US20120226722A1 - Systems, methods, and computer program products for secure multi-enterprise storage - Google Patents

Systems, methods, and computer program products for secure multi-enterprise storage Download PDF

Info

Publication number
US20120226722A1
US20120226722A1 US13/039,244 US201113039244A US2012226722A1 US 20120226722 A1 US20120226722 A1 US 20120226722A1 US 201113039244 A US201113039244 A US 201113039244A US 2012226722 A1 US2012226722 A1 US 2012226722A1
Authority
US
United States
Prior art keywords
data
file
storage network
files
providers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/039,244
Inventor
Ii Ronald E. Van Buskirk
David L. Wright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US13/039,244 priority Critical patent/US20120226722A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VAN BUSKIRK, RONALD E., II, WRIGHT, DAVID L.
Priority to US13/484,211 priority patent/US8612400B2/en
Publication of US20120226722A1 publication Critical patent/US20120226722A1/en
Priority to US14/052,638 priority patent/US9047303B2/en
Priority to US14/714,278 priority patent/US9256613B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • G06F16/125File system administration, e.g. details of archiving or snapshots using management policies characterised by the use of retention policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Definitions

  • the present invention relates to storage systems and networks, and more particularly, this invention relates to de-duplication of non-confidential files in cloud storage systems and networks.
  • Cloud storage is growing at a phenomenal rate, owing in part to its cost efficient model and ease in implementation.
  • one major drawback for current cloud storage solutions is that many users may not want to risk putting confidential information out on a network controlled by another entity.
  • corporate storage needs are increasing exponentially, with no end in storage demands in sight for the near future. For large corporations or entities that have petabytes of data storage, if even a small fraction of that data could be moved to a less expensive cloud storage solution from conventional storage solutions, millions of dollars could be saved each year.
  • a computer program product for storing data to a storage network includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • ID data identifiers
  • a system in another embodiment, includes a memory and a processor for securely processing the data. Processing the data includes receiving a data ID associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • a system includes logic adapted for receiving a data ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received.
  • the data ID is unique
  • a method for storing data to a storage network includes receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, receiving one of the files having a duplicate data ID from the data provider, storing the file having the duplicate data ID to the storage network, and causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received.
  • the data ID is unique to each different file and is only duplicated when the files are duplicates of one another
  • FIG. 1 depicts a cloud computing node, according to one embodiment.
  • FIG. 2 depicts a cloud computing environment, according to one embodiment.
  • FIG. 3 depicts abstraction model layers, according to one embodiment.
  • FIG. 4 shows a flowchart of a method in accordance with one embodiment.
  • FIG. 5 shows a flowchart of a method in accordance with one embodiment.
  • multiple entities can share lists of data identifiers of files on their enterprise systems, duplicate data identifiers can be identified (which indicates that the files associated with the data identifiers are non-confidential since they appear on multiple entities' enterprise systems), and those files having duplicate data identifiers may be stored in the storage network without exposing any confidential data from any of the entities' enterprise systems.
  • a computer program product for storing data to a storage network includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • ID data identifiers
  • a system in another general embodiment, includes memory and a processor for processing data. Processing the data includes receiving a data ID associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • a system includes logic adapted for receiving a data ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received.
  • the data ID is
  • a method for storing data to a storage network includes receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, receiving one of the files having a duplicate data ID from the data provider, storing the file having the duplicate data ID to the storage network, and causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received.
  • the data ID is unique to each different file and is only duplicated when the files are duplicates of one
  • Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service.
  • This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
  • On-demand self-service a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
  • Resource pooling the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
  • Rapid elasticity capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
  • Measured service cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
  • level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).
  • SaaS Software as a Service: the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure.
  • the applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email).
  • a web browser e.g., web-based email.
  • the consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • PaaS Platform as a Service
  • the consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
  • IaaS Infrastructure as a Service
  • the consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
  • Private cloud the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
  • Public cloud the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
  • Hybrid cloud the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for loadbalancing between clouds).
  • a cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.
  • An infrastructure comprising a network of interconnected nodes.
  • Cloud computing node 10 is only one example of a suitable cloud computing node and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless, cloud computing node 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove.
  • cloud computing node 10 there is a computer system/server 12 , which is operational with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
  • Computer system/server 12 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system.
  • program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types.
  • Computer system/server 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer system storage media including memory storage devices.
  • computer system/server 12 in cloud computing node 10 is shown in the form of a general-purpose computing device.
  • the components of computer system/server 12 may include, but are not limited to, one or more processors or processing units 16 , a system memory 28 , and a bus 18 that couples various system components including system memory 28 to processor 16 .
  • Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • bus architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
  • Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12 , and it includes both volatile and non-volatile media, removable and non-removable media.
  • System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32 .
  • Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media.
  • storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”).
  • a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”).
  • an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided.
  • memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
  • Program/utility 40 having a set (at least one) of program modules 42 , may be stored in memory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment.
  • Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
  • Computer system/server 12 may also communicate with one or more external devices 14 such as a keyboard, a pointing device, a display 24 , etc.; one or more devices that enable a user to interact with computer system/server 12 ; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22 . Still yet, computer system/server 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20 .
  • LAN local area network
  • WAN wide area network
  • public network e.g., the Internet
  • network adapter 20 communicates with the other components of computer system/server 12 via bus 18 .
  • bus 18 It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12 . Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
  • cloud computing environment 50 comprises one or more cloud computing nodes 10 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone 54 A, desktop computer 54 B, laptop computer 54 C, and/or automobile computer system 54 N may communicate.
  • Nodes 10 may communicate with one another. They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof.
  • This allows cloud computing environment 50 to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device.
  • computing devices 54 A-N shown in FIG. 2 are intended to be illustrative only and that computing nodes 10 and cloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
  • FIG. 3 a set of functional abstraction layers provided by cloud computing environment 50 ( FIG. 2 ) is shown. It should be understood in advance that the components, layers, and functions shown in FIG. 3 are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided:
  • Hardware and software layer 60 includes hardware and software components.
  • hardware components include mainframes, in one example IBM® zSeries® systems; RISC (Reduced Instruction Set Computer) architecture based servers, in one example IBM pSeries® systems; IBM xSeries® systems; IBM BladeCenter® systems; storage devices; networks and networking components.
  • software components include network application server software, in one example IBM WebSphere® application server software; and database software, in one example IBM DB2® database software.
  • IBM, zSeries, pSeries, xSeries, BladeCenter, WebSphere, and DB2 are trademarks of International Business Machines Corporation registered in many jurisdictions worldwide).
  • Virtualization layer 62 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers; virtual storage; virtual networks, including virtual private networks; virtual applications and operating systems; and virtual clients.
  • management layer 64 may provide the functions described below.
  • Resource provisioning provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment.
  • Metering and Pricing provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses.
  • Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources.
  • User portal provides access to the cloud computing environment for consumers and system administrators.
  • Service level management provides cloud computing resource allocation and management such that required service levels are met.
  • Service Level Agreement (SLA) planning and fulfillment provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
  • SLA Service Level Agreement
  • Workloads layer 66 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation; software development and lifecycle management; virtual classroom education delivery; data analytics processing; transaction processing; deduplicated storage; etc.
  • data providers which may be businesses, corporations, persons, government agencies, other computer systems, etc.
  • IDs may be cryptographic hash calculations of files on their local storage systems.
  • Each data ID identifies a file uniquely if it is a unique file, and the data ID for two files will be the same if the files are the same.
  • these data IDs prevent any unauthorized parties (e.g., a third party, malicious software, etc.) from knowing what contents each file may contain.
  • companies A, B, C, D, E, F, and G may share hash calculations of the files in their respective systems.
  • a certain hash calculation e.g., ‘a5cfg23’
  • the storage administrator may assume that the file is non-confidential and may be de-duplicated across any of the companies providing data to the storage network.
  • data IDs may be included from internet media content providers, such as YOUTUBE.com, AMAZON.com, FLICKR.com, FACEBOOK.com, etc., so that any data and/or files that appear on these sites may be eliminated by including hash calculations from large media content producers (e.g., YOUTUBE.com or AMAZON.com), and the data can be completely eliminated from the local storage systems of all data providers because it is known that this data is non-confidential and readily available online.
  • internet media content providers such as YOUTUBE.com, AMAZON.com, FLICKR.com, FACEBOOK.com, etc.
  • the embodiments described herein provide less expensive storage solutions while also preventing confidential information from leaving the local firewall of each data provider.
  • a storage network host such as IBM may set up a storage network which may include one or more mainframes, virtualized storage, storage devices, etc., that may provide a high-availability (HA) storage solution.
  • the storage network host may offer storage space on this storage network to many individual data providers, even to data providers which are competitors in their marketplaces, such as AVIS and HERTZ; FORD, NISSAN, and GM; TOSHIBA, FUJITSU, and HITACHI, etc., or to any companies and/or entities which are willing to provide data to store on the storage network (and be willing to pay for it). Many of these companies and/or entities may have data and data backups that are duplicated across their enterprise systems.
  • the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • a method 400 is shown according to one embodiment.
  • the method 400 may be carried out in any desired environment, including those described in FIGS. 1-3 , among others. Of course, more or less operations than those described below may comprise the method 400 , according to various embodiments.
  • a plurality of data identifiers are received from multiple data providers, with each data ID being associated with one of a plurality of files.
  • These data IDs may be stored to a list, a table, a database, an array, etc., such that they may be transferred and/or analyzed.
  • the unique data ID is associated with the file for which it was generated, such that the file and the data ID associated with the file are somehow linked, and by knowing the data ID, the file that is linked to it can be determined.
  • Other information may be stored along with the data ID, such as filename, file location, system location, file size, file type, data provider identity, etc.
  • the data ID may be a one-way identifier, e.g., only those authorized to view the files would be able to determine which file is associated with a particular data ID.
  • each individual data provider may generate the unique data ID for each of the plurality of files using an ID generating routine, guidelines, program, function, executable file, etc.
  • a different entity such as an entity which is hosting a storage network, may generate the data IDs for each of the plurality of files, thereby ensuring that proper data ID generation has taken place so comparisons of data IDs will result in matches when identical files are encountered.
  • the plurality of files may be those files for which the data provider is considering storing to a storage network, all files stored to the data provider's enterprise systems, those files which the data provider thinks are not confidential, etc.
  • the plurality of files in one approach, may be stored on the data provider's enterprise systems, on remote storage, on another storage network, or some other location.
  • the data providers may be companies and/or entities that have data to be uploaded to a storage network, or that are contemplating uploading data to the storage network.
  • the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another, thereby ensuring that if two data IDs are duplicates, then the files associated with the data IDs are also duplicates.
  • this may be carried out in a scheme where there is not an absolute certainty that the data IDs will not be identical with different files, such as with hashing schemes currently utilized commonly in computing systems, for example.
  • the data ID may be generated through a cryptographic hash calculation, or any other uniquely identifying code, alphanumeric string, etc., as would be understood by one of skill in the art upon reading the present descriptions.
  • the data IDs may be generated periodically, in response to an event, according to a schedule, only once, etc.
  • the data IDs may be generated once per day, once per week, once per month, when an amount of new files have been created, when determined to be generated by an authorized person at a data provider, when equipment changes (such as new hardware or deletion of hardware at a storage facility), etc.
  • equipment changes such as new hardware or deletion of hardware at a storage facility
  • the plurality of data IDs are stored to a database.
  • This data base is remotely accessible such that a data provider may add or delete data IDs from the database as their files and systems change.
  • the database may not be remotely accessible, for enhanced security and data integrity.
  • the database may be a remotely accessible database, such as a web-hosted database, a central repository, a virtual database, etc.
  • the database may be hosted, run, managed, maintained, and/or provided by the same entity which hosts the storage network.
  • several databases may be created, such as one for each data provider uploading data to the storage network, one for each type of data provider, one for each data file type, date created, size, etc.
  • a web service or some other remote application may be used to store the data IDs, in a database or any other structure as would be known by one of skill in the art.
  • any duplicate data IDs are identified in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential.
  • the identifying may be executed by the storage network host, such as by using a routine, executable file, function, etc., to compare the data IDs from any remotely accessible databases in which they are stored.
  • any duplicated data ID is assumed to have been created from two identical files, it can be assumed that if two duplicate data IDs are found on the systems of two different data providers, that the file associated with the duplicate data IDs is not confidential.
  • This provides a method of determining non-confidential files across multiple data providers without marking individual files or collections of files as being confidential or non-confidential, which would enable unauthorized access into the systems and retrieving confidential information exponentially easier, and it is desirable to avoid this type of solution.
  • one of the data providers which provided the file having the duplicate data ID is queried to determine if the data provider wants to store the file having the duplicate data ID to a storage network. In this way, even if the file is determined to have been stored in another data provider's system, it is not automatically moved to the storage network. However, in some embodiments, it may be automatically moved, which is why this is an optional operation.
  • the data provider for each file having the duplicate data ID may be queried to determine if the data provider wants to have the file stored to the storage network.
  • the data provider may be queried to determine if the data provider wants to have the file stored to the storage network.
  • a response from the data provider is received indicating whether or not to store the file having the duplicate data ID to the storage network. This, in some embodiments, determines whether to store the file or not. In embodiments where it is automatically stored upon finding a duplicate data ID, this operation is omitted; thus it is an optional operation.
  • each data provider may send a request to store the file associated with the duplicate data ID.
  • each data provider which chose to store the file may be tracked for billing purposes (to be explained in greater detail later), in one embodiment.
  • the data provider requests storage of the file it may be determined whether the file currently exists on the storage network, and if so, a new instance is not created. If the file is not present, an instance of the file may be created on the storage network. In either case, the file on the data provider's enterprise systems may be deleted after successful storage on the storage network.
  • one of the files having a duplicate data ID is received. In one embodiment, it is received from the data provider which provided the response in operation 410 .
  • the file is presumably not a file which contains confidential information, since it is a file which exists outside of the data provider from which it originated, and the data ID is identical to another file at another data provider. This is an inherent function of the data IDs, that they are unique to each file, and will only be recreated for another file if the files are identical. The presumption then is that if two identical files exist at two locations controlled by different entities, the files do not contain confidential information.
  • the file having the duplicate data ID that is stored to the storage network is caused to be deleted from a system of one or more of the data providers from which the data ID associated with the file having the duplicate data ID was received.
  • the file having the duplicate data ID stored on the storage network may be remotely deleted from a system of each data provider from which the duplicate data ID was received (which indicates that these data providers have the duplicate file stored to their systems), such as by the storage network administrator, the storage network itself, automatically, after a predetermined period of time, etc.
  • the local enterprise system of one or more data providers may delete the file having the duplicate data ID upon receiving an instruction to do so from the storage network, the storage network administrator, etc.
  • any method of causing the file having the duplicate data ID to be deleted from a system of the data provider(s) from which the data ID associated with the file having the duplicate data ID was received may be used, as would be understood by one of skill in the art upon reading the present descriptions.
  • some data providers may not wish to delete the files that are stored on the storage network from their enterprise or local systems, such as for backup purposes. In these embodiments, the file having the duplicate data ID is not caused to be deleted from the data provider's system.
  • the file having the duplicate data ID that is stored to the storage network may be deleted from a system of a data provider from which the file having the duplicate data ID originated. In this way, the file is removed from the data provider's network, and access to the file is provided by the storage network.
  • the file having the duplicate data ID is stored to a storage network. In this way, only files which are to be stored to the storage network are transferred, thereby saving bandwidth and computing power, and saving money.
  • the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • a method 500 is shown according to one embodiment.
  • the method 500 may be carried out in any desired environment, including those described in FIGS. 1-4 , among others. Of course, more or less operations than those described below may comprise the method 500 , according to various embodiments.
  • an access list is created.
  • the access list may list a name or some other identifier of each data provider which has authority to access the file on the storage network.
  • each data provider which chose to or had the file stored to the storage network, or in some other way has the authority to access the file is added to the access list.
  • an access list is created for a file stored to the storage network and the access list is populated with any data providers that have authority to access the file. This may be repeated each time new files are stored to the storage network, and when files are marked for deletion by data providers.
  • the access list for a file stored to the storage network may be created if more than one data provider has requested storage of the file to the storage network.
  • data providers may have access to the file stored to the storage network if a data ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers.
  • a data ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers.
  • the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • methods 400 and/or 500 may be used in conjunction with techniques for storing confidential data to the storage network.
  • any data providers who are comfortable with storage networks and storing their confidential information to storage networks could store their confidential information to the storage network (such as in a segregated manner, with encryption, etc.), whereas non-confidential information may be de-duplicated using methods 400 and/or 500 .
  • each data provider which provides any of the plurality of files to be stored to the storage network may be charged a reduced amount of money based on an extent of sharing of the plurality of files among other data providers on the storage network.
  • each data provider may be charged and/or billed a prorated amount for the files that are stored to the storage network based on an extent that the files are shared by other data providers.
  • This charging method may be employed regardless of the actual billing rate per unit of data storage, in this case represented by 1 TB.
  • company A may be charged for 0.495 TB instead of 2 TB, based on an amount of sharing of the files on the storage network and an add-on fee. This may be based on a method of reducing billing based on an amount of shared data, plus a 10% fee. Of course, any fee may be added as desired by the storage network host.
  • any other fee, add-on, multiplier, etc. may be applied to the calculated storage amount, as would be understood by one of skill in the art.
  • the shared rates may be determined with an added charge, a per-access fee, tiered pricing based on the availability of the stored data, storage costs for the shared data, or any other pricing, billing, and/or charging method as would be understood by one of skill in the art.
  • a data provider may have reduced billing and/or charging based on a percentage of total enterprise data that is stored to the storage network.
  • data or files which are not de-duplicated on the storage network may be stored to the storage network, and since it is not obvious that these files (data) are not confidential, they may be stored as encrypted data.
  • the encryption removes the de-duplication incentive, but protects any files that may be confidential from being viewed by others not having authority to access them on the storage network.
  • files that are non-confidential e.g., notepad.exe, winzip.exe, YOUTUBE.COM videos, mp3 files, etc.
  • a central location e.g., the storage network, a local enterprise storage server, etc.
  • the vast majority of confidential files are generally not located in more than one location, and therefore are not moved into shared central storage, according to most approaches.
  • a computer program product for storing data to a storage network comprises a computer readable storage medium having computer readable program code embodied therewith.
  • the computer readable program code comprises computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files, associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • ID data identifiers
  • the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another.
  • the data ID may be a cryptographic hash.
  • the database may be a remotely accessible database, as previously described.
  • the computer program product may further comprise computer readable program code configured to: query one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to the storage network, and receive a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
  • the computer program product may further comprise computer readable program code configured to cause deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
  • the computer program product may further comprise computer readable program code configured to: create an access list for a file stored to the storage network, and populate the access list with any data providers that have authority to access the file.
  • the access list may be created if more than one data provider has requested storage of the file to the storage network.
  • data providers may have access to the file stored to the storage network if a data ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers.
  • the computer program product may further comprise computer readable program code configured to: scan one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers, and provide access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
  • each data provider which provides any of the plurality of files to be stored to the storage network may be charged a reduced amount of money based on an extent of sharing of the plurality of files among other data providers on the storage network.
  • the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • a system comprises a memory for storing data and a processor for securely processing the data.
  • processing the data comprises receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • ID data identifier
  • the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another, the unique data ID may be a cryptographic hash, a data provider may provide at least one file having the duplicate data ID, and the processing may further comprise querying the data provider to determine if the data provider wants to store the file having the duplicate data ID on the storage network, and receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
  • the processing may include causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
  • the processing may further comprise creating an access list for a file stored to the storage network, and populating the access list with any data providers that have authority to access the file stored to the storage network, wherein the access list is created if more than one data provider has requested storage of the file to the storage network.
  • any data providers may have access to the file stored to the storage network if a data ID associated with the file is received from those data providers indicating that the file was stored in a system of those data providers.
  • the processing may include scanning one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers, and providing access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
  • the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • a system includes logic adapted for receiving a ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received, wherein the data ID is
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

In one embodiment, a system includes logic adapted for: receiving data identifiers (IDs), each associated with a file, from multiple data providers, storing the data IDs to a database, identifying any duplicate data IDs in the database to determine if any of the files associated with the data IDs are non-confidential, querying the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file to a storage network, such as a cloud storage network, receiving a response from the data provider indicating whether or not to store the file to the storage network, receiving the file from the data provider, storing the file to a storage network, and causing deletion of the file from a system of the data provider. In other embodiments, computer program products are presented for storing data to a storage network.

Description

    BACKGROUND
  • The present invention relates to storage systems and networks, and more particularly, this invention relates to de-duplication of non-confidential files in cloud storage systems and networks.
  • Cloud storage is growing at a phenomenal rate, owing in part to its cost efficient model and ease in implementation. However, one major drawback for current cloud storage solutions is that many users may not want to risk putting confidential information out on a network controlled by another entity. However, corporate storage needs are increasing exponentially, with no end in storage demands in sight for the near future. For large corporations or entities that have petabytes of data storage, if even a small fraction of that data could be moved to a less expensive cloud storage solution from conventional storage solutions, millions of dollars could be saved each year.
  • Current storage solutions include compressing and de-duplicating storage, which save significant amounts of storage space as compared to other conventional storage solutions. However, even this tightly compacted storage is expensive to maintain. If multiple corporations or entities worked together to store all duplicated storage items in a shared (e.g., a cloud storage) solution, then each of the entities would save money. However, if any of the corporations or entities encrypt the items they store, then de-duplication is not possible. However, if the corporation or entities do not encrypt their data, then the corporations or entities are putting that data at risk, possibly allowing access to confidential information in a cloud, which is controlled by a third party entity.
  • BRIEF SUMMARY
  • In one embodiment, a computer program product for storing data to a storage network includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • In another embodiment, a system includes a memory and a processor for securely processing the data. Processing the data includes receiving a data ID associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • According to another embodiment, a system includes logic adapted for receiving a data ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received. The data ID is unique to each different file and is only duplicated when the files are duplicates of one another, and the data ID is a cryptographic hash.
  • In yet another embodiment, a method for storing data to a storage network includes receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, receiving one of the files having a duplicate data ID from the data provider, storing the file having the duplicate data ID to the storage network, and causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received. The data ID is unique to each different file and is only duplicated when the files are duplicates of one another, and the data ID is a cryptographic hash.
  • Other aspects and embodiments of the present invention will become apparent from the following detailed description, which, when taken in conjunction with the drawings, illustrate by way of example the principles of the invention.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 depicts a cloud computing node, according to one embodiment.
  • FIG. 2 depicts a cloud computing environment, according to one embodiment.
  • FIG. 3 depicts abstraction model layers, according to one embodiment.
  • FIG. 4 shows a flowchart of a method in accordance with one embodiment.
  • FIG. 5 shows a flowchart of a method in accordance with one embodiment.
  • DETAILED DESCRIPTION
  • The following description is made for the purpose of illustrating the general principles of the present invention and is not meant to limit the inventive concepts claimed herein. Further, particular features described herein can be used in combination with other described features in each of the various possible combinations and permutations.
  • Unless otherwise specifically defined herein, all terms are to be given their broadest possible interpretation including meanings implied from the specification as well as meanings understood by those skilled in the art and/or as defined in dictionaries, treatises, etc.
  • It must also be noted that, as used in the specification and the appended claims, the singular forms “a,” “an” and “the” include plural referents unless otherwise specified. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The following description discloses several embodiments of storage systems which allow data providers to share non-confidential information without marking confidential information on their enterprise systems. For example, in one non-limiting embodiment, multiple entities can share lists of data identifiers of files on their enterprise systems, duplicate data identifiers can be identified (which indicates that the files associated with the data identifiers are non-confidential since they appear on multiple entities' enterprise systems), and those files having duplicate data identifiers may be stored in the storage network without exposing any confidential data from any of the entities' enterprise systems.
  • In one general embodiment, a computer program product for storing data to a storage network includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • In another general embodiment, a system includes memory and a processor for processing data. Processing the data includes receiving a data ID associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • According to another general embodiment, a system includes logic adapted for receiving a data ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received. The data ID is unique to each different file and is only duplicated when the files are duplicates of one another, and the data ID is a cryptographic hash.
  • In yet another general embodiment, a method for storing data to a storage network includes receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, receiving one of the files having a duplicate data ID from the data provider, storing the file having the duplicate data ID to the storage network, and causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received. The data ID is unique to each different file and is only duplicated when the files are duplicates of one another, and the data ID is a cryptographic hash.
  • It is understood in advance that although this disclosure includes a detailed description on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed.
  • Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
  • Characteristics are as follows:
  • On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
  • Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
  • Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
  • Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
  • Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
  • Service Models are as follows:
  • Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
  • Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
  • Deployment Models are as follows:
  • Private cloud: the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
  • Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises.
  • Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
  • Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for loadbalancing between clouds).
  • A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.
  • Referring now to FIG. 1, a schematic of an example of a cloud computing node is shown. Cloud computing node 10 is only one example of a suitable cloud computing node and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless, cloud computing node 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove.
  • In cloud computing node 10 there is a computer system/server 12, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
  • Computer system/server 12 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
  • As shown in FIG. 1, computer system/server 12 in cloud computing node 10 is shown in the form of a general-purpose computing device. The components of computer system/server 12 may include, but are not limited to, one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including system memory 28 to processor 16.
  • Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
  • Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12, and it includes both volatile and non-volatile media, removable and non-removable media.
  • System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32. Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected to bus 18 by one or more data media interfaces. As will be further depicted and described below, memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
  • Program/utility 40, having a set (at least one) of program modules 42, may be stored in memory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
  • Computer system/server 12 may also communicate with one or more external devices 14 such as a keyboard, a pointing device, a display 24, etc.; one or more devices that enable a user to interact with computer system/server 12; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22. Still yet, computer system/server 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20. As depicted, network adapter 20 communicates with the other components of computer system/server 12 via bus 18. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12. Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
  • Referring now to FIG. 2, illustrative cloud computing environment 50 is depicted. As shown, cloud computing environment 50 comprises one or more cloud computing nodes 10 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone 54A, desktop computer 54B, laptop computer 54C, and/or automobile computer system 54N may communicate. Nodes 10 may communicate with one another. They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof. This allows cloud computing environment 50 to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device. It is understood that the types of computing devices 54A-N shown in FIG. 2 are intended to be illustrative only and that computing nodes 10 and cloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
  • Referring now to FIG. 3, a set of functional abstraction layers provided by cloud computing environment 50 (FIG. 2) is shown. It should be understood in advance that the components, layers, and functions shown in FIG. 3 are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided:
  • Hardware and software layer 60 includes hardware and software components. Examples of hardware components include mainframes, in one example IBM® zSeries® systems; RISC (Reduced Instruction Set Computer) architecture based servers, in one example IBM pSeries® systems; IBM xSeries® systems; IBM BladeCenter® systems; storage devices; networks and networking components. Examples of software components include network application server software, in one example IBM WebSphere® application server software; and database software, in one example IBM DB2® database software. (IBM, zSeries, pSeries, xSeries, BladeCenter, WebSphere, and DB2 are trademarks of International Business Machines Corporation registered in many jurisdictions worldwide).
  • Virtualization layer 62 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers; virtual storage; virtual networks, including virtual private networks; virtual applications and operating systems; and virtual clients.
  • In one example, management layer 64 may provide the functions described below. Resource provisioning provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering and Pricing provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources. User portal provides access to the cloud computing environment for consumers and system administrators. Service level management provides cloud computing resource allocation and management such that required service levels are met. Service Level Agreement (SLA) planning and fulfillment provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
  • Workloads layer 66 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation; software development and lifecycle management; virtual classroom education delivery; data analytics processing; transaction processing; deduplicated storage; etc.
  • According to one embodiment, data providers, which may be businesses, corporations, persons, government agencies, other computer systems, etc., may share lists of unique data identifiers (IDs) of files on the data provider's system. In one approach, the data IDs may be cryptographic hash calculations of files on their local storage systems. Each data ID identifies a file uniquely if it is a unique file, and the data ID for two files will be the same if the files are the same. In addition, these data IDs, in one approach, prevent any unauthorized parties (e.g., a third party, malicious software, etc.) from knowing what contents each file may contain.
  • For example, companies A, B, C, D, E, F, and G may share hash calculations of the files in their respective systems. By knowing a certain hash calculation (e.g., ‘a5cfg23’) is located in Company A, C, D, and G, the storage administrator may assume that the file is non-confidential and may be de-duplicated across any of the companies providing data to the storage network.
  • In another embodiment, data IDs may be included from internet media content providers, such as YOUTUBE.com, AMAZON.com, FLICKR.com, FACEBOOK.com, etc., so that any data and/or files that appear on these sites may be eliminated by including hash calculations from large media content producers (e.g., YOUTUBE.com or AMAZON.com), and the data can be completely eliminated from the local storage systems of all data providers because it is known that this data is non-confidential and readily available online.
  • The embodiments described herein provide less expensive storage solutions while also preventing confidential information from leaving the local firewall of each data provider.
  • According to one exemplary embodiment, a storage network host, such as IBM, may set up a storage network which may include one or more mainframes, virtualized storage, storage devices, etc., that may provide a high-availability (HA) storage solution. The storage network host may offer storage space on this storage network to many individual data providers, even to data providers which are competitors in their marketplaces, such as AVIS and HERTZ; FORD, NISSAN, and GM; TOSHIBA, FUJITSU, and HITACHI, etc., or to any companies and/or entities which are willing to provide data to store on the storage network (and be willing to pay for it). Many of these companies and/or entities may have data and data backups that are duplicated across their enterprise systems. For example, even if the companies and/or entities used de-duplication, they would still be left with a single instance of applications, images, videos, and audio files that are duplicated across their different enterprise systems. By storing these duplicated files, applications, programs, etc., on the HA storage network with IBM, the companies and/or entities may reduce terabytes of otherwise expensive storage use on their own enterprise systems.
  • In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • Now referring to FIG. 4, a method 400 is shown according to one embodiment. The method 400 may be carried out in any desired environment, including those described in FIGS. 1-3, among others. Of course, more or less operations than those described below may comprise the method 400, according to various embodiments.
  • In operation 402, a plurality of data identifiers (IDs) are received from multiple data providers, with each data ID being associated with one of a plurality of files. These data IDs may be stored to a list, a table, a database, an array, etc., such that they may be transferred and/or analyzed. After creation, the unique data ID is associated with the file for which it was generated, such that the file and the data ID associated with the file are somehow linked, and by knowing the data ID, the file that is linked to it can be determined. Other information may be stored along with the data ID, such as filename, file location, system location, file size, file type, data provider identity, etc. However, in one embodiment, the data ID may be a one-way identifier, e.g., only those authorized to view the files would be able to determine which file is associated with a particular data ID.
  • In one embodiment, each individual data provider may generate the unique data ID for each of the plurality of files using an ID generating routine, guidelines, program, function, executable file, etc. In an alternative approach, a different entity, such as an entity which is hosting a storage network, may generate the data IDs for each of the plurality of files, thereby ensuring that proper data ID generation has taken place so comparisons of data IDs will result in matches when identical files are encountered.
  • In one embodiment, the plurality of files may be those files for which the data provider is considering storing to a storage network, all files stored to the data provider's enterprise systems, those files which the data provider thinks are not confidential, etc. The plurality of files, in one approach, may be stored on the data provider's enterprise systems, on remote storage, on another storage network, or some other location.
  • In another approach, the data providers may be companies and/or entities that have data to be uploaded to a storage network, or that are contemplating uploading data to the storage network.
  • According to one embodiment, the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another, thereby ensuring that if two data IDs are duplicates, then the files associated with the data IDs are also duplicates. Of course, this may be carried out in a scheme where there is not an absolute certainty that the data IDs will not be identical with different files, such as with hashing schemes currently utilized commonly in computing systems, for example.
  • In one embodiment, the data ID may be generated through a cryptographic hash calculation, or any other uniquely identifying code, alphanumeric string, etc., as would be understood by one of skill in the art upon reading the present descriptions.
  • In another embodiment, the data IDs may be generated periodically, in response to an event, according to a schedule, only once, etc. For example, the data IDs may be generated once per day, once per week, once per month, when an amount of new files have been created, when determined to be generated by an authorized person at a data provider, when equipment changes (such as new hardware or deletion of hardware at a storage facility), etc. In this way, a data provider can be assured that they are getting the most use out of the storage network that they can, and that they are up to date as to access authority, confidentiality of files, and security of data.
  • In operation 404, the plurality of data IDs are stored to a database. This data base is remotely accessible such that a data provider may add or delete data IDs from the database as their files and systems change. However, in one approach where the storage network host manages the data IDs, the database may not be remotely accessible, for enhanced security and data integrity.
  • In one embodiment, the database may be a remotely accessible database, such as a web-hosted database, a central repository, a virtual database, etc.
  • According to one approach, the database may be hosted, run, managed, maintained, and/or provided by the same entity which hosts the storage network. In another approach, several databases may be created, such as one for each data provider uploading data to the storage network, one for each type of data provider, one for each data file type, date created, size, etc.
  • In one approach, a web service or some other remote application, as would be known by one of skill in the art, may be used to store the data IDs, in a database or any other structure as would be known by one of skill in the art.
  • In operation 406, any duplicate data IDs are identified in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential. In one approach, the identifying may be executed by the storage network host, such as by using a routine, executable file, function, etc., to compare the data IDs from any remotely accessible databases in which they are stored.
  • Since any duplicated data ID is assumed to have been created from two identical files, it can be assumed that if two duplicate data IDs are found on the systems of two different data providers, that the file associated with the duplicate data IDs is not confidential. This provides a method of determining non-confidential files across multiple data providers without marking individual files or collections of files as being confidential or non-confidential, which would enable unauthorized access into the systems and retrieving confidential information exponentially easier, and it is desirable to avoid this type of solution.
  • In optional operation 408, one of the data providers which provided the file having the duplicate data ID is queried to determine if the data provider wants to store the file having the duplicate data ID to a storage network. In this way, even if the file is determined to have been stored in another data provider's system, it is not automatically moved to the storage network. However, in some embodiments, it may be automatically moved, which is why this is an optional operation.
  • According to one embodiment, for example, the data provider for each file having the duplicate data ID may be queried to determine if the data provider wants to have the file stored to the storage network. When multiple data providers have duplicate files in their systems, there is a chance of removing several instances of the same files from multiple different data providers.
  • In optional operation 410, a response from the data provider is received indicating whether or not to store the file having the duplicate data ID to the storage network. This, in some embodiments, determines whether to store the file or not. In embodiments where it is automatically stored upon finding a duplicate data ID, this operation is omitted; thus it is an optional operation.
  • In another embodiment, after being queried, each data provider may send a request to store the file associated with the duplicate data ID. At this point, each data provider which chose to store the file may be tracked for billing purposes (to be explained in greater detail later), in one embodiment. In this embodiment where the data provider requests storage of the file, it may be determined whether the file currently exists on the storage network, and if so, a new instance is not created. If the file is not present, an instance of the file may be created on the storage network. In either case, the file on the data provider's enterprise systems may be deleted after successful storage on the storage network.
  • In operation 412, one of the files having a duplicate data ID is received. In one embodiment, it is received from the data provider which provided the response in operation 410.
  • The file is presumably not a file which contains confidential information, since it is a file which exists outside of the data provider from which it originated, and the data ID is identical to another file at another data provider. This is an inherent function of the data IDs, that they are unique to each file, and will only be recreated for another file if the files are identical. The presumption then is that if two identical files exist at two locations controlled by different entities, the files do not contain confidential information.
  • In optional operation 414, the file having the duplicate data ID that is stored to the storage network is caused to be deleted from a system of one or more of the data providers from which the data ID associated with the file having the duplicate data ID was received. For example, the file having the duplicate data ID stored on the storage network may be remotely deleted from a system of each data provider from which the duplicate data ID was received (which indicates that these data providers have the duplicate file stored to their systems), such as by the storage network administrator, the storage network itself, automatically, after a predetermined period of time, etc. In another example, the local enterprise system of one or more data providers may delete the file having the duplicate data ID upon receiving an instruction to do so from the storage network, the storage network administrator, etc. Of course, any method of causing the file having the duplicate data ID to be deleted from a system of the data provider(s) from which the data ID associated with the file having the duplicate data ID was received may be used, as would be understood by one of skill in the art upon reading the present descriptions. Furthermore, some data providers may not wish to delete the files that are stored on the storage network from their enterprise or local systems, such as for backup purposes. In these embodiments, the file having the duplicate data ID is not caused to be deleted from the data provider's system.
  • In one embodiment, the file having the duplicate data ID that is stored to the storage network may be deleted from a system of a data provider from which the file having the duplicate data ID originated. In this way, the file is removed from the data provider's network, and access to the file is provided by the storage network.
  • In operation 416, the file having the duplicate data ID is stored to a storage network. In this way, only files which are to be stored to the storage network are transferred, thereby saving bandwidth and computing power, and saving money.
  • In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • Now referring to FIG. 5, a method 500 is shown according to one embodiment. The method 500 may be carried out in any desired environment, including those described in FIGS. 1-4, among others. Of course, more or less operations than those described below may comprise the method 500, according to various embodiments.
  • In operation 502, according to one embodiment, if the file already exists on the storage network, then an access list is created. The access list may list a name or some other identifier of each data provider which has authority to access the file on the storage network.
  • In operation 504, according to another embodiment, each data provider which chose to or had the file stored to the storage network, or in some other way has the authority to access the file, is added to the access list.
  • For example, in one embodiment, an access list is created for a file stored to the storage network and the access list is populated with any data providers that have authority to access the file. This may be repeated each time new files are stored to the storage network, and when files are marked for deletion by data providers.
  • In one approach, the access list for a file stored to the storage network may be created if more than one data provider has requested storage of the file to the storage network.
  • In another approach, data providers may have access to the file stored to the storage network if a data ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers. Of course, other ways of determining which data providers have access to the file, and therefore populate the access list, may be used, as would be apparent to one of skill in the art upon reading the present descriptions.
  • In operation 506, in another embodiment, where an access list exists for a file on the storage network, if a data provider chooses to delete the file, the data provider's name or other identifier is removed from the access list, thereby revoking the data provider's access to the file on the storage network. To the data provider, it simply appears (virtually) as if the file has been deleted, but no file deletion is actually performed. However, if the data provider which chooses to delete the file is the last on the access list, then the file is actually deleted from the storage network.
  • In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • In more approaches, methods 400 and/or 500 may be used in conjunction with techniques for storing confidential data to the storage network. In this way, any data providers who are comfortable with storage networks and storing their confidential information to storage networks could store their confidential information to the storage network (such as in a segregated manner, with encryption, etc.), whereas non-confidential information may be de-duplicated using methods 400 and/or 500. This would allow for the data provider to reduce storage costs incrementally by de-duplication, and maintain confidentiality of sensitive information.
  • According to one embodiment, each data provider which provides any of the plurality of files to be stored to the storage network may be charged a reduced amount of money based on an extent of sharing of the plurality of files among other data providers on the storage network. In other words, each data provider may be charged and/or billed a prorated amount for the files that are stored to the storage network based on an extent that the files are shared by other data providers.
  • For example, if company A has 2 TB of data stored to the storage network, and 1 TB of data is shared with three other companies and 1 TB of data is shared with four other companies, company A may be charged some percentage of what it would be charged if the data was not shared. In one embodiment, company A may be charged for 0.45 TB instead of 2 TB, since 1 TB is shared five ways (1 TB/5=0.2 TB), and the other 1 TB is shared four ways (between company A and three other companies) (1 TB/4=0.25 TB), and 0.2 TB+0.25 TB=0.45 TB. This charging method may be employed regardless of the actual billing rate per unit of data storage, in this case represented by 1 TB.
  • In another example, company A may be charged for 0.495 TB instead of 2 TB, based on an amount of sharing of the files on the storage network and an add-on fee. This may be based on a method of reducing billing based on an amount of shared data, plus a 10% fee. Of course, any fee may be added as desired by the storage network host. Continuing the example above, company A may be charged for 1 TB shared five ways (1 TB/5+10%=0.2 TB+(10%×0.2 TB)=0.22 TB), and 1 TB shared four ways (1 TB/4+10%=0.25 TB+(10%×0.25 TB)=0.275 TB), and 0.22 TB+0.275 TB=0.495 TB. Of course, any other fee, add-on, multiplier, etc., may be applied to the calculated storage amount, as would be understood by one of skill in the art.
  • In another embodiment, the shared rates may be determined with an added charge, a per-access fee, tiered pricing based on the availability of the stored data, storage costs for the shared data, or any other pricing, billing, and/or charging method as would be understood by one of skill in the art.
  • In another method, a data provider may have reduced billing and/or charging based on a percentage of total enterprise data that is stored to the storage network.
  • Not only does this reduce the cost of storage for the data providers, it also encourages shared data storage. Increased shared storage results in increased energy savings (individual data providers no longer provide storage for duplicated data), decreased storage costs, and the ability to more easily upgrade storage components, since the host company would be responsible for any such upgrades and would be able to more swiftly and efficiently upgrade the storage network components and systems.
  • According to embodiments presented herein, it is anticipated that the vast majority of data on any data provider's enterprise systems would have data IDs which would not be candidates for moving the data to the storage network. However, this does not preclude the data provider from storing the data to the storage network; there just would not be a de-duplication incentive to do so, according to most embodiments.
  • In some more embodiments, data or files which are not de-duplicated on the storage network may be stored to the storage network, and since it is not obvious that these files (data) are not confidential, they may be stored as encrypted data. The encryption removes the de-duplication incentive, but protects any files that may be confidential from being viewed by others not having authority to access them on the storage network.
  • For example, since every file has a unique data ID, files that are non-confidential (e.g., notepad.exe, winzip.exe, YOUTUBE.COM videos, mp3 files, etc.) that are located at different locations in the enterprise may be located by this data ID and stored in a central location (e.g., the storage network, a local enterprise storage server, etc.). The vast majority of confidential files are generally not located in more than one location, and therefore are not moved into shared central storage, according to most approaches.
  • According to one embodiment, a computer program product for storing data to a storage network comprises a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code comprises computer readable program code configured to: receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files, store the plurality of data IDs to a database, identify any duplicate data IDs in the database to determine if any of the plurality of files, associated with the plurality of data IDs are non-confidential, receive one of the files having a duplicate data ID, and store the file having the duplicate data ID to a storage network.
  • In more approaches, the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another. In a further approach, the data ID may be a cryptographic hash.
  • According to another approach, the database may be a remotely accessible database, as previously described.
  • In one embodiment, the computer program product may further comprise computer readable program code configured to: query one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to the storage network, and receive a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
  • In another embodiment, the computer program product may further comprise computer readable program code configured to cause deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
  • According to yet another embodiment, the computer program product may further comprise computer readable program code configured to: create an access list for a file stored to the storage network, and populate the access list with any data providers that have authority to access the file. In one approach, the access list may be created if more than one data provider has requested storage of the file to the storage network.
  • In another embodiment, data providers may have access to the file stored to the storage network if a data ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers.
  • In another embodiment, the computer program product may further comprise computer readable program code configured to: scan one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers, and provide access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
  • According to one approach, each data provider which provides any of the plurality of files to be stored to the storage network may be charged a reduced amount of money based on an extent of sharing of the plurality of files among other data providers on the storage network.
  • In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • In one preferred embodiment, a system comprises a memory for storing data and a processor for securely processing the data. By securely, what is meant is that the processing is performed in a manner which makes it difficult to steal, corrupt, manipulate or otherwise intercept data. Processing the data comprises receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers, storing the data ID associated with each of the plurality of files to a database, identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, receiving one of the files having a duplicate data ID, and storing the file having the duplicate data ID to a storage network.
  • In various embodiments, the data ID may be unique to each different file and is only duplicated when the files are duplicates of one another, the unique data ID may be a cryptographic hash, a data provider may provide at least one file having the duplicate data ID, and the processing may further comprise querying the data provider to determine if the data provider wants to store the file having the duplicate data ID on the storage network, and receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
  • In more approaches, the processing may include causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
  • In another approach, the processing may further comprise creating an access list for a file stored to the storage network, and populating the access list with any data providers that have authority to access the file stored to the storage network, wherein the access list is created if more than one data provider has requested storage of the file to the storage network.
  • In a further embodiment, any data providers may have access to the file stored to the storage network if a data ID associated with the file is received from those data providers indicating that the file was stored in a system of those data providers.
  • According to yet another embodiment, the processing may include scanning one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers, and providing access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
  • In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented.
  • According to one embodiment, a system includes logic adapted for receiving a ID associated with each of a plurality of files from multiple data providers, logic adapted for storing the data ID associated with each of the plurality of files to a database, logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential, logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network, logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network, logic adapted for receiving one of the files having a duplicate data ID from the data provider, logic adapted for storing the file having the duplicate data ID to the storage network, and logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received, wherein the data ID is unique to each different file and is only duplicated when the files are duplicates of one another; and the data ID is a cryptographic hash. In some embodiments, the storage network may be implemented as a cloud storage network, in accordance with any descriptions of a cloud storage network as previously presented:
  • The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (25)

1. A computer program product for storing data to a storage network, the computer program product comprising a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising:
computer readable program code configured to receive a plurality of data identifiers (ID) from multiple data providers, each data ID being associated with one of a plurality of files;
computer readable program code configured to store the plurality of data IDs to a database;
computer readable program code configured to identify any duplicate data IDs in the database to determine if any of the plurality of files associated with the plurality of data IDs are non-confidential;
computer readable program code configured to receive one of the files having a duplicate data ID; and
computer readable program code configured to store the file having the duplicate data ID to a storage network.
2. The computer program product as recited in claim 1, wherein the data ID is unique to each different file and is only duplicated when the files are duplicates of one another.
3. The computer program product as recited in claim 1, wherein the data ID is a cryptographic hash.
4. The computer program product as recited in claim 1, wherein the database is a remotely accessible database.
5. The computer program product as recited in claim 1, further comprising:
computer readable program code configured to query one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to the storage network; and
computer readable program code configured to receive a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
6. The computer program product as recited in claim 1, further comprising computer readable program code configured to cause deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
7. The computer program product as recited in claim 1, further comprising:
computer readable program code configured to create an access list for a file stored to the storage network; and
computer readable program code configured to populate the access list with any data providers that have authority to access the file.
8. The computer program product as recited in claim 7, wherein the access list is created if more than one data provider has requested storage of the file to the storage network.
9. The computer program product as recited in claim 7, wherein data providers have access to the file stored to the storage network if a data. ID associated with the file stored to the storage network is received from the data providers indicating that the file was stored in a system of those data providers.
10. The computer program product as recited in claim 1, further comprising:
computer readable program code configured to scan one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers; and
computer readable program code configured to provide access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
11. The computer program product as recited in claim 1, wherein each data provider which provides any of the plurality of files to be stored to the storage network is charged a reduced amount of money based on an extent of sharing of the plurality of files among other data providers on the storage network.
12. The computer program product as recited in claim 1, wherein the storage network is implemented as a cloud storage network.
13. A system, comprising:
a memory;
a processor configured for securely processing data, wherein the processing the data comprises:
receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers; storing the data ID associated with each of the plurality of files to a database;
identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential;
receiving one of the files having a duplicate data ID; and
storing the file having the duplicate data ID to a storage network.
14. The system as recited in claim 13, wherein the data ID is unique to each different file and is only duplicated when the files are duplicates of one another.
15. The system as recited in claim 13, wherein the data ID is a cryptographic hash.
16. The system as recited in claim 13, wherein the processing the data further comprises:
querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to the storage network; and
receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network.
17. The system as recited in claim 13, wherein the processing the data further comprises causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of one of the data providers from which the data ID associated with the file having the duplicate data ID was received.
18. The system as recited in claim 13, wherein the processing the data further comprises:
creating an access list for a file stored to the storage network; and
populating the access list with any data providers that have authority to access the file stored to the storage network,
wherein the access list is created if more than one data provider has requested storage of the file to the storage network.
19. The system as recited in claim 18, wherein any data providers have access to the file stored to the storage network if a data ID associated with the file is received from those data providers indicating that the file was stored in a system of those data providers.
20. The system as recited in claim 13, wherein the processing the data further comprises:
scanning one or more publicly accessible media content providers to determine if any of the plurality of files exist on the one or more publicly accessible media content providers; and
providing access to any of the plurality of files that exist on the one or more publicly accessible media content providers from the one or more publicly accessible media content providers with the proviso that any of the plurality of files that exist on the one or more publicly accessible media content providers are not stored to the storage network.
21. The system as recited in claim 13, wherein the storage network is implemented as a cloud storage network.
22. A system, comprising:
logic adapted for receiving a data identifier (ID) associated with each of a plurality of files from multiple data providers;
logic adapted for storing the data ID associated with each of the plurality of files to a database;
logic adapted for identifying any duplicate data IDs in the database to determine if any of the plurality of files associated with the data IDs are non-confidential;
logic adapted for querying one of the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file having the duplicate data ID to a storage network;
logic adapted for receiving a response from the data provider indicating whether or not to store the file having the duplicate data ID to the storage network;
logic adapted for receiving one of the files having a duplicate data ID from the data provider;
logic adapted for storing the file having the duplicate data. ID to the storage network; and
logic adapted for causing deletion of the file having the duplicate data ID that is stored to the storage network from a system of the data provider from which the file having the duplicate data ID was received,
wherein the data ID is unique to each different file and is only duplicated when the files are duplicates of one another, and
wherein the data ID is a cryptographic hash.
23. The system as recited in claim 22, further comprising:
logic adapted for creating an access list for a file stored to the storage network; and
logic adapted for populating the access list with any data providers that have authority to access the file stored to the storage network,
wherein the access list is created if more than one data provider has requested storage of the file to the storage network.
24. The system as recited in claim 23, wherein any data providers have access to the file stored to the storage network if a data ID associated with the file is received from those data providers indicating that the file was stored in a system of those data providers.
25-27. (canceled)
US13/039,244 2011-03-02 2011-03-02 Systems, methods, and computer program products for secure multi-enterprise storage Abandoned US20120226722A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US13/039,244 US20120226722A1 (en) 2011-03-02 2011-03-02 Systems, methods, and computer program products for secure multi-enterprise storage
US13/484,211 US8612400B2 (en) 2011-03-02 2012-05-30 Methods for secure multi-enterprise storage
US14/052,638 US9047303B2 (en) 2011-03-02 2013-10-11 Systems, methods, and computer program products for secure multi-enterprise storage
US14/714,278 US9256613B2 (en) 2011-03-02 2015-05-16 Systems, methods, and computer program products for secure multi-enterprise storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/039,244 US20120226722A1 (en) 2011-03-02 2011-03-02 Systems, methods, and computer program products for secure multi-enterprise storage

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/484,211 Continuation US8612400B2 (en) 2011-03-02 2012-05-30 Methods for secure multi-enterprise storage
US14/052,638 Continuation US9047303B2 (en) 2011-03-02 2013-10-11 Systems, methods, and computer program products for secure multi-enterprise storage

Publications (1)

Publication Number Publication Date
US20120226722A1 true US20120226722A1 (en) 2012-09-06

Family

ID=46753962

Family Applications (4)

Application Number Title Priority Date Filing Date
US13/039,244 Abandoned US20120226722A1 (en) 2011-03-02 2011-03-02 Systems, methods, and computer program products for secure multi-enterprise storage
US13/484,211 Expired - Fee Related US8612400B2 (en) 2011-03-02 2012-05-30 Methods for secure multi-enterprise storage
US14/052,638 Expired - Fee Related US9047303B2 (en) 2011-03-02 2013-10-11 Systems, methods, and computer program products for secure multi-enterprise storage
US14/714,278 Expired - Fee Related US9256613B2 (en) 2011-03-02 2015-05-16 Systems, methods, and computer program products for secure multi-enterprise storage

Family Applications After (3)

Application Number Title Priority Date Filing Date
US13/484,211 Expired - Fee Related US8612400B2 (en) 2011-03-02 2012-05-30 Methods for secure multi-enterprise storage
US14/052,638 Expired - Fee Related US9047303B2 (en) 2011-03-02 2013-10-11 Systems, methods, and computer program products for secure multi-enterprise storage
US14/714,278 Expired - Fee Related US9256613B2 (en) 2011-03-02 2015-05-16 Systems, methods, and computer program products for secure multi-enterprise storage

Country Status (1)

Country Link
US (4) US20120226722A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239632A1 (en) * 2011-03-02 2012-09-20 International Business Machines Corporation Methods for secure multi-enterprise storage
CN103338238A (en) * 2013-05-16 2013-10-02 四川尚同科技有限公司 Portable cloud storage device capable of being charged wirelessly
CN103605784A (en) * 2013-11-29 2014-02-26 北京航空航天大学 Data integrity verifying method under multi-cloud environment
WO2014060120A1 (en) * 2012-10-18 2014-04-24 Essilor International (Compagnie Generale D'optique) Method for providing at least part of an eyewear equipment
CN103973731A (en) * 2013-01-29 2014-08-06 中兴通讯股份有限公司 Method and device for managing cloud storage recycle bin
CN110431527A (en) * 2017-03-09 2019-11-08 微软技术许可有限责任公司 Across storage provider's mapping storage
US11182344B2 (en) * 2016-03-14 2021-11-23 Vmware, Inc. File granular data de-duplication effectiveness metric for data de-duplication
US11514103B1 (en) * 2016-12-28 2022-11-29 Shutterstock, Inc. Image search using intersected predicted queries

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014101186A1 (en) * 2012-12-31 2014-07-03 华为技术有限公司 Data erasure method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098083A1 (en) * 2006-10-19 2008-04-24 Oracle International Corporation System and method for data de-duplication
US20100332454A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US20110082841A1 (en) * 2009-10-07 2011-04-07 Mark Christiaens Analyzing Backup Objects Maintained by a De-Duplication Storage System
US20120109933A1 (en) * 2010-10-31 2012-05-03 Sap Portals Israel Ltd Method and apparatus for federated search

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6654724B1 (en) * 1999-02-12 2003-11-25 Adheris, Inc. System for processing pharmaceutical data while maintaining patient confidentially
US6625592B1 (en) 1999-08-10 2003-09-23 Harris-Exigent, Inc. System and method for hash scanning of shared memory interfaces
GB0229572D0 (en) * 2002-12-19 2003-01-22 Cognima Ltd Quality of service provisioning
US7461260B2 (en) 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
US8365301B2 (en) 2005-02-22 2013-01-29 Microsoft Corporation Peer-to-peer network communication
JP4787080B2 (en) 2006-06-12 2011-10-05 日本電信電話株式会社 Distributed information sharing method and terminal device
US20080077638A1 (en) 2006-09-21 2008-03-27 Microsoft Corporation Distributed storage in a computing environment
US9614924B2 (en) 2008-12-22 2017-04-04 Ctera Networks Ltd. Storage device and method thereof for integrating network attached storage with cloud storage services
US8762642B2 (en) 2009-01-30 2014-06-24 Twinstrata Inc System and method for secure and reliable multi-cloud data replication
US8341427B2 (en) 2009-02-16 2012-12-25 Microsoft Corporation Trusted cloud computing and services framework
US9087066B2 (en) 2009-04-24 2015-07-21 Swish Data Corporation Virtual disk from network shares and file servers
WO2011075610A1 (en) * 2009-12-16 2011-06-23 Renew Data Corp. System and method for creating a de-duplicated data set
US8521758B2 (en) * 2010-01-15 2013-08-27 Salesforce.Com, Inc. System and method of matching and merging records
US20120226722A1 (en) * 2011-03-02 2012-09-06 International Business Machines Corporation Systems, methods, and computer program products for secure multi-enterprise storage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098083A1 (en) * 2006-10-19 2008-04-24 Oracle International Corporation System and method for data de-duplication
US20100332454A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US20110082841A1 (en) * 2009-10-07 2011-04-07 Mark Christiaens Analyzing Backup Objects Maintained by a De-Duplication Storage System
US20120109933A1 (en) * 2010-10-31 2012-05-03 Sap Portals Israel Ltd Method and apparatus for federated search

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8612400B2 (en) * 2011-03-02 2013-12-17 International Business Machines Corporation Methods for secure multi-enterprise storage
US9256613B2 (en) 2011-03-02 2016-02-09 International Business Machines Corporation Systems, methods, and computer program products for secure multi-enterprise storage
US20120239632A1 (en) * 2011-03-02 2012-09-20 International Business Machines Corporation Methods for secure multi-enterprise storage
US9047303B2 (en) 2011-03-02 2015-06-02 International Business Machines Corporation Systems, methods, and computer program products for secure multi-enterprise storage
CN104756114A (en) * 2012-10-18 2015-07-01 埃西勒国际通用光学公司 Method for providing at least part of an eyewear equipment
US10749929B2 (en) * 2012-10-18 2020-08-18 Essilor International Providing eyewear equipment using a same identifier among designer, manufacturer, and purchaser
WO2014060120A1 (en) * 2012-10-18 2014-04-24 Essilor International (Compagnie Generale D'optique) Method for providing at least part of an eyewear equipment
US20150288741A1 (en) * 2012-10-18 2015-10-08 Essilor International (Compagnie Generale D'optique) Method for providing at least part of an eyewear equipment
WO2014117513A1 (en) * 2013-01-29 2014-08-07 中兴通讯股份有限公司 Method and device for managing recycle bin of cloud storage
CN103973731A (en) * 2013-01-29 2014-08-06 中兴通讯股份有限公司 Method and device for managing cloud storage recycle bin
CN103338238A (en) * 2013-05-16 2013-10-02 四川尚同科技有限公司 Portable cloud storage device capable of being charged wirelessly
CN103605784A (en) * 2013-11-29 2014-02-26 北京航空航天大学 Data integrity verifying method under multi-cloud environment
US11182344B2 (en) * 2016-03-14 2021-11-23 Vmware, Inc. File granular data de-duplication effectiveness metric for data de-duplication
US11514103B1 (en) * 2016-12-28 2022-11-29 Shutterstock, Inc. Image search using intersected predicted queries
CN110431527A (en) * 2017-03-09 2019-11-08 微软技术许可有限责任公司 Across storage provider's mapping storage

Also Published As

Publication number Publication date
US9047303B2 (en) 2015-06-02
US20140046913A1 (en) 2014-02-13
US9256613B2 (en) 2016-02-09
US20120239632A1 (en) 2012-09-20
US8612400B2 (en) 2013-12-17
US20150248433A1 (en) 2015-09-03

Similar Documents

Publication Publication Date Title
US9256613B2 (en) Systems, methods, and computer program products for secure multi-enterprise storage
US11288234B2 (en) Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor
US9251183B2 (en) Managing tenant-specific data sets in a multi-tenant environment
US8838529B2 (en) Applying replication rules to determine whether to replicate objects
US8806489B2 (en) Virtual machine image distribution network
US10776221B2 (en) Avoiding inode number conflict during metadata restoration
US10671606B2 (en) Materialized query tables with shared data
US20130254460A1 (en) Using different secure erase algorithms to erase chunks from a file associated with different security levels
US20120042162A1 (en) Cloud Data Management
US11188499B2 (en) Storing and retrieving restricted datasets to and from a cloud network with non-restricted datasets
US20140237070A1 (en) Network-attached storage management in a cloud environment
US20180330108A1 (en) Updating monitoring systems using merged data policies
US20140324917A1 (en) Reclamation of empty pages in database tables
US11308223B2 (en) Blockchain-based file handling
US10659531B2 (en) Initiator aware data migration
US11836267B2 (en) Opaque encryption for data deduplication
US10949393B2 (en) Object deletion in distributed computing environments
US11250527B2 (en) Providing near real-time and effective litigation management for multiple remote content systems using asynchronous bi-directional replication pipelines
US20220300635A1 (en) Managing search queries using encrypted cache data
US20220179557A1 (en) Multi-dimensional data recovery
Kapanowski et al. Resource storage management model for ensuring quality of service in the cloud archive systems

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VAN BUSKIRK, RONALD E., II;WRIGHT, DAVID L.;SIGNING DATES FROM 20110301 TO 20110302;REEL/FRAME:026017/0896

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE