏蔽模块114和解密模块94,可以利用图2的计算核心26来实现。DST客户端模块88和89可以利用图1的DST客户端模块34来实现。DSN用于安全地存储数据。
在数据的安全存储的操作的示例中,解密模块94利用随机密钥102来加密数据82以产生加密数据85。密钥哈希(keyed-hash)模块86利用秘密密钥98来在加密数据85上执行安全哈希函数,以产生哈希值104。例如,密钥哈希(keyed-hash)模块86利用秘密密钥98对加密数据85执行基于哈希的消息认证码(HMAC)功能以产生哈希值104。屏蔽模块106利用哈希值104屏蔽随机密钥以产生被屏蔽的随机密钥108。屏蔽包括模块化添加,例如异或功能。组合模块87组合加密数据85和被屏蔽的随机密钥108以产生安全包96。组合可以包括待决和交错中的至少一个。DST客户端模块88分散存储错误对编码安全包9以产生一组编码数据切片1-n,用于存储在DSN存储器22中。
当恢复数据时,DST客户端模块89分散存储错误解码对编码数据片组1-n的编码数据片的解码阈值数,以再现安全包96。解组合模块90对安全包96进行解组合以再现被屏蔽的随机密钥108和加密数据85。密钥哈希模块91利用秘密密钥98对再现的加密数据85执行安全哈希函数以再现哈希值104。去屏蔽模块114利用哈希值104去屏蔽被屏蔽的随机密钥108以产生恢复的随机密钥116。例如,去屏蔽模块114对被屏蔽的随机密钥108和哈希值104执行异或功能以产生恢复的随机密钥116。解密模块94利用恢复的随机密钥116解密加密数据85以产生再现数据100。这样,DSN执行系统性能改进,只需要一次数据的加密处理步骤而不是两次,使得需要每组编码数据切片的编码数据切片的解码阈值数和秘密密钥来恢复数据。
图10是示出安全地存储数据的示例的流程图。该方法包括框118,其中处理模块(例如,分布式存储和任务(DST)客户端模块)使用随机密钥加密数据以产生加密数据。该方法在框120处继续,其中处理模块使用秘密密钥对加密数据执行安全哈希函数以产生哈希值。该方法在框122处继续,其中处理模块使用哈希值来屏蔽随机密钥以产生被屏蔽的随机密钥(masked random key)。该方法在框124处继续,其中处理模块组合加密数据和被屏蔽的随机密钥以产生安全包。组合可以包括待决和交错中的一个或多个。该方法在框126处继续,其中处理模块对安全包进行编码以产生编码数据切片组以存储在存储单元组中。
当恢复数据时,该方法在框128处继续,其中处理模块对从该组存储单元获得的编码数据切片组的编码数据切片的解码阈值数进行解码以再现安全包。该方法在框130处继续,其中处理模块对安全包进行解组合以再现被屏蔽的随机密钥和加密数据。该方法在框132处继续,其中处理模块对再现的加密数据执行安全哈希函数以再现哈希值。该方法在框134处继续,其中处理模块使用哈希值对被屏蔽的随机密钥进行解屏蔽以产生恢复的随机密钥。例如,处理模块对被屏蔽的随机密钥和哈希值执行异或(XOR)功能,以产生恢复的随机密钥。该方法在框136处继续,其中处理模块使用恢复的随机密钥对再现的加密数据进行解密以生成再现数据。
注意,可以在本文中使用的术语,诸如比特流,流,信号序列等(或它们的等同物)可互换地用于描述数字信息,其内容对应于多种期望类型(例如,数据,视频,语音,音频等,其中任何一种通常可称为“数据”)的任意一种。
如本文可能使用的,术语“基本上”和“大致”为其对应的术语和/或项目之间的相对性提供了行业可接受的容差。这种工业上可接受的容差范围从小于百分之一到百分之五十,并且对应于但不限于元件值,集成电路工艺变化,温度变化,上升和下降时间和/或热噪声。项目之间的这种相关性的范围从几个百分点的差异到数量级的差异。如本文中还可以使用的,术语“被配置为”,“可操作地耦合到”,“耦合到”和/或“耦合”包括项目之间的直接耦合和/或经由介入项目的项目之间的间接耦合(例如,项目包括但不限于组件,元件,电路和/或模块),其中,对于间接耦合的示例,介入项目不修改信号的信息但可以调整其电流水平,电压水平和/或功率水平。如本文中可进一步使用的,推断的耦合(即,其中一个元件通过推断耦合到另一个元件)包括以与“耦合到”相同的方式在两个项目之间的直接和间接耦合。如本文甚至可以进一步使用的,术语“配置为”,“可操作地”,“耦合到”或“可操作地耦合到”指示项目包括电源连接,输入,输出中的一个或多个(s)等,当被激活时,执行其一个或多个其相应的功能,并且还可以包括推断的耦合到一个或多个其他项目。如本文中还可进一步使用的,术语“与......相关联”包括单独项目的直接和/或间接耦合和/或将一个项目嵌入另一项目中。
如这里可以使用的,术语“有利地比较”表示两个或更多个项目,信号等之间的比较提供了期望的关系。例如,当期望的关系是信号1具有比信号2更大的幅度时,当信号1的幅度大于信号2的幅度或者当信号2的幅度小于信号2的幅度时,可以实现有利的比较。如本文中可能使用的,术语“不利地比较”表示两个或更多个项目,信号等之间的比较未能提供期望的关系。
如这里还可以使用的,术语“处理模块”,“处理电路”,“处理器”和/或“处理单元”可以是单个处理设备或多个处理设备。这种处理设备可以是微处理器,微控制器,数字信号处理器,微计算机,中央处理单元,现场可编程门阵列,可编程逻辑设备,状态机,逻辑电路,模拟电路,数字电路和/或任何设备,其基于电路和/或操作指令的硬编码来操纵信号(模拟和/或数字)。处理模块,模块,处理电路和/或处理单元可以是或者进一步包括存储器和/或集成存储器元件,其可以是另一处理模块的单个存储器设备,多个存储器设备和/或嵌入式电路。这样的存储器设备可以是只读存储器,随机存取存储器,易失性存储器,非易失性存储器,静态存储器,动态存储器,闪存,高速缓冲存储器和/或存储数字信息的任何设备。注意,如果处理模块,模块,处理电路和/或处理单元包括多于一个处理设备,则处理设备可以位于中央(例如,经由有线和/或无线总线结构直接耦合在一起)或者可以是分布式定位(例如,通过局域网和/或广域网间接耦合的云计算)。进一步注意,如果处理模块,模块,处理电路和/或处理单元经由状态机,模拟电路,数字电路和/或逻辑电路实现其一个或多个功能,则存储器和/或存储器元件存储相应的操作指令可以嵌入在包括状态机,模拟电路,数字电路和/或逻辑电路的电路内或外部。还要注意,存储元件可以存储,并且处理模块,模块,处理电路和/或处理单元执行与至少一些步骤和/或功能相对应的硬编码和/或操作指令,如一个或更多的附图所示。这种存储器件或存储元件可以包括在制品中。
如上所述,一个或多个实施例已经示出指定的功能的性能及其关系的方法步骤。为了便于描述,这里任意定义了这些功能构建块和方法步骤的边界和顺序。只要适当地执行指定的函数和关系,就可以定义替代边界和顺序。因此,任何这样的替代边界或序列都在权利要求的范围和精神内。此外,为了便于描述,这些功能构建块的边界已被任意定义。只要适当地执行某些重要功能,就可以定义替代边界。类似地,流程图块也可以在本文中任意定义以说明某些重要功能。
为了使用的程度,流程图模块的界限和顺序可以被另外定义,只要仍能实现这些显著功能。因此,功能构建块和流程图块和序列的这种替代定义都在权利要求的范围和精神内。本领域普通技术人员还将认识到,本文中的功能构建块和其他说明性块,模块和组件可以如图所示实现,或者由分立组件,专用集成电路,执行适当软件的处理器等或其组合实现
此外,流程图可以包括“开始”和/或“继续”指示。“开始”和“继续”指示反映了所呈现的步骤可以任选地结合在其他例程中或以其他方式与其他例程结合使用。在此上下文中,“开始”表示所呈现的第一步骤的开始,并且可以在未明确示出的其他活动之前。此外,“继续”指示反映了所呈现的步骤可以多次执行和/或可以由未具体示出的其他活动继承。此外,尽管流程图表示步骤的特定顺序,但是其他顺序同样是可能的,只要保持因果关系原则即可。
该一个或多个实施例在本文中用于说明的一个或多个方面,一个或多个特征,一个或多个概念,和/或一个或多个示例。装置,制品,机器和/或过程的物理实施例可包括参考本文所讨论的一个或多个实施例描述的一个或多个方面,特征,概念,示例等。此外,从图到图,实施例可以包含相同或类似命名的功能,步骤,模块等,其可以使用相同或不同的附图标记,并且因此,功能,步骤,模块等可以是相同或相似的或不同的功能,步骤,模块等。
除非特别声明相反,在一个或多个附图中所示的来自元件或在元件间的信号可以是模拟的或数字的,时间连续的或时间离散的,以及单端(single-ended)或差分的(differential)。例如,如果信号路径显示为单端路径,则它还表示差分信号路径。类似地,如果信号路径显示为差分路径,则它还表示单端信号路径。虽然本文描述了一个或多个特定体系结构,但是同样可以实现其他体系结构,其使用未明确示出的一个或多个数据总线,元件之间的直接连接,和/或本领域普通技术人员认识到的其他元件之间的间接耦合。。
术语“模块”在一个或多个实施例的描述中使用。模块经由诸如处理器或其他处理设备之类的设备或可以包括存储操作指令的存储器或与存储操作指令相关联的其他硬件来实现一个或多个功能。模块可以独立地操作和/或与软件和/或固件一起操作。还如本文中所使用的,模块可以包含一个或多个子模块,每个子模块可以是一个或多个模块。
作为可以进一步被本文使用的,计算机可读存储器包括一个或多个存储元件。存储器元件可以是单独的存储器设备,多个存储器设备或存储器设备内的一组存储器位置。这样的存储器设备可以是只读存储器,随机存取存储器,易失性存储器,非易失性存储器,静态存储器,动态存储器,闪存,高速缓冲存储器和/或存储数字信息的任何设备。存储器设备可以是固态存储器,硬盘驱动器存储器,云存储器,拇指驱动器,服务器存储器,计算设备存储器和/或用于存储数字信息的其他物理介质的形式。
尽管已经在本文中明确描述的各种功能和一个或多个实施例的特征的特定组合,但是这些特征和功能的其他组合也是可能的。本公开不受本文公开的具体实施例的限制,并且明确地包含这些其他组合。

Claims (20)

1.一种在分散存储网络中使用的方法,该方法包括:
使用随机密钥加密起始数据以产生加密数据;
使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
使用哈希值屏蔽随机密钥以产生屏蔽的随机密钥;
将加密数据和屏蔽的随机密钥组合以产生安全包;
编码安全包以产生编码数据切片组,其中包括在编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,并且其中解码阈值数大于1且小于编码数据切片组中的编码数据切片的总数;和
将编码数据切片组存储在存储单元组中。
2.如权利要求1所述的方法,还包括:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
3.如权利要求2所述的方法,其中,恢复起始数据还包括:
将安全包解组合为加密数据和被屏蔽的随机密钥。
4.如权利要求3所述的方法,还包括:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用被恢复的随机密钥解密加密数据。
5.如权利要求1所述的方法,其中,屏蔽所述随机密钥包括:
执行异或(XOR)函数或模块化添加之一。
6.如权利要求1所述的方法,其中组合包括:
附加,前置,插入或交错之一。
7.如权利要求1所述的方法,其中编码安全包以产生编码数据切片组包括使用纠删码算法。
8.分散存储网络,包括:
加密模块,使用处理器和相关存储器实现,加密模块被配置为使用随机密钥加密起始数据以产生加密数据;
使用处理器和相关存储器实现的哈希模块,哈希模块被配置为使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
处理电路,被配置为使用哈希值来屏蔽随机密钥以产生被屏蔽的随机密钥;
处理电路还被配置为组合加密数据和被屏蔽的随机密钥以产生安全包;
分布式存储和任务模块,被配置为对安全包进行编码以产生编码数据切片组,其中包括在该编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,其中,解码阈值数大于1且小于该编码数据切片组中的编码数据切片的总数;和
处理电路,被配置为将该编码数据切片组存储在存储单元组中。
9.如权利要求8所述的分散存储网络,还包括处理电路,被配置为:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
10.如权利要求9所述的分散存储网络,其中,被配置为恢复起始数据的处理电路还被配置为:
将安全包解组合为加密数据和被屏蔽的随机密钥。
11.如权利要求10所述的分散存储网络,其中,配置为恢复起始数据的处理电路还被配置为:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用恢复的随机密钥解密加密数据。
12.如权利要求8所述的分散存储网络,其中,被配置为屏蔽随机密钥的处理电路还被配置为:
执行异或(XOR)函数或模块化添加之一。
13.如权利要求8所述的分散存储网络,其中,被配置为组合的处理电路还被配置为执行以下之一:
将被屏蔽的随机密钥附加到加密数据中;
将被屏蔽的随机密钥前置到加密数据中;
将被屏蔽的随机密钥插入到加密数据中;或者
在加密数据中交错被屏蔽的随机密钥。
14.如权利要求8所述的分散存储网络,其中,所述分布式存储和任务模块使用纠删码算法对所述安全包进行编码以产生编码数据切片组。
15.一种在分散存储网络中使用的方法,该方法包括:
使用随机密钥加密起始数据以产生加密数据;
使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
使用哈希值屏蔽随机密钥以产生被屏蔽的随机密钥;
将加密数据和被屏蔽的随机密钥组合以产生安全包;
编码安全包以产生编码数据切片组,其中包括在该编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,并且其中解码阈值数大于1且小于编码数据切片组中的编码数据切片的总数;
将编码数据切片组存储在存储单元组中;和
使用至少编码数据切片的解码阈值数和秘密密钥来恢复起始数据。
16.如权利要求15所述的方法,还包括:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
17.如权利要求16所述的方法,其中,恢复起始数据还包括:
将安全包解组合为加密数据和被屏蔽的随机密钥。
18.如权利要求17所述的方法,还包括:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用恢复的随机密钥解密加密数据。
19.如权利要求15所述的方法,其中组合包括:
附加,前置,插入或交错之一。
20.根据权利要求15所述的方法,其中编码所述安全包以产生一组编码数据切片包括使用纠删码算法。
CN201780008333.0A 2016-02-29 2017-02-22 高效的秘密密钥加密的安全切片 Pending CN108701197A (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201662301214P 2016-02-29 2016-02-29
US62/301,214 2016-02-29
US15/410,329 2017-01-19
US15/410,329 US10326740B2 (en) 2016-02-29 2017-01-19 Efficient secret-key encrypted secure slice
PCT/IB2017/051010 WO2017149410A1 (en) 2016-02-29 2017-02-22 Efficient secret-key encrypted secure slice

Publications (1)

Publication Number Publication Date
CN108701197A true CN108701197A (zh) 2018-10-23

Family

ID=59678482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780008333.0A Pending CN108701197A (zh) 2016-02-29 2017-02-22 高效的秘密密钥加密的安全切片

Country Status (4)

Country Link
US (13) US10089178B2 (zh)
CN (1) CN108701197A (zh)
DE (1) DE112017000220T5 (zh)
WO (1) WO2017149410A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110058820A (zh) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 基于固态盘阵列的数据安全写入、删除、读取方法及装置
CN111813331A (zh) * 2019-04-10 2020-10-23 阿里巴巴集团控股有限公司 用于操作数据存储系统的方法、系统和非暂时性计算机可读介质
CN112468494A (zh) * 2020-11-26 2021-03-09 湖北航天信息技术有限公司 一种内外网互联网数据传输方法及装置
CN112764677A (zh) * 2021-01-14 2021-05-07 杭州电子科技大学 一种在云存储中增强数据迁移安全性的方法
CN114785484A (zh) * 2022-04-06 2022-07-22 河南省怡之发电子科技有限公司 一种大数据安全传输方法及系统

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10447474B2 (en) * 2009-04-20 2019-10-15 Pure Storage, Inc. Dispersed data storage system data decoding and decryption
WO2017048221A1 (en) * 2015-09-14 2017-03-23 Hewlett Packard Enterprise Development Lp Secure memory systems
US10277490B2 (en) * 2016-07-19 2019-04-30 International Business Machines Corporation Monitoring inter-site bandwidth for rebuilding
WO2018063840A1 (en) * 2016-09-28 2018-04-05 D5A1 Llc; Learning coach for machine learning system
US10262751B2 (en) * 2016-09-29 2019-04-16 Intel Corporation Multi-dimensional optimization of electrical parameters for memory training
US10481977B2 (en) * 2016-10-27 2019-11-19 International Business Machines Corporation Dispersed storage of error encoded data objects having multiple resolutions
US10762891B2 (en) * 2017-02-10 2020-09-01 Synaptics Incorporated Binary and multi-class classification systems and methods using connectionist temporal classification
US11100932B2 (en) * 2017-02-10 2021-08-24 Synaptics Incorporated Robust start-end point detection algorithm using neural network
US10762417B2 (en) * 2017-02-10 2020-09-01 Synaptics Incorporated Efficient connectionist temporal classification for binary classification
US11853884B2 (en) * 2017-02-10 2023-12-26 Synaptics Incorporated Many or one detection classification systems and methods
US11087213B2 (en) * 2017-02-10 2021-08-10 Synaptics Incorporated Binary and multi-class classification systems and methods using one spike connectionist temporal classification
US11080600B2 (en) * 2017-02-10 2021-08-03 Synaptics Incorporated Recurrent neural network based acoustic event classification using complement rule
CN108427615B (zh) * 2017-02-13 2020-11-27 腾讯科技(深圳)有限公司 一种消息监控方法及装置
US10762427B2 (en) * 2017-03-01 2020-09-01 Synaptics Incorporated Connectionist temporal classification using segmented labeled sequence data
US10437691B1 (en) * 2017-03-29 2019-10-08 Veritas Technologies Llc Systems and methods for caching in an erasure-coded system
JP6959155B2 (ja) * 2017-05-15 2021-11-02 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 検証方法、検証装置およびプログラム
US10379979B2 (en) * 2017-05-31 2019-08-13 Western Digital Technologies, Inc. Power fail handling using stop commands
US10409667B2 (en) * 2017-06-15 2019-09-10 Salesforce.Com, Inc. Error assignment for computer programs
US11157194B2 (en) * 2018-01-12 2021-10-26 International Business Machines Corporation Automated predictive tiered storage system
US11321612B2 (en) 2018-01-30 2022-05-03 D5Ai Llc Self-organizing partially ordered networks and soft-tying learned parameters, such as connection weights
CN108319545B (zh) * 2018-02-01 2021-07-16 联想(北京)有限公司 一种信息处理方法及电子设备
CN108388748A (zh) * 2018-03-12 2018-08-10 北京理工大学 一种爆轰数值仿真串行程序中断续算方法
CN108459922A (zh) * 2018-03-12 2018-08-28 北京理工大学 一种爆轰数值仿真并行程序中断续算方法
US11412041B2 (en) 2018-06-25 2022-08-09 International Business Machines Corporation Automatic intervention of global coordinator
CN110659069B (zh) * 2018-06-28 2022-08-19 赛灵思公司 用于执行神经网络计算的指令调度方法及相应计算系统
CN109034413A (zh) * 2018-07-11 2018-12-18 广东人励智能工程有限公司 基于神经网络模型的智能制造设备故障预测方法及系统
US10606479B2 (en) 2018-08-07 2020-03-31 International Business Machines Corporation Catastrophic data loss prevention by global coordinator
CN109344036A (zh) * 2018-10-08 2019-02-15 郑州云海信息技术有限公司 应用于存储系统的告警展示方法及系统
CN111124793A (zh) * 2018-11-01 2020-05-08 中国移动通信集团浙江有限公司 磁盘阵列控制器性能异常检测方法及系统
KR20200053886A (ko) * 2018-11-09 2020-05-19 삼성전자주식회사 뉴럴 프로세싱 유닛, 뉴럴 프로세싱 시스템, 및 어플리케이션 시스템
US10970149B2 (en) * 2019-01-03 2021-04-06 International Business Machines Corporation Automatic node hardware configuration in a distributed storage system
US11023307B2 (en) 2019-01-03 2021-06-01 International Business Machines Corporation Automatic remediation of distributed storage system node components through visualization
CN109739213A (zh) * 2019-01-07 2019-05-10 东莞百宏实业有限公司 一种故障预测系统以及预测方法
US11275672B2 (en) * 2019-01-29 2022-03-15 EMC IP Holding Company LLC Run-time determination of application performance with low overhead impact on system performance
US10880377B2 (en) * 2019-04-05 2020-12-29 Netapp, Inc. Methods and systems for prioritizing events associated with resources of a networked storage system
CN110162923B (zh) * 2019-06-03 2020-04-03 北京卫星环境工程研究所 面向航天器总装的柔性电缆工艺数字样机构建系统及方法
FI129028B (fi) * 2019-06-19 2021-05-31 Elisa Oyj Huoltoprioriteetti kommunikaatioverkossa
US11205319B2 (en) 2019-06-21 2021-12-21 Sg Gaming, Inc. System and method for synthetic image training of a neural network associated with a casino table game monitoring system
SG10201906806XA (en) * 2019-07-23 2021-02-25 Mastercard International Inc Methods and computing devices for auto-submission of user authentication credential
US10691528B1 (en) * 2019-07-23 2020-06-23 Core Scientific, Inc. Automatic repair of computing devices in a data center
WO2021040764A1 (en) * 2019-08-23 2021-03-04 Landmark Graphics Corporation Ai/ml based drilling and production platform
NO20220090A1 (en) * 2019-08-23 2022-01-21 Landmark Graphics Corp Ai/ml based drilling and production platform
CN110493247B (zh) * 2019-08-29 2022-08-02 南方电网科学研究院有限责任公司 一种配电终端通信检测方法、系统、设备及计算机介质
JP2021118370A (ja) * 2020-01-22 2021-08-10 キオクシア株式会社 メモリシステム、情報処理装置、および情報処理システム
JP7428016B2 (ja) * 2020-03-05 2024-02-06 京セラドキュメントソリューションズ株式会社 ファイル送信装置
CN112053726B (zh) * 2020-09-09 2022-04-12 哈尔滨工业大学 一种基于Er态阈值电压分布的闪存误擦除数据恢复方法
EP4226573A1 (en) 2020-10-05 2023-08-16 Redcom Laboratories, Inc. Zkmfa: zero-knowledge based multi-factor authentication system
EP4092963B1 (en) * 2021-05-20 2024-05-08 Ovh Method and system for datacenter network device maintenance
US11722146B1 (en) * 2022-01-21 2023-08-08 Nxp B.V. Correction of sigma-delta analog-to-digital converters (ADCs) using neural networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166089A (zh) * 2006-10-18 2008-04-23 株式会社东芝 秘密信息管理设备与秘密信息管理系统
US8885821B2 (en) * 2010-01-28 2014-11-11 Cleversafe, Inc. Sequencing encoded data slices
US9203812B2 (en) * 2009-04-20 2015-12-01 Cleversafe, Inc. Dispersed storage network with encrypted portion withholding and methods for use therewith

Family Cites Families (139)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4092732A (en) 1977-05-31 1978-05-30 International Business Machines Corporation System for recovering data stored in failed memory unit
US5485474A (en) 1988-02-25 1996-01-16 The President And Fellows Of Harvard College Scheme for information dispersal and reconstruction
US5454101A (en) 1992-09-15 1995-09-26 Universal Firmware Industries, Ltd. Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets
US5987622A (en) 1993-12-10 1999-11-16 Tm Patents, Lp Parallel computer system including parallel storage subsystem including facility for correction of data in the event of failure of a storage device in parallel storage subsystem
US6175571B1 (en) 1994-07-22 2001-01-16 Network Peripherals, Inc. Distributed memory switching hub
JP3180940B2 (ja) * 1994-11-28 2001-07-03 京セラミタ株式会社 画像形成装置のメンテナンス管理装置
US5848230A (en) 1995-05-25 1998-12-08 Tandem Computers Incorporated Continuously available computer memory systems
US5774643A (en) 1995-10-13 1998-06-30 Digital Equipment Corporation Enhanced raid write hole protection and recovery
US5809285A (en) 1995-12-21 1998-09-15 Compaq Computer Corporation Computer system having a virtual drive array controller
US6012159A (en) 1996-01-17 2000-01-04 Kencast, Inc. Method and system for error-free data transfer
US5802364A (en) 1996-04-15 1998-09-01 Sun Microsystems, Inc. Metadevice driver rename/exchange technique for a computer system incorporating a plurality of independent device drivers
US5890156A (en) 1996-05-02 1999-03-30 Alcatel Usa, Inc. Distributed redundant database
US6058454A (en) 1997-06-09 2000-05-02 International Business Machines Corporation Method and system for automatically configuring redundant arrays of disk memory devices
US6088330A (en) 1997-09-09 2000-07-11 Bruck; Joshua Reliable array of distributed computing nodes
US5991414A (en) 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
US6272658B1 (en) 1997-10-27 2001-08-07 Kencast, Inc. Method and system for reliable broadcasting of data files and streams
JPH11161505A (ja) 1997-12-01 1999-06-18 Matsushita Electric Ind Co Ltd メディア送出装置
JPH11167443A (ja) 1997-12-02 1999-06-22 Casio Comput Co Ltd インターフェイス装置
US6415373B1 (en) 1997-12-24 2002-07-02 Avid Technology, Inc. Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner
US6374336B1 (en) 1997-12-24 2002-04-16 Avid Technology, Inc. Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner
CA2341014A1 (en) 1998-08-19 2000-03-02 Alexander Roger Deas A system and method for defining transforms of memory device addresses
US6356949B1 (en) 1999-01-29 2002-03-12 Intermec Ip Corp. Automatic data collection device that receives data output instruction from data consumer
US6578144B1 (en) 1999-03-23 2003-06-10 International Business Machines Corporation Secure hash-and-sign signatures
US6609223B1 (en) 1999-04-06 2003-08-19 Kencast, Inc. Method for packet-level fec encoding, in which on a source packet-by-source packet basis, the error correction contributions of a source packet to a plurality of wildcard packets are computed, and the source packet is transmitted thereafter
US6671824B1 (en) * 1999-04-19 2003-12-30 Lakefield Technologies Group Cable network repair control system
US6434715B1 (en) * 1999-06-14 2002-08-13 General Electric Company Method of detecting systemic fault conditions in an intelligent electronic device
US6571282B1 (en) 1999-08-31 2003-05-27 Accenture Llp Block-based communication in a communication services patterns environment
US6516425B1 (en) * 1999-10-29 2003-02-04 Hewlett-Packard Co. Raid rebuild using most vulnerable data redundancy scheme first
US6826711B2 (en) 2000-02-18 2004-11-30 Avamar Technologies, Inc. System and method for data protection with multidimensional parity
US6718361B1 (en) 2000-04-07 2004-04-06 Network Appliance Inc. Method and apparatus for reliable and scalable distribution of data files in distributed networks
US20160078695A1 (en) * 2000-05-01 2016-03-17 General Electric Company Method and system for managing a fleet of remote assets and/or ascertaining a repair for an asset
US6496814B1 (en) * 2000-07-19 2002-12-17 International Business Machines Corporation Method and system for integrating spatial analysis, and scheduling to efficiently schedule and monitor infrastructure maintenance
WO2002035359A2 (en) 2000-10-26 2002-05-02 Prismedia Networks, Inc. Method and system for managing distributed content and related metadata
US7103915B2 (en) 2000-11-13 2006-09-05 Digital Doors, Inc. Data security system and method
US7140044B2 (en) 2000-11-13 2006-11-21 Digital Doors, Inc. Data security system and method for separation of user communities
US7146644B2 (en) 2000-11-13 2006-12-05 Digital Doors, Inc. Data security system and method responsive to electronic attacks
US8176563B2 (en) 2000-11-13 2012-05-08 DigitalDoors, Inc. Data security system and method with editor
GB2369206B (en) 2000-11-18 2004-11-03 Ibm Method for rebuilding meta-data in a data storage system and a data storage system
US6785783B2 (en) 2000-11-30 2004-08-31 International Business Machines Corporation NUMA system with redundant main memory architecture
US7080101B1 (en) 2000-12-01 2006-07-18 Ncr Corp. Method and apparatus for partitioning data for storage in a database
US20020080888A1 (en) 2000-12-22 2002-06-27 Li Shu Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks
WO2002065275A1 (en) 2001-01-11 2002-08-22 Yottayotta, Inc. Storage virtualization system and methods
US20020156973A1 (en) 2001-01-29 2002-10-24 Ulrich Thomas R. Enhanced disk array
US20030037261A1 (en) 2001-03-26 2003-02-20 Ilumin Corporation Secured content delivery system and method
US6879596B1 (en) 2001-04-11 2005-04-12 Applied Micro Circuits Corporation System and method for systolic array sorting of information segments
US7024609B2 (en) 2001-04-20 2006-04-04 Kencast, Inc. System for protecting the transmission of live data streams, and upon reception, for reconstructing the live data streams and recording them into files
GB2377049A (en) 2001-06-30 2002-12-31 Hewlett Packard Co Billing for utilisation of a data storage array
US6944785B2 (en) 2001-07-23 2005-09-13 Network Appliance, Inc. High-availability cluster virtual server system
US7636724B2 (en) 2001-08-31 2009-12-22 Peerify Technologies LLC Data storage system and method by shredding and deshredding
US20050021359A1 (en) * 2001-11-02 2005-01-27 Mckinney Jerry L. Monitoring system and method
US7024451B2 (en) 2001-11-05 2006-04-04 Hewlett-Packard Development Company, L.P. System and method for maintaining consistent independent server-side state among collaborating servers
US7003688B1 (en) 2001-11-15 2006-02-21 Xiotech Corporation System and method for a reserved memory area shared by all redundant storage controllers
US7171493B2 (en) 2001-12-19 2007-01-30 The Charles Stark Draper Laboratory Camouflage of network traffic to resist attack
EP1547252A4 (en) 2002-07-29 2011-04-20 Robert Halford MULTIDIMENSIONAL DATA PROTECTION AND MIRRORING METHOD FOR MICROBIAL DATA
US7051155B2 (en) 2002-08-05 2006-05-23 Sun Microsystems, Inc. Method and system for striping data to accommodate integrity metadata
US20040122917A1 (en) 2002-12-18 2004-06-24 Menon Jaishankar Moothedath Distributed storage system for data-sharing among client computers running defferent operating system types
JP2006526204A (ja) 2003-03-13 2006-11-16 ディーアールエム テクノロジーズ、エルエルシー セキュアストリーミングコンテナ
US7185144B2 (en) 2003-11-24 2007-02-27 Network Appliance, Inc. Semi-static distribution technique
GB0308264D0 (en) 2003-04-10 2003-05-14 Ibm Recovery from failures within data processing systems
GB0308262D0 (en) 2003-04-10 2003-05-14 Ibm Recovery from failures within data processing systems
US7415115B2 (en) 2003-05-14 2008-08-19 Broadcom Corporation Method and system for disaster recovery of data from a storage device
WO2005017737A2 (en) 2003-08-14 2005-02-24 Compellent Technologies Virtual disk drive system and method
US7373559B2 (en) * 2003-09-11 2008-05-13 Copan Systems, Inc. Method and system for proactive drive replacement for high availability storage systems
US7899059B2 (en) 2003-11-12 2011-03-01 Agere Systems Inc. Media delivery using quality of service differentiation within a media stream
US8332483B2 (en) 2003-12-15 2012-12-11 International Business Machines Corporation Apparatus, system, and method for autonomic control of grid system resources
US7206899B2 (en) 2003-12-29 2007-04-17 Intel Corporation Method, system, and program for managing data transfer and construction
US7222133B1 (en) 2004-02-05 2007-05-22 Unisys Corporation Method for reducing database recovery time
US7240236B2 (en) 2004-03-23 2007-07-03 Archivas, Inc. Fixed content distributed data storage using permutation ring encoding
US7231578B2 (en) 2004-04-02 2007-06-12 Hitachi Global Storage Technologies Netherlands B.V. Techniques for detecting and correcting errors using multiple interleave erasure pointers
JP2005326935A (ja) * 2004-05-12 2005-11-24 Hitachi Ltd 仮想化ストレージを備える計算機システムの管理サーバおよび障害回避復旧方法
US7594063B1 (en) * 2004-08-27 2009-09-22 Lexar Media, Inc. Storage capacity status
JP4446839B2 (ja) 2004-08-30 2010-04-07 株式会社日立製作所 ストレージ装置及びストレージ管理装置
JP2006107080A (ja) * 2004-10-05 2006-04-20 Hitachi Ltd ストレージ装置システム
US7680771B2 (en) 2004-12-20 2010-03-16 International Business Machines Corporation Apparatus, system, and method for database provisioning
US7386758B2 (en) 2005-01-13 2008-06-10 Hitachi, Ltd. Method and apparatus for reconstructing data in object-based storage arrays
US7305579B2 (en) * 2005-03-22 2007-12-04 Xiotech Corporation Method, apparatus and program storage device for providing intelligent rebuild order selection
US7672930B2 (en) 2005-04-05 2010-03-02 Wal-Mart Stores, Inc. System and methods for facilitating a linear grid database with data organization by dimension
US7574623B1 (en) * 2005-04-29 2009-08-11 Network Appliance, Inc. Method and system for rapidly recovering data from a “sick” disk in a RAID disk group
US8190588B1 (en) * 2005-09-19 2012-05-29 Amazon Technologies, Inc. Providing a distributed transaction information storage service
US7574579B2 (en) 2005-09-30 2009-08-11 Cleversafe, Inc. Metadata management system for an information dispersed storage system
US7904475B2 (en) 2007-10-09 2011-03-08 Cleversafe, Inc. Virtualized data storage vaults on a dispersed data storage network
US8171101B2 (en) 2005-09-30 2012-05-01 Cleversafe, Inc. Smart access to a dispersed data storage network
US7546427B2 (en) 2005-09-30 2009-06-09 Cleversafe, Inc. System for rebuilding dispersed data
US8285878B2 (en) 2007-10-09 2012-10-09 Cleversafe, Inc. Block based access to a dispersed data storage network
US7574570B2 (en) 2005-09-30 2009-08-11 Cleversafe Inc Billing system for information dispersal system
US7953937B2 (en) 2005-09-30 2011-05-31 Cleversafe, Inc. Systems, methods, and apparatus for subdividing data for storage in a dispersed data storage grid
EP1798934A1 (en) * 2005-12-13 2007-06-20 Deutsche Thomson-Brandt Gmbh Method and apparatus for organizing nodes in a network
US20070214285A1 (en) 2006-03-08 2007-09-13 Omneon Video Networks Gateway server
US7386827B1 (en) * 2006-06-08 2008-06-10 Xilinx, Inc. Building a simulation environment for a design block
US9697171B2 (en) * 2007-10-09 2017-07-04 Internaitonal Business Machines Corporation Multi-writer revision synchronization in a dispersed storage network
US9084937B2 (en) * 2008-11-18 2015-07-21 Gtech Canada Ulc Faults and performance issue prediction
US8260750B1 (en) * 2009-03-16 2012-09-04 Quest Software, Inc. Intelligent backup escalation system
US10395054B2 (en) 2011-06-06 2019-08-27 Pure Storage, Inc. Updating distributed storage network software
US9256560B2 (en) * 2009-07-29 2016-02-09 Solarflare Communications, Inc. Controller integration
US9558059B2 (en) * 2009-07-30 2017-01-31 International Business Machines Corporation Detecting data requiring rebuilding in a dispersed storage network
US9661356B2 (en) * 2009-10-29 2017-05-23 International Business Machines Corporation Distribution of unique copies of broadcast data utilizing fault-tolerant retrieval from dispersed storage
US9098376B2 (en) * 2009-10-30 2015-08-04 Cleversafe, Inc. Distributed storage network for modification of a data object
US8458233B2 (en) * 2009-11-25 2013-06-04 Cleversafe, Inc. Data de-duplication in a dispersed storage network utilizing data characterization
US9152489B2 (en) * 2009-12-29 2015-10-06 Cleversafe, Inc. Revision synchronization of a dispersed storage network
US8990585B2 (en) * 2009-12-29 2015-03-24 Cleversafe, Inc. Time based dispersed storage access
US8954667B2 (en) * 2010-01-28 2015-02-10 Cleversafe, Inc. Data migration in a dispersed storage network
US10447767B2 (en) * 2010-04-26 2019-10-15 Pure Storage, Inc. Resolving a performance issue within a dispersed storage network
US9092386B2 (en) * 2010-04-26 2015-07-28 Cleversafe, Inc. Indicating an error within a dispersed storage network
US9898373B2 (en) * 2010-04-26 2018-02-20 International Business Machines Corporation Prioritizing rebuilding of stored data in a dispersed storage network
US8521697B2 (en) * 2010-05-19 2013-08-27 Cleversafe, Inc. Rebuilding data in multiple dispersed storage networks
US9311615B2 (en) * 2010-11-24 2016-04-12 International Business Machines Corporation Infrastructure asset management
KR101758883B1 (ko) * 2011-01-10 2017-07-31 스토론 리미티드 라지 스케일 스토리지 시스템
US8996910B2 (en) * 2011-05-09 2015-03-31 Cleversafe, Inc. Assigning a dispersed storage network address range in a maintenance free storage container
US10042709B2 (en) * 2011-06-06 2018-08-07 International Business Machines Corporation Rebuild prioritization during a plurality of concurrent data object write operations
US9521725B2 (en) * 2011-07-26 2016-12-13 Hunter Industries, Inc. Systems and methods for providing power and data to lighting devices
US9135098B2 (en) * 2011-07-27 2015-09-15 Cleversafe, Inc. Modifying dispersed storage network event records
US8549518B1 (en) * 2011-08-10 2013-10-01 Nutanix, Inc. Method and system for implementing a maintenanece service for managing I/O and storage for virtualization environment
US9785491B2 (en) * 2011-10-04 2017-10-10 International Business Machines Corporation Processing a certificate signing request in a dispersed storage network
US9304857B2 (en) * 2011-12-12 2016-04-05 Cleversafe, Inc. Retrieving data from a distributed storage network
US9146810B2 (en) * 2012-01-31 2015-09-29 Cleversafe, Inc. Identifying a potentially compromised encoded data slice
US8719320B1 (en) * 2012-03-29 2014-05-06 Amazon Technologies, Inc. Server-side, variable drive health determination
US9380032B2 (en) * 2012-04-25 2016-06-28 International Business Machines Corporation Encrypting data for storage in a dispersed storage network
US9164841B2 (en) * 2012-06-05 2015-10-20 Cleversafe, Inc. Resolution of a storage error in a dispersed storage network
US9761229B2 (en) * 2012-07-20 2017-09-12 Qualcomm Incorporated Systems, methods, apparatus, and computer-readable media for audio object clustering
US20140101298A1 (en) * 2012-10-05 2014-04-10 Microsoft Corporation Service level agreements for a configurable distributed storage system
US9811533B2 (en) * 2012-12-05 2017-11-07 International Business Machines Corporation Accessing distributed computing functions in a distributed computing system
US10055441B2 (en) * 2013-02-05 2018-08-21 International Business Machines Corporation Updating shared group information in a dispersed storage network
US9679615B2 (en) * 2013-03-15 2017-06-13 Micron Technology, Inc. Flexible memory system with a controller and a stack of memory
US9626125B2 (en) * 2013-07-31 2017-04-18 International Business Machines Corporation Accounting for data that needs to be rebuilt or deleted
US9720758B2 (en) * 2013-09-11 2017-08-01 Dell Products, Lp Diagnostic analysis tool for disk storage engineering and technical support
US9264494B2 (en) * 2013-10-21 2016-02-16 International Business Machines Corporation Automated data recovery from remote data object replicas
US9900316B2 (en) * 2013-12-04 2018-02-20 International Business Machines Corporation Accessing storage units of a dispersed storage network
US9435101B2 (en) * 2014-04-24 2016-09-06 Topcon Positioning Systems, Inc. Semi-automatic control of a joystick for dozer blade control
US9075773B1 (en) * 2014-05-07 2015-07-07 Igneous Systems, Inc. Prioritized repair of data storage failures
US20150356305A1 (en) * 2014-06-05 2015-12-10 Cleversafe, Inc. Secure data access in a dispersed storage network
US20160028419A1 (en) * 2014-07-22 2016-01-28 Lsi Corporation Systems and Methods for Rank Independent Cyclic Data Encoding
US10120739B2 (en) * 2014-12-02 2018-11-06 International Business Machines Corporation Prioritized data rebuilding in a dispersed storage network
US10078472B2 (en) * 2015-02-27 2018-09-18 International Business Machines Corporation Rebuilding encoded data slices in a dispersed storage network
US10079887B2 (en) * 2015-03-31 2018-09-18 International Business Machines Corporation Expanding storage capacity of a set of storage units in a distributed storage network
US10601658B2 (en) * 2015-04-08 2020-03-24 Cisco Technology, Inc. Maintenance of consumable physical components of a network
US10067998B2 (en) * 2015-04-30 2018-09-04 International Business Machines Corporation Distributed sync list
US10528540B2 (en) * 2015-05-11 2020-01-07 AtScale, Inc. Dynamic aggregate generation and updating for high performance querying of large datasets
US10410135B2 (en) * 2015-05-21 2019-09-10 Software Ag Usa, Inc. Systems and/or methods for dynamic anomaly detection in machine sensor data
EP4002759A1 (en) * 2018-01-16 2022-05-25 Nchain Holdings Limited Computer implemented method and system for obtaining digitally signed data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166089A (zh) * 2006-10-18 2008-04-23 株式会社东芝 秘密信息管理设备与秘密信息管理系统
US9203812B2 (en) * 2009-04-20 2015-12-01 Cleversafe, Inc. Dispersed storage network with encrypted portion withholding and methods for use therewith
US8885821B2 (en) * 2010-01-28 2014-11-11 Cleversafe, Inc. Sequencing encoded data slices

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813331A (zh) * 2019-04-10 2020-10-23 阿里巴巴集团控股有限公司 用于操作数据存储系统的方法、系统和非暂时性计算机可读介质
CN110058820A (zh) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 基于固态盘阵列的数据安全写入、删除、读取方法及装置
CN112468494A (zh) * 2020-11-26 2021-03-09 湖北航天信息技术有限公司 一种内外网互联网数据传输方法及装置
CN112764677A (zh) * 2021-01-14 2021-05-07 杭州电子科技大学 一种在云存储中增强数据迁移安全性的方法
CN114785484A (zh) * 2022-04-06 2022-07-22 河南省怡之发电子科技有限公司 一种大数据安全传输方法及系统

Also Published As

Publication number Publication date
US20180307561A1 (en) 2018-10-25
US20170250809A1 (en) 2017-08-31
US20170249205A1 (en) 2017-08-31
US20170249212A1 (en) 2017-08-31
US10678622B2 (en) 2020-06-09
US20170249228A1 (en) 2017-08-31
WO2017149410A1 (en) 2017-09-08
US10673828B2 (en) 2020-06-02
US20170249084A1 (en) 2017-08-31
US10248505B2 (en) 2019-04-02
US20170249203A1 (en) 2017-08-31
US20230315557A1 (en) 2023-10-05
US11704184B2 (en) 2023-07-18
US11204822B1 (en) 2021-12-21
US10326740B2 (en) 2019-06-18
US20170249551A1 (en) 2017-08-31
US20170249086A1 (en) 2017-08-31
DE112017000220T5 (de) 2018-08-09
US20170250965A1 (en) 2017-08-31
US20220083415A1 (en) 2022-03-17
US10120757B2 (en) 2018-11-06
US10824495B2 (en) 2020-11-03
US10476849B2 (en) 2019-11-12
US10089178B2 (en) 2018-10-02

Similar Documents

Publication Publication Date Title
CN108701197A (zh) 高效的秘密密钥加密的安全切片
US10613776B2 (en) Appyling multiple hash functions to generate multiple masked keys in a secure slice implementation
US10656998B2 (en) End-to-end secure data storage in a dispersed storage network
US11036392B2 (en) Determining when to use convergent encryption
US10095441B2 (en) End-to-end secure data retrieval in a dispersed storage network
US20170286239A1 (en) Migrating data slices within a dispersed storage network
US10693640B2 (en) Use of key metadata during write and read operations in a dispersed storage network memory
US20170019253A1 (en) Decrypting segmented data in a distributed computing system
US10642992B2 (en) Password augmented all-or-nothin transform
US20190005261A1 (en) Secure shared vault with encrypted private indices
US10650160B2 (en) Enhancing security for multiple storage configurations
US10901650B2 (en) Using a master encryption key to sanitize a dispersed storage network memory
CN110419029A (zh) 在分布式存储网络中部分更新数据内容的方法
US11336428B1 (en) Blinded passwords for a distributed storage system
US11895098B2 (en) Storing encrypted chunksets of data in a vast storage network
US10853171B2 (en) Encoding data in a dispersed storage network
US10360391B2 (en) Verifiable keyed all-or-nothing transform
US11360851B2 (en) Duplicating authentication information between connections
US10223213B2 (en) Salted zero expansion all or nothing transformation
US20220012123A1 (en) Encoding Data and Associated Metadata in a Storage Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181023