Exemplary embodiments of the present invention are described below with reference to the accompanying drawings.
Described are an overview, salient feature, a configuration, process flow, and effects of the data relaying apparatus according to the first embodiment of the present invention.
The system shown in
Specifically, the data relaying apparatus 20 has stored therein predefined routing channels, for example, a routing channel that would allow the computing device 10 to access the storage device 30 but not the storage device 31. The data relaying apparatus 20 performs routing control based on such predefined routing channels stored therein. By performing routing control, the data relaying apparatus 20 receives data from the computing devices 10 to 12 and forwards the received data to the storage devices 30 to 32, enabling the data to be written to the storage devices 30 to 32, and likewise, receives data read from the storage devices 30 to 32 by the computing devices 10 to 12 and forwards the read data to the computing devices 10 to 12, enabling the data stored in the storage devices 30 to 32 to be read.
The computing devices 10 to 12 can be configured by personal computers or workstations, the data relaying apparatus 20 be a network device such as a router or a fabric switch, and the storage devices 30 to 32 be any external storage device having a hard disk.
The salient feature of the data relaying apparatus 20 according to the first embodiment is that the cost involved in making the data processed by the computing devices and stored in the storage devices secure can be cut down.
Specifically, upon receiving a request from a computing device to write data into a storage device, the data relaying apparatus 20 receives the data from the computing device and encrypts the received data (see (1) and (2) of
The data relaying apparatus 20 then forwards the encrypted data to targeted storage device (see (3) of FIG. 1). Specifically, the data relaying apparatus 20 forwards, based on the routing channel stored therein, the encrypted data to the storage device 30. Thus, the data relaying apparatus 20 receives the data from the computing device 10 in an unencrypted form, encrypts the data, and sends the encrypted data to the storage device 30. In other words, the computing device 10 writes to the storage device 30 via the data relaying apparatus 20.
Upon receiving a request from a computing device to read data from a storage device, the data relaying apparatus 20 decrypts the encrypted data received from the storage device (see (4) and (5) of
The data relaying apparatus 20 then forwards the decrypted data to the source computing device that issued the read data request (see (6) of
Thus, in a storage system where a data relaying apparatus, using for example, a router or a fabric switch, mediates between a plurality of computing devices that process data and a plurality of storage devices that encrypt and store the data processed by the computing devices, the need for providing the encryption function in all the storage devices is obviated by providing the encryption function in the data relaying apparatus. As a result, the cost involved in making the data processed by a plurality of computing devices and stored in a plurality of storage devices secure can decrease.
The configuration of the data relaying apparatus shown in
The port 21 receives data from the connected computing devices as well as forwards the data read from the storage devices to the computing devices, and includes an encrypted data receiving unit 21a and a data forwarding unit 21b. The ports 22 and 23 are identical to the port 21 and therefore not described.
The encrypted data receiving unit 21a receives data from the computing devices. Specifically, the encrypted data receiving unit 21a receives the data to be written to the storage device 30 and write data request or read data request from the computing device 10.
The data forwarding unit 21b forwards the data read from the storage devices to the source computing device that issued the read data request. Specifically, the data forwarding unit 24b reads the data from the storage device 30, and the port 21b forwards it to the computing device 10 after it is decrypted by a data decrypting unit 28c described later.
The port 24 receives the data read by the computing devices from the storage devices and forwards the data to the source computing device, and includes a data forwarding unit 24a, and an encrypted data receiving unit 24b. The ports 25 and 26 are identical to the port 24 and hence not described.
The data forwarding unit 24a forwards encrypted data and a write data request or read data request from the computing devices to the storage devices. Specifically, the data forwarding unit 24a forwards to the storage device 30 the data sent from the computing device 10 and encrypted by a data encrypting unit 28b, or a write data request and read data request sent from the computing device 10 and receiving by the encrypted data receiving unit 21a.
The encrypted data receiving unit 24b receives from the storage devices the data to be sent to the computing devices. Specifically, the encrypted data receiving unit 24b receives the encrypted data from the storage devices based on the read data request generated by and sent from the computing device 10.
The storage unit 27 stores therein data and programs required for the processes of the control unit 28. The storage unit 27 stores therein, for example, encryption keys required for encryption by the data encrypting unit 28b and decryption by the data decrypting unit 28c, the routing channels connecting the computing devices 10 to 12 and the storage devices 30 to 32, etc.
The control unit 28 includes an internal memory for storing programs for performing various process procedures and necessary data. In close relevance to the embodiment, the control unit 28 includes a routing controller 28a, the data encrypting unit 28b, and the data decrypting unit 28c.
The routing controller 28a charts out routing of all the computing devices and the storage devices. Specifically, the routing controller 28a sends, based on the routing channel stored in the storage unit 27, the write data request or the read data request received from the encrypted data receiving unit 21a or the encrypted data encrypted by the data encrypting unit 28b to the storage device 30 via the port 24, or the data decrypted by the data decrypting unit 28c to the computing device 10 via the port 21.
The data encrypting unit 28b encrypts the data received from the computing devices. Specifically, the data encrypting unit 28b encrypts the data the encrypted data receiving unit 21a receives from the computing device 10 using the encryption key stored in the storage unit 27, and sends the encrypted data to the routing controller 28a.
The data decrypting unit 28c decrypts the data received from the storage device. Specifically, upon receiving the encrypted data stored in the storage device 30 according to the read data request from the computing device 10, the data decrypting unit 28c decrypts the encrypted data using the encryption key stored in the storage unit 27, and sends the decrypted data to the routing controller 28a.
A data encryption process performed by the data relaying apparatus is described below.
Upon receiving a write data request from a computing device (Yes at step S301), the data relaying apparatus 20 receives the data (the write data) from the computing device (step S302), encrypts the received data using the encryption key stored in the storage device (step S303), and forwards the encrypted data to the storage device (step S304).
Specifically, upon receiving a write data request from the computing device 10, the data relaying apparatus 20 receives the write data from the computing device 10, and encrypts the received data using the encryption key stored in the storage unit 27. The data relaying apparatus 20 then sends the encrypted data to the routing controller 28a, which in turn, sends the encrypted data to the port 24 to which the storage device is connected. The data forwarding unit 24a of the port 24 sends the encrypted data to the storage device 30.
A data decryption process performed by the data relaying apparatus is described below.
Upon receiving a read data request from a computing device (Yes at step S401), the data relaying apparatus 20 forwards the read data request to the destination storage device (step S402), which in response sends the encrypted data to the data relaying apparatus 20. Upon receiving the encrypted data from the destination storage device (step S403), the data relaying apparatus 20 decrypts the encrypted data using the decryption key stored in the storage unit 27 (step S404), and forwards the decrypted data to the computing device (step S405).
Specifically, upon receiving a read data request from the computing device 10, the routing controller 28a of the data relaying apparatus 20 sends the read data request to the destination storage device 30. The encrypted data receiving unit 24b of the data relaying apparatus 20 receives the encrypted data from the destination storage device 30 that received the read data request. The data decrypting unit 28c decrypts the encrypted data using the decryption key stored in the storage unit 27, and sends the decrypted data to the routing controller 28a. The routing controller 28a sends the decrypted data to the port 21 to which the source computing device 10 that sent the read data request connects. The data forwarding unit 21b of the port 21 then forwards the data to the computing device 10.
Thus, in the data relaying apparatus according to the first embodiment, the data received from the computing devices are encrypted and the data received from the storage devices are decrypted. Consequently, in a storage system where the data relaying apparatus, for example, a router or a fabric switch, mediates between a plurality of computing devices that process data and a plurality of storage devices that store the data processed by the computing devices, the need for providing the encryption function in all the storage devices is obviated by providing the encryption function in the data relaying apparatus. As a result, the cost involved in making the data processed by a plurality of computing devices and stored in a plurality of storage devices secure can be cut down.
In the first embodiment, all the data received by the data relaying apparatus is encrypted. However, the data from different computing devices may be treated differently, that is, may nor may not be encrypted.
The data relaying apparatus according to a second embodiment of the present invention has process description settings that specify whether the data received from a particular computing device is to be encrypted or passed on unencrypted and processes the data according to the process description setting. An overall configuration of a system that includes the data relaying apparatus according to the second embodiment and effects due to the second embodiment are described below.
The overall configuration of the data relaying apparatus according to the second embodiment is described below with reference to
The system shown in
The data relaying apparatus 20 has stored in the storage unit 27 the process description setting in the form of an Encrypt setting and a Pass-on setting. The Encrypt setting indicates that the data from a computing device to be stored in a storage device is to be encrypted. The Pass-on setting indicates that the data from a computing device is to merely passed on to a storage device to be stored unencrypted. Specifically, as shown in
The data relaying apparatus 20 receives data from the computing devices 10 to 12 and forwards the data to the storage devices 30 to 32 as well as receives the data read from the storage device by the computing device and forwards the data to the computing device.
Upon receiving data from a computing device for which the setting in the storage unit 27 is Encrypt, the data relaying apparatus 20 encrypts the data. Likewise, upon receiving data from a computing device for which the setting in the storage unit 27 is Pass-on, the data relaying apparatus 20 forwards the data without encrypting.
For example, upon receiving a write data request from the computing device 10 connected to the port 1, the data relaying apparatus 20 receives the write data from the computing device 10, and retrieves the setting data (Port 1, Encrypt) from the storage unit 27. The data relaying apparatus 20 then encrypts the data using the encryption key stored in the storage unit 27, and forwards the encrypted data to the storage device 30. In other words, all the data sent via the data relaying apparatus 20 from the computing device 10 are stored in the storage device 30 in an encrypted form.
Upon receiving a read data request from the computing device 10, the data relaying apparatus 20 receives from the storage device 30 the encrypted data to be forwarded to the computing device 10 connected to the port 1. The data relaying apparatus 20 then decrypts the encrypted data using the encryption key stored in the storage unit 27 and forwards the decrypted data to the computing device 10. In other words, as the setting for the port 1 to which the computing device 10 is connected is Encrypt, the data relaying apparatus 20 encrypts the data the computing device 10 sends for storing in the storage device 30, and decrypts the data the computing device 10 reads from the storage device 30.
On the other hand, upon receiving a write data request from the computing device 11 connected to the port 2, the data relaying apparatus 20 receives the write data from the computing device 11, and retrieves the setting data (Port 2, Pass-on) from the storage unit 27. The data relaying apparatus 20 then forwards the data to the storage device 31 without encrypting it based on the setting information. In other words, all the data sent via the data relaying apparatus 20 from the computing device 11 are stored in the storage device 31 in an unencrypted form.
Upon receiving a read data request from the computing device 11, the data relaying apparatus 20 receives from the storage device 31 the data to be forwarded to the computing device 11 connected to the port 2, and forwards it to the computing device 11 without encrypting it. In other words, as the setting for the port 2 to which the computing device 11 is connected is Pass-on, the data relaying apparatus 20 sends the data from the computing device 10 for storing in the storage device 30 without encrypting, and therefore does not need to decrypt the data the computing device 10 reads from the storage device 30.
Thus, the Encrypt and Pass-on setting for the ports to which the computing devices are connected can be changed as the situation demands, enabling data from any particular computing device to be forwarded in an encrypted form or unencrypted form.
A data encryption process of the data relaying apparatus according to the second embodiment is described below.
Upon receiving a write data request from a computing device (Yes at step S701), the data relaying apparatus 20 receives the write data (step S702), retrieves from the storage unit 27 the process description setting corresponding to the computing device that sent the data (step S703), processes the data according to the process description setting (step S704), and forwards the data to the storage device (step S705).
Specifically, upon receiving a write data request from the computing device 10 connected to the port 1, the data relaying apparatus 20 receives the write data from the computing device 10, and retrieves the setting data (Port 1, Encrypt) from the storage unit 27. Based on the setting data, the data relaying apparatus 20 encrypts the data using the encryption key stored in the storage unit 27, and forwards the encrypted data to the storage device 30.
Upon receiving a write data request from the computing device 11 connected to the port 2, the data relaying apparatus 20 receives the write data from the computing device 11 and retrieves the setting data (Port 2, Pass-on) from the storage unit 27. Based on the setting data, the data relaying apparatus 20 forwards the data to the storage device 31 without encrypting.
A data decryption process performed by the data relaying apparatus according to the second embodiment is described below.
Upon receiving a read data request from a computing device (Yes at step S801), the data relaying apparatus 20 forwards the read data request to the destination storage device (step S802), which in response sends the requested data in an encrypted form to the data relaying apparatus. Upon receiving the encrypted data from the destination storage device (step S803), the data relaying apparatus 20 retrieves the process description setting corresponding to the computing device that issued the read data request (step S804), processes the data according to the retrieved process description setting (step S805), and forwards the processed data to the source computing device (step S806).
Specifically, upon receiving a read data request from the computing device 10, the data relaying apparatus 20 forwards the read data request to the storage device 30. The data relaying apparatus 20 then receives from the storage device 30 the encrypted data to be forwarded to the computing device 10 connected to the port 1 and decrypts the data using the decryption key stored in the storage unit 27.
On the other hand, upon receiving a read data request from the computing device 11, the data relaying apparatus 20 forwards the read data request to the storage device 31. The data relaying apparatus 20 then receives from the storage device 31 the unencrypted data to be forwarded to the computing device 11 connected to the port 2, and forwards the unencrypted data as it is to the computing device 11.
Thus, in the data relaying apparatus according to the second embodiment, process description settings are stored indicating whether data from a particular computing device is to be encrypted to create encrypted data or the data is to be merely forwarded unencrypted, and the data from a computing device is treated according to the stored process description setting. Consequently, process description settings for the ports to which the computing devices are connected can be changed as the situation demands, enabling data from any particular computing device to be forwarded in an encrypted form or unencrypted form.
In the first embodiment and the second embodiment, a single encryption key is used for encrypting the data received from all the computing devices. However, a different encryption key can be used for every computing device.
The data relaying apparatus according to a third embodiment of the present invention uses a different encryption key for encrypting data from every computing device. An overall configuration of a system that includes the data relaying apparatus according to the third embodiment and effects due to the third embodiment are described below.
The overall configuration of the system that includes the data relaying apparatus according to the third embodiment is described below.
The system shown in
The data relaying apparatus 20 further includes a key storage unit 29 that has stored therein a different encryption key for every computing device. Specifically, the key storage unit 29 of the data relaying apparatus 20 has stored therein data such as “Port 1, Encryption Key A”, “Port 2, Encryption Key B”, Port 1 and Port 2 being Port No. indicating the port number to which the computing device is connected and Key indicating the key to be used for encryption.
The data relaying apparatus 20 receives data from the computing devices 10 to 12 and forwards the data to the storage devices 30 to 32 as well as receives the data read from the storage device by the computing device and forwards the data to the computing device.
When storing data from a computing device into a storage device, the data relaying apparatus 20 uses the key corresponding to the computing device for encrypting the data.
Specifically, upon receiving a write data request from the computing device 10 connected to the port 1, the data relaying apparatus 20 receives the write data from the computing device 10 and retrieves from the key storage unit 29 Encryption Key A that corresponds to the computing device 10. The data relaying apparatus 20 then uses Encryption Key A to encrypt the data received from the computing device 10 and forwards the encrypted data to the storage device 30.
Upon receiving a write data request from the computing device 11, the data relaying apparatus 20 receives the write data from the computing device 11 and retrieves from the key storage unit 29 Encryption Key B that corresponds to the computing device 11. The data relaying apparatus 20 then uses Encryption Key B to encrypt the data received from the computing device 11 and forwards the encrypted data to the storage device 30.
That is, data from all the computing devices encrypted using the encryption keys of the corresponding computing devices are all stored in the same storage device 30 (see
When reading data from a storage device for a computing device, the data relaying apparatus 20 decrypts the encrypted data received from the storage device. Specifically, upon receiving a read data request from the computing device 10, the data relaying apparatus 20 receives from the storage device 31 the data to be sent to the computing device 10 connected to the port 1 in an encrypted form. The data relaying apparatus 20 then decrypts the encrypted data using Encryption Key A (Decryption Key A), and forwards the decrypted data to the computing device 10.
Upon receiving a read data request from the computing device 11, the data relaying apparatus 20 receives from the storage device 31 the data to be forwarded to the computing device 11 connected to the port 2. The data relaying apparatus 20 then decrypts the encrypted data using Encryption Key B (Decryption Key B), and forwards the decrypted data to the computing device 11.
Thus, by using a different encryption key for every computing device connected to different ports, security of data being stored in the storage devices can be further improved compared to when a common encryption key is used for all the ports to which the computing devices are connected.
A data encryption process of the data relaying apparatus according to the third embodiment is described below.
Upon receiving a write data request from a computing device (Yes at step S1001), the data relaying apparatus 20 receives the write data (step S1002), reads the stored encryption key corresponding to the computing device (step S1003), encrypts the data using the encryption key (step S1004), and forwards the encrypted data to the destination storage device (step S1005).
Specifically, upon receiving a write data request from the computing device 10 connected to the port 1, the data relaying apparatus 20 receives the write data, and retrieves the key in the key storage unit 29 corresponding to the computing device 10 (Port 1, Encryption Key A). The data relaying apparatus 20 then encrypts the data using Encryption Key A retrieved from the key storage unit 29 and forwards the encrypted data to the storage device 30.
Upon receiving a write data request from the computing device 11 connected to the port 2, the data relaying apparatus 20 receives the write data, and retrieves the key * corresponding to the computing device 11, Port 2, Encryption Key B, in the key storage unit 29. The data relaying apparatus 20 then encrypts the data using Encryption Key B retrieved from the key storage unit 29 and forwards the encrypted data to the storage device 30.
A data decryption process of the data relaying apparatus according to the third embodiment is described below.
Upon receiving a read data request from a computing device (Yes at step S1101), the data relaying apparatus 20 forwards the read data request to the destination storage device (step S1102), which in response sends the encrypted data to the data relaying apparatus 20. Upon receiving the encrypted data (step S1103), the data relaying apparatus 20 retrieves the decryption key corresponding to the storage device from the key storage unit 29 (step S1104), decrypts the data using the decryption key (step S1105), and forwards the decrypted data to the source computing device (step S1106).
Specifically, upon receiving a read data request from the computing device 10, the data relaying apparatus 20 forwards the read data request to the storage device 30. The data relaying apparatus then receives from the storage device 30 the data to be sent to the computing device 10 connected to the port 1, because the data sent from the computing device 10 is encrypted using Encryption Key A. The data relaying apparatus 20 then decrypts the encrypted data using Encryption Key A (Decryption Key A) retrieved from the key storage unit 29 and forwards the decrypted data to the computing device 10.
Upon receiving a read data request from the computing device 11, the data relaying apparatus 20 forwards the read data request to the storage device 30. The data relaying apparatus 20 then receives from the storage device 30 the encrypted data to forward to the computing device 11 connected to the port 2 the encrypted data being encrypted by Encryption Key B, because the data sent from the computing device 11 through port 2 is encrypted using Encryption Key B. The data relaying apparatus 20 then decrypts the encrypted data using Decryption Key B retrieved from the key storage unit 29 and forwards the decrypted data to the computing device 11.
Thus, in the data relaying apparatus according to the third embodiment, a different encryption key is used for encrypting data from every computing device connected to different ports. Consequently, security of data being stored in the storage devices can be further improved compared to when a single encryption key is used for all the ports.
The embodiments described above allow various modifications. The modifications to the described embodiments are collectively described as a fourth embodiment of the present invention.
In the second embodiment, the data relaying apparatus has stored therein the process description setting for every computing device connected to the system. The process description setting for the computing devices connected to the system can be stored associated with a timeslot data that can be dynamically changed to specify the timeslot in which the process description for the computing devices is going to be valid.
Specifically, the storage unit of the data relaying apparatus has stored therein data such as “Port 1, 0:00-12:00, Encrypt”, “Port 2, 9:00-13:00, Pass-on”, including Valid Duration in addition to Port No. and Process Description Setting.
For example, upon receiving data to be forwarded to the storage device from the computing device connected to the port 1 at 10:00 hrs., the data relaying apparatus forwards the data to the storage device in an encrypted form, whereas upon receiving data to be forwarded to the storage device from the computing device connected to the port 2 at 10:00 hrs., the data relaying apparatus forwards the data to the storage device in an unencrypted form.
Likewise, upon receiving data to be forwarded to the storage device from the computing device connected to the port 1 at 12:50 hrs, the data relaying apparatus forwards the data to the storage device in an unencrypted form, whereas upon receiving data to be forwarded to the storage device from the computing device connected to the port 2 at 12:50 hrs., the data relaying apparatus forwards the data to the storage device in an encrypted form.
When receiving data from the storage device data read by the computing device, if the data is in an encrypted form, the data relaying apparatus decrypts the data before forwarding the data to the computing device, and if the data is in an unencrypted form, the data relaying apparatus forwards the data to the computing device as it is.
Thus, the process description setting, including Encrypt/Decrypt, Pass-on, can be set according to the requirement in a given timeslot, for example, by setting the process description setting to Pass-On during a timeslot in which the storage devices are likely to be accessed a great deal and to Encrypt during a timeslot in which backup data is stored.
In the first embodiment, all the data received by the data relaying apparatus is encrypted. However, the data relaying apparatus may be configured so that encryption process or passing on process is performed based on a request from the computing device.
In this system, the computing device sends to the data relaying apparatus 20 an Encrypt request indicating that the data is to be encrypted or a Pass-on request indicating that the data is not to be encrypted, along with the data to be stored in the storage device. The data relaying apparatus 20 encrypts and sends the data to the storage device or sends the data to the storage device unencrypted based on whether an Encrypt request is received or a Pass-on request is received with the data.
Specifically, the computing device sends to the data relaying apparatus 20 an Encrypt request indicating that the data is to be encrypted or a Pass-on request indicating that the data is not to be encrypted, along with the data to be stored in the storage device. The data relaying apparatus 20 encrypts and sends the data to the storage device if an command bit “1” is received with the data and sends the data to the storage device unencrypted if a command bit “0” is received with the data.
For example, as shown in
Likewise, as shown in
Thus, by enabling encryption process or passing on process to be performed based on the command bit, in which “0” indicates “Pass-on”, and “1”, indicates “Encrypt”, attached to the data, user is afforded flexibility to change the process mode of the ports as the situation demands compared to when the process description setting is set for every port.
The storage system shown in
In the storage system configured as described above, upon receiving a write data request from the computing device connected to the CA of the CM, the CM receives from the computing device the data to be sent to the BPC, and forwards the received data to the BRT. The BRT receives the data from the CM and encrypts it before forwarding the data to the PBC based on the routing channel stored in the BRT. The PBC then forwards the encrypted data to the storage device.
Upon receiving a read data request from the computing devices connected to the CA, the CM forwards the read data request to the destination storage device. The storage device sends the requested data to the PBC. The PBC forwards the data received from the storage device to the BRT. The BRT decrypted the data received from the PBC, and forwards the decrypted to the CM to which the source computing device is connected. The CM sends the decrypted data to the source computing device.
Thus, by implementing the data relaying apparatus in a storage system, the number of computing devices and storage devices can be further increased. Further, as the BRT connecting each computing device and storage device is equipped with the encryption and decryption functions, the need for providing encryption and decryption functions in each computing device or storage device is obviated. Thus, a specialized storage system can be provided in which security can be heightened without a corresponding increase in the cost.
In the data relaying apparatus according to the first to third embodiment, the process description setting of the data relaying apparatus can be changed for every computing device connected to the system. The same function can be demonstrated in the storage system according to the present embodiment by configuring the BRT such that the setting can be changed for every CM connected to the computing device.
For example, the storage system according to the present embodiment can be configured to demonstrate the function described in the second embodiment by configuring the BRT to store process description setting in the form of an Encrypt setting or Pass-on setting for every CM that connects to the computing device, and process data based on the process description setting.
The storage system according to the present embodiment can be configured to demonstrate the function described in the third embodiment by configuring the BRT to encrypt data using a different encryption key for every CM, yielding the same effect.
In the first to third embodiment, the same key is used both as encryption key and decryption key. However, different keys can be used for encryption and decryption. Private-key cryptography or public-key cryptography may be employed for encryption.
The constituent elements of the apparatus illustrated are merely conceptual and may not necessarily physically resemble the structures shown in the drawings. For instance, the apparatus need not necessarily have the structure that is illustrated. The apparatus as a whole or in parts can be broken down or integrated either functionally or physically in accordance with the load or how the device is to be used, for example, the data encrypting unit 28b and the data decrypting unit 28c can be integrated. The process functions performed by the apparatus are entirely or partially realized by a CPU or a program executed by the CPU or by a hardware using wired logic.
The process procedures, the control procedures, specific names, and data, including various parameters (for example, settings stored in the storage unit shown in
The processes described in the embodiments described above can be realized by causing a computer system such as a personal computer or a workstation to execute a ready program. A computer system that executes a program that demonstrates the functions described in the embodiments according to the present invention is described below.
The CPU 144 performs a routing control process 144a by reading the routing control program 143a, a data encryption process 144b by reading the data encryption program 143b, and a data decryption process 144c by reading the data decryption program 143c. The routing control process 144a, the data encryption process 144b, and the data decryption process 144c correspond, respectively, to the routing controller 28a, the data encrypting unit 28b, and the data decryption unit 28c shown in
The HDD 142 stores therein the encryption key and the decryption key used for encrypting or decrypting the data in the data encryption process 144b or the data decryption process 144c.
Apart from the ROM 143, the routing control program 144a, the data encryption program 144b, and the data decryption program 144c may be stored in a portable medium, a fixed medium, or on another computer system connected to the computer system 140 via a public circuit, Internal, local area network (LAN) or wide area network (WAN). The portable medium can be a flexible disk (FD) insertable into the computer system 140, compact disk-read-only memory (CD-ROM), magneto-optic (MO) disk, digital versatile disk (DVD), or integrated circuit (IC) card. The fixed medium can be a hard disk drive built into the computer system 140 or provided externally. The computer system can download the program from any of these mediums and execute them.
According to the embodiment the present invention, the data relaying apparatus encrypts data received from a computing device, creating encrypted data and decrypts data received from a storage device creating decrypted data. As a result, the need for providing encryption and decryption function in every storage device or every computing device is obviated, thus cutting down the cost involved in making the data secure. Specifically, in a storage system where the data relaying apparatus, for example, a router or a fabric switch, mediates between a plurality of computing devices that process data and a plurality of storage devices that encrypt and store the data processed by the computing devices, the need for providing the encryption function in all the storage devices is obviated by providing the encryption function in the data relaying apparatus.
According to the embodiment of the present invention, the data relaying apparatus has stored therein a process description setting for every computing device in the form of an Encrypt setting indicating that the data received from the computing device is to be encrypted and a Pass-on setting indicating that the data received from the computing device is to be passed on unencrypted. The data relaying apparatus encrypts the data upon receiving data from a computing device that has the Encrypt setting, and passes on the data unencrypted upon receiving data a computing device that has the Pass-on setting. As a result, the Encrypt setting and Pass-on setting for the ports to which the computing devices are connected can be changed as the situation demands, enabling data from any particular computing device to be forwarded in an encrypted from or unencrypted form.
According to the embodiment of the present invention, the data relaying apparatus has stored therein a timeslot data associated with the Encrypt setting and the Pass-on setting, enabling the data relaying apparatus to encrypt the data or pass on the data unencrypted according to the timeslot in which the data is received. As a result, the process description setting (Encrypt/Decrypt, Pass-on can be set according to the requirement in a given timeslot.
According to the embodiment of the present invention, the data relaying apparatus has stored therein a different encryption key for every computing device and encrypts data from a particular computing device using the encryption key of that computing device. As a result, security of data being stored in the storage devices can be further improved compared to when a common encryption key is used for all the ports to which computing devices are connected.
According to the embodiment of the present invention, the data to be stored in the storage device is sent by the computing device along with a process request in the form of an Encrypt request indicating that the data received from the computing device is to be encrypted or a Pass-on request indicating that the data received from the computing device is to be passed on unencrypted. The data relaying apparatus encrypts the data or passes on the data in an unencrypted form according to the process request. As a result, user is afforded flexibility to change the process mode of the ports as the situation demands compared to when the process description setting is set for every port.
Although the invention has been described with respect to a specific embodiment for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.
Number | Date | Country | Kind |
---|---|---|---|
2006-209175 | Jul 2006 | JP | national |