AU2016210718A1 - Secure storage availability using cryptographic splitting - Google Patents
Secure storage availability using cryptographic splittingInfo
- Publication number
- AU2016210718A1 AU2016210718A1 AU2016210718A AU2016210718A AU2016210718A1 AU 2016210718 A1 AU2016210718 A1 AU 2016210718A1 AU 2016210718 A AU2016210718 A AU 2016210718A AU 2016210718 A AU2016210718 A AU 2016210718A AU 2016210718 A1 AU2016210718 A1 AU 2016210718A1
- Authority
- AU
- Australia
- Prior art keywords
- storage
- secure
- appliance
- secure storage
- volume
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage 5 network. In one aspect, a method includes assigning a volume to a primary secure storage appliance located in a secure data storage network, the secure data storage network including a plurality of secure data paths between the primary secure storage appliance and a client device 10 and a plurality of secure data paths between the secure storage appliance and a plurality of storage systems, the volume corresponding to physical storage at each of the plurality of storage systems. In another aspect, the volume presented as a virtual disk to a client device and 15 mapped to physical storage at each of a plurality of storage systems. The method also includes detecting a connectivity problem on at least one of the secure data paths. The method further includes assessing whether to reassign the volume to a different secure storage 20 appliance based upon the connectivity problem. The method also includes, upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second 25 secure storage appliance a new primary secure storage appliance. STORAGE DEVICE STORAGE DEVICE SECURE STORAGE Admin APPLIANCE Device 12_0 APPLICATION SERVER DEVICE CLIENT DEVICE CLIENT DEVICE
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2016210718A AU2016210718B2 (en) | 2008-11-17 | 2016-08-04 | Secure storage availability using cryptographic splitting |
Applications Claiming Priority (35)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/272,012 | 2008-11-17 | ||
US12/272,012 US20100125730A1 (en) | 2008-11-17 | 2008-11-17 | Block-level data storage security system |
US12/336,558 US20100153740A1 (en) | 2008-12-17 | 2008-12-17 | Data recovery using error strip identifiers |
US12/336,564 US8392682B2 (en) | 2008-12-17 | 2008-12-17 | Storage security using cryptographic splitting |
US12/336,558 | 2008-12-17 | ||
US12/336,559 | 2008-12-17 | ||
US12/336,562 | 2008-12-17 | ||
US12/336,562 US20100154053A1 (en) | 2008-12-17 | 2008-12-17 | Storage security using cryptographic splitting |
US12/336,564 | 2008-12-17 | ||
US12/336,568 | 2008-12-17 | ||
US12/336,559 US20100153703A1 (en) | 2008-12-17 | 2008-12-17 | Storage security using cryptographic splitting |
US12/336,568 US20100150341A1 (en) | 2008-12-17 | 2008-12-17 | Storage security using cryptographic splitting |
US12/342,464 | 2008-12-23 | ||
US12/342,610 US20100161981A1 (en) | 2008-12-23 | 2008-12-23 | Storage communities of interest using cryptographic splitting |
US12/342,500 | 2008-12-23 | ||
US12/342,575 US20100161964A1 (en) | 2008-12-23 | 2008-12-23 | Storage communities of interest using cryptographic splitting |
US12/342,547 US20100162004A1 (en) | 2008-12-23 | 2008-12-23 | Storage of cryptographically-split data blocks at geographically-separated locations |
US12/342,438 | 2008-12-23 | ||
US12/342,464 US20100162032A1 (en) | 2008-12-23 | 2008-12-23 | Storage availability using cryptographic splitting |
US12/342,575 | 2008-12-23 | ||
US12/342,523 US20100162003A1 (en) | 2008-12-23 | 2008-12-23 | Retrieval of cryptographically-split data blocks from fastest-responding storage devices |
US12/342,438 US8135980B2 (en) | 2008-12-23 | 2008-12-23 | Storage availability using cryptographic splitting |
US12/342,414 US20100162002A1 (en) | 2008-12-23 | 2008-12-23 | Virtual tape backup arrangement using cryptographically split storage |
US12/342,500 US8386798B2 (en) | 2008-12-23 | 2008-12-23 | Block-level data storage using an outstanding write list |
US12/342,610 | 2008-12-23 | ||
US12/342,636 US20100162005A1 (en) | 2008-12-23 | 2008-12-23 | Storage communities of interest using cryptographic splitting |
US12/342,379 US20100162001A1 (en) | 2008-12-23 | 2008-12-23 | Secure network attached storage device using cryptographic settings |
US12/342,379 | 2008-12-23 | ||
US12/342,414 | 2008-12-23 | ||
US12/342,636 | 2008-12-23 | ||
US12/342,523 | 2008-12-23 | ||
US12/342,547 | 2008-12-23 | ||
AU2009313672A AU2009313672A1 (en) | 2008-11-17 | 2009-11-17 | Secure storage availability using cryptographic splitting |
PCT/US2009/064820 WO2010057196A2 (en) | 2008-11-17 | 2009-11-17 | Secure storage availability using cryptographic splitting |
AU2016210718A AU2016210718B2 (en) | 2008-11-17 | 2016-08-04 | Secure storage availability using cryptographic splitting |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2009313672A Division AU2009313672A1 (en) | 2008-11-17 | 2009-11-17 | Secure storage availability using cryptographic splitting |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2016210718A1 true AU2016210718A1 (en) | 2016-09-15 |
AU2016210718B2 AU2016210718B2 (en) | 2018-10-25 |
Family
ID=42124888
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2009313728A Abandoned AU2009313728A1 (en) | 2008-11-17 | 2009-11-17 | Storage communities of interest using cryptographic splitting |
AU2009313672A Abandoned AU2009313672A1 (en) | 2008-11-17 | 2009-11-17 | Secure storage availability using cryptographic splitting |
AU2009313675A Abandoned AU2009313675A1 (en) | 2008-11-17 | 2009-11-17 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
AU2016210716A Abandoned AU2016210716A1 (en) | 2008-11-17 | 2016-08-04 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
AU2016210718A Active AU2016210718B2 (en) | 2008-11-17 | 2016-08-04 | Secure storage availability using cryptographic splitting |
AU2018236850A Ceased AU2018236850B2 (en) | 2008-11-17 | 2018-09-28 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
AU2020200461A Active AU2020200461B2 (en) | 2008-11-17 | 2020-01-22 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2009313728A Abandoned AU2009313728A1 (en) | 2008-11-17 | 2009-11-17 | Storage communities of interest using cryptographic splitting |
AU2009313672A Abandoned AU2009313672A1 (en) | 2008-11-17 | 2009-11-17 | Secure storage availability using cryptographic splitting |
AU2009313675A Abandoned AU2009313675A1 (en) | 2008-11-17 | 2009-11-17 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
AU2016210716A Abandoned AU2016210716A1 (en) | 2008-11-17 | 2016-08-04 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2018236850A Ceased AU2018236850B2 (en) | 2008-11-17 | 2018-09-28 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
AU2020200461A Active AU2020200461B2 (en) | 2008-11-17 | 2020-01-22 | Storage and retrieval of crytographically-split data blocks to/from multiple storage devices |
Country Status (3)
Country | Link |
---|---|
EP (3) | EP2359298A2 (en) |
AU (7) | AU2009313728A1 (en) |
WO (3) | WO2010057173A2 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8725688B2 (en) | 2008-09-05 | 2014-05-13 | Commvault Systems, Inc. | Image level copy or restore, such as image level restore without knowledge of data object metadata |
GB2496111A (en) * | 2011-10-28 | 2013-05-08 | Intergence Systems Ltd | Tracing the real-world storage location of critical data items to form part of physical network map |
US9633216B2 (en) | 2012-12-27 | 2017-04-25 | Commvault Systems, Inc. | Application of information management policies based on operation with a geographic entity |
US9459968B2 (en) | 2013-03-11 | 2016-10-04 | Commvault Systems, Inc. | Single index to query multiple backup formats |
US9798596B2 (en) | 2014-02-27 | 2017-10-24 | Commvault Systems, Inc. | Automatic alert escalation for an information management system |
US9648100B2 (en) | 2014-03-05 | 2017-05-09 | Commvault Systems, Inc. | Cross-system storage management for transferring data across autonomous information management systems |
US9740574B2 (en) | 2014-05-09 | 2017-08-22 | Commvault Systems, Inc. | Load balancing across multiple data paths |
US9852026B2 (en) | 2014-08-06 | 2017-12-26 | Commvault Systems, Inc. | Efficient application recovery in an information management system based on a pseudo-storage-device driver |
US11249858B2 (en) | 2014-08-06 | 2022-02-15 | Commvault Systems, Inc. | Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host |
US9766825B2 (en) | 2015-07-22 | 2017-09-19 | Commvault Systems, Inc. | Browse and restore for block-level backups |
US10296368B2 (en) | 2016-03-09 | 2019-05-21 | Commvault Systems, Inc. | Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block-level pseudo-mount) |
US10838821B2 (en) | 2017-02-08 | 2020-11-17 | Commvault Systems, Inc. | Migrating content and metadata from a backup system |
US10740193B2 (en) | 2017-02-27 | 2020-08-11 | Commvault Systems, Inc. | Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount |
US10891069B2 (en) | 2017-03-27 | 2021-01-12 | Commvault Systems, Inc. | Creating local copies of data stored in online data repositories |
US10776329B2 (en) | 2017-03-28 | 2020-09-15 | Commvault Systems, Inc. | Migration of a database management system to cloud storage |
US11074140B2 (en) | 2017-03-29 | 2021-07-27 | Commvault Systems, Inc. | Live browsing of granular mailbox data |
US10664352B2 (en) | 2017-06-14 | 2020-05-26 | Commvault Systems, Inc. | Live browsing of backed up data residing on cloned disks |
GB2567146B (en) * | 2017-09-28 | 2022-04-13 | Red Flint Llp | Method and system for secure storage of digital data |
US10795927B2 (en) | 2018-02-05 | 2020-10-06 | Commvault Systems, Inc. | On-demand metadata extraction of clinical image data |
US10789387B2 (en) | 2018-03-13 | 2020-09-29 | Commvault Systems, Inc. | Graphical representation of an information management system |
US11308034B2 (en) | 2019-06-27 | 2022-04-19 | Commvault Systems, Inc. | Continuously run log backup with minimal configuration and resource usage from the source machine |
US20230088566A1 (en) * | 2019-12-31 | 2023-03-23 | Nagravision S.A. | Techniques for controlling access to segmented data |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6167531A (en) * | 1998-06-18 | 2000-12-26 | Unisys Corporation | Methods and apparatus for transferring mirrored disk sets during system fail-over |
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7512673B2 (en) * | 2001-01-11 | 2009-03-31 | Attune Systems, Inc. | Rule based aggregation of files and transactions in a switched file system |
US20030188153A1 (en) * | 2002-04-02 | 2003-10-02 | Demoff Jeff S. | System and method for mirroring data using a server |
US6928514B2 (en) * | 2002-08-05 | 2005-08-09 | Lsi Logic Corporation | Method and apparatus for teaming storage controllers |
JP4601969B2 (en) * | 2004-01-27 | 2010-12-22 | 株式会社日立製作所 | File I / O controller |
US7203871B2 (en) * | 2004-06-03 | 2007-04-10 | Cisco Technology, Inc. | Arrangement in a network node for secure storage and retrieval of encoded data distributed among multiple network nodes |
EP1771979B1 (en) * | 2004-07-23 | 2011-11-23 | Citrix Systems, Inc. | A method and systems for securing remote access to private networks |
US7284020B2 (en) * | 2004-09-01 | 2007-10-16 | Hitachi, Ltd. | System and method for data recovery in a storage system |
US20070067644A1 (en) * | 2005-08-26 | 2007-03-22 | International Business Machines Corporation | Memory control unit implementing a rotating-key encryption algorithm |
US8880799B2 (en) * | 2005-09-30 | 2014-11-04 | Cleversafe, Inc. | Rebuilding data on a dispersed storage network |
US7574579B2 (en) * | 2005-09-30 | 2009-08-11 | Cleversafe, Inc. | Metadata management system for an information dispersed storage system |
EP1952575B1 (en) * | 2005-11-18 | 2017-12-27 | Security First Corp. | Secure data parser method and system |
EP2154822A2 (en) * | 2006-12-08 | 2010-02-17 | Unisys Corporation | Securing multicast data |
-
2009
- 2009-11-17 AU AU2009313728A patent/AU2009313728A1/en not_active Abandoned
- 2009-11-17 WO PCT/US2009/064765 patent/WO2010057173A2/en active Application Filing
- 2009-11-17 WO PCT/US2009/064820 patent/WO2010057196A2/en active Application Filing
- 2009-11-17 AU AU2009313672A patent/AU2009313672A1/en not_active Abandoned
- 2009-11-17 AU AU2009313675A patent/AU2009313675A1/en not_active Abandoned
- 2009-11-17 EP EP09826981A patent/EP2359298A2/en not_active Withdrawn
- 2009-11-17 EP EP09802049A patent/EP2359295A2/en not_active Withdrawn
- 2009-11-17 EP EP09802050A patent/EP2359249A2/en not_active Withdrawn
- 2009-11-17 WO PCT/US2009/064824 patent/WO2010057199A2/en active Application Filing
-
2016
- 2016-08-04 AU AU2016210716A patent/AU2016210716A1/en not_active Abandoned
- 2016-08-04 AU AU2016210718A patent/AU2016210718B2/en active Active
-
2018
- 2018-09-28 AU AU2018236850A patent/AU2018236850B2/en not_active Ceased
-
2020
- 2020-01-22 AU AU2020200461A patent/AU2020200461B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2009313728A1 (en) | 2011-07-07 |
AU2016210716A1 (en) | 2016-09-08 |
AU2009313672A1 (en) | 2011-07-07 |
AU2020200461B2 (en) | 2021-10-07 |
WO2010057199A3 (en) | 2011-03-17 |
WO2010057196A3 (en) | 2011-12-29 |
WO2010057173A3 (en) | 2010-10-07 |
AU2018236850A1 (en) | 2018-10-18 |
AU2009313675A1 (en) | 2011-07-07 |
WO2010057196A2 (en) | 2010-05-20 |
WO2010057173A2 (en) | 2010-05-20 |
AU2018236850B2 (en) | 2020-07-09 |
WO2010057199A2 (en) | 2010-05-20 |
EP2359295A2 (en) | 2011-08-24 |
EP2359298A2 (en) | 2011-08-24 |
AU2020200461A1 (en) | 2020-02-13 |
EP2359249A2 (en) | 2011-08-24 |
AU2016210718B2 (en) | 2018-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016210718A1 (en) | Secure storage availability using cryptographic splitting | |
GB2447094B (en) | Entertainment device and method | |
WO2009105594A3 (en) | Method and system for implementing a virtual storage pool in a virtual environment | |
WO2011046840A3 (en) | Systems and methods to automatically generate a signature block | |
AR093838A1 (en) | METHOD AND DEVICES TO ALLOW INTELLIGENT INTERACTIONS WITH SLATE | |
WO2006117322A3 (en) | Autonomic storage provisioning to enhance storage virtualization infrastructure availability | |
WO2010019353A3 (en) | Portable device association | |
WO2010019370A8 (en) | Protocol for device to station association | |
EP1836614A4 (en) | Providing a service based on an access right to a shared data | |
WO2014004810A3 (en) | Inbox management | |
TW200513838A (en) | System management infrastructure for corrective actions to servers with shared resources | |
GB0424149D0 (en) | Virtual computing infrastructure | |
TW200603582A (en) | System, method, computer program product, and business method for device group management using virtual device domain | |
WO2012031044A3 (en) | Methods and apparatus to cluster user data | |
IN2012CN06919A (en) | ||
ATE523008T1 (en) | DISTRIBUTION OF MEDIA CONTENT USING CONTACT DETAILS | |
WO2012078659A3 (en) | Correlating user interactions with interfaces | |
MX336148B (en) | Social data overlay. | |
WO2015013436A3 (en) | Methods of identifying relevant content and subject matter expertise for online communities | |
WO2014052006A3 (en) | Selecting anonymous users based on user location history | |
WO2013002833A3 (en) | Binding of cryptographic content using unique device characteristics with server heuristics | |
EP2564287A4 (en) | Method and apparatus for providing cooperative user interface layer management with respect to inter-device communications | |
IN2015DN04296A (en) | ||
WO2010099086A3 (en) | Virtualization of one or more sets of physical contact center resources for use by one or more virtual contact centers | |
CN104917848A (en) | Smart cloud platform for enterprises based on enterprise management and service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) |