The present invention relates in general to computers, and more particularly to a method, system, and computer program product for preserving redundancy and other data security characteristics in computing environments in which data deduplication systems are incorporated.
Computers and computer systems are found in a variety of settings in today's society. Computing environments and networks may be found at home, at work, at school, in government, and in other settings. Computing environments increasingly store data in one or more storage environments, which in many cases are remote from the local interface presented to a user.
These computing storage environments may use many storage devices such as disk drives, often working in concert, to store, retrieve, and update a large body of data, which may then be provided to a host computer requesting or sending the data. In some cases, a number of data storage subsystems are collectively managed as a single data storage system. These subsystems may be managed by host “sysplex” (system complex) configurations that combine several processing units or clusters of processing units. In this way, multi-tiered/multi-system computing environments, often including a variety of types of storage devices, may be used to organize and process large quantities of data.
Many multi-tiered/multi-system computing environments implement data deduplication technologies to improve storage performance by reducing the amount of duplicated storage across storage devices. Data deduplication systems are increasingly utilized because they help reduce the total amount of physical storage that is required to store data. This reduction is accomplished by ensuring that duplicate data is not stored multiple times. Instead, for example, if a chunk of data matches with an already stored chunk of data, a pointer to the original data is stored in the virtual storage map instead of allocating new physical storage space for the new chunk of data.
In certain situations, however, the behavior of deduplication may go against the redundancy requirements of a hosted application, for example, or a storage policy, or other requirements. A need exists for a mechanism whereby data having redundancy requirements is safeguarded, yet the benefits of deduplication systems are not diminished, by allowing deduplication to occur for remaining data not having such requirements.
In view of the foregoing, various embodiments for preserving data redundancy in data deduplication systems are disclosed. In one embodiment, by way of example only, a method for such preservation is disclosed. A selected data segment, to be written through the data deduplication system, is encrypted such that the selected data segment is not subject to a deduplication operation.
In one embodiment, by way of example only, a selected data segment, to be written through the data deduplication system, is encrypted such that the selected data segment is not subject to a deduplication operation. The method determines and identifies copies of the data segment that are to be precluded from data deduplication. A unique encryption key is used to encrypt the selected data segment to be written through the data deduplication system such that the selected data segment is not subject to a deduplication operation. The data deduplication system is tricked to recognize the encrypted, selected data segment as new, undeduplicated data by the encrypting thereby skipping steps of the deduplication operation that includes fingerprint generation and matching. The encrypted, selected data segment is directly written to a new physical storage location.
In addition to the foregoing exemplary method embodiment, other exemplary system and computer product embodiments are provided and supply related advantages. The foregoing summary has been provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
In order that the advantages of the invention will be readily understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
Data deduplication in storage controllers typically works “behind the scene” of an application, and may sometimes operate contrary to the interests of the application when deduplication operations are performed against the needs of the application. This situation may arise if an application writes multiple copies of the same data, and intends to retain multiple physical copies, while the deduplication subsystem (deduplication engine) finds these matching copies and ends up deduplicating the copies while storing the data. This can be detrimental to the application, which expects to find multiple copies at various locations, and is made to believe that it has done so by the storage subsystem, but in reality only a single copy of the data has been written.
Consider the following example. File systems usually prefer to write multiple physical copies of the “Superblock,” or a segment of metadata describing the file system on a block-based storage device, (or other metadata information) on a virtual disk to ensure redundancy. Since the contents of the Superblock are the same, data deduplication would result in retaining a single, physical copy of the Superblock and point multiple virtual addresses to the same physical block. This situation is highly inadvisable, because the loss of a single block on the physical copy of the Superblock may render the file system totally unusable, as there are no redundant copies of the Superblock. Conventionally, there are no existing methodologies that directly address this problem in data deduplication systems.
Various indirect methodologies may be employed to attempt to address this problem. In one example, the storage pool from which the data deduplication subsystem carves out physical storage can be mirrored (i.e., contains 2 or 3 copies of the same data). Hence multiple redundant copies can be created despite deduplication. However, this is inadequate protection for the application because of the following reasons. First, the application may wish to keep, for example, ten (10) copies of the same data. However, if the storage pool is two-way mirrored, it may only retain a maximum of two (2) copies. Second, since data deduplication carves out physical storage pools that span across large amounts of storage and multiple file systems, it is likely that multiple applications and file systems share the same physical storage pool. Hence it is possible that some critical copies of data (like the Superblock) get physically placed on the same disk. Since deduplication would prevent multiple copies of the same data to be written to multiple physical locations, the number of copies of critical data reduces and they can get placed on the same physical disk for multiple file systems. This increases the risk of single failures becoming fatal.
The illustrated embodiments provide multiple mechanisms for addressing the issues discussed previously. One goal of these mechanisms is to ensure that the deduplication subsystem in the storage controller (or wherever it may be located) balances the benefits of reducing the number of copies of data against application requirements for physical allocating multiple copies of critical data. Each of the methodologies described in the following illustrated embodiments may be used in a variety of circumstances and may have attendant benefits specific to those circumstances.
In one such embodiment, a selected data segment (such as a block) may be encrypted by an owning application, thereby “tricking” the data deduplication system into thinking that the selected data is new, unduplicated data and must be allocated to new storage space. For example, for data blocks where an owning application must store multiple physical copies of identical data, the application may encrypt the data with the start Logical Block Address (LBA) of the data block (or, alternatively, some other well-known key for the data block that would not require additional metadata storage space, such as the copy number (e.g., the first copy is encrypted with the key 1, the second with key 2, etc.)). Encryption of identical copies with differing keys will render the copies “different” to the eyes of an examining deduplication engine, thus ensuring that a storage controller or other storage management device incorporating the deduplication engine will not deduplicate the blocks.
The encryption technique mentioned above has an advantage in that a storage controller (or again, any storage management device) need not change anything to implement the desired characteristics. The owning application again “tricks” or “fools” the storage controller by using a simple technique and does so without incurring extra overhead or significant processing or resource allocation (e.g., additional metadata storage overhead, but preserving additional resources as one of ordinary skill in the art will appreciate).
In view of the described embodiment, by allowing the application to dictate whether a write must be encrypted (and thereby deciding which data to forgo deduplication), the application is allowed flexibility to implement storage policy associated with the data it generates. This way, the application is in a better position than the deduplication system to determine whether selected data blocks, even though identical, must still be located in separate physical locations. In addition, the storage controller (or other storage management device) continues to perform its role of data reduction by deduplication, and at the same time allowed enough control to the application to rule out deduplication when required.
By designating selected data chunks as encrypted, very fine-grained control is thereby provided to the application, allowing for flexibility in implementation while still retaining advantages of deduplication functionality and retaining redundancy for key data.
In the following description, reference is made to the accompanying drawings which form a part hereof and which illustrate several embodiments of the present invention. It is understood that other embodiments may be utilized and structural and operational changes may be made without departing from the scope of the present invention.
Turning to
Memory 16 is shown including an application program 15, and an application program 17, in which a file system 19 is operational as well as an encryption module 21. Application 15 and application 17 may create, delete, or otherwise manage segments of data, such as data chunks or data blocks, which are physically stored in devices such as mass storage device 14. File system 19 provides a means to organize data expected to be retained after the application program 17 terminates by providing procedures to store, retrieve, and update data, as well as manage the available space on the device(s) that contain it. The file system 19 organizes data in an efficient manner, and is tuned to the specific characteristics of the device (such as computer 10 and/or memory 16). In one embodiment, application 17 may be an operating system (OS) 17, and file system 19 retains a tight coupling between the OS 17 and the file system 19. File system 19 may provide mechanisms to control access to the data and metadata, and may contain mechanisms to ensure data reliability such as those necessary to further certain aspects of the present invention, as one of ordinary skill in the art will appreciate. File system 19 may provide a means for multiple application programs 15, 17 to update data in the same file at nearly the same time.
Encryption module 21 may be used in conjunction with the application 15, application 17, the file system 19, or other computing hardware or software components to accomplish purposes of the present invention. In one embodiment, for example, encryption module 21 processes selected data chunks designated to forgo deduplication to encrypt at least a portion of the data chunk with a weak security key (again to avoid incurring significant processing and/or resource allocation overhead). Implementation of the encryption mechanism may vary, as one of ordinary skill in the art will appreciate, and the encryption mechanism itself may vary according to a particular implementation. In one embodiment, a goal of the encryption mechanism is to “change” the character of the data just enough for the deduplication engine to think that the data is “new” data, while requiring the least amount of resource and overhead allocation as possible.
In the illustrated embodiment, memory device 16 and mass storage device 14 are connected to CPU 12 via a signal-bearing medium. In addition, CPU 12 is connected through communication port 18 to a communication network 20, having an attached plurality of additional computer systems 22 and 24. The computer system 10 may include one or more processor devices (e.g., CPU 12) and additional memory devices 16 for each individual component of the computer system 10 to execute and perform each operation described herein to accomplish the purposes of the present invention.
To facilitate a clearer understanding of the methods described herein, storage controller 240 is shown in
In some embodiments, the devices included in storage 230 may be connected in a loop architecture. Storage controller 240 manages storage 230 and facilitates the processing of write and read requests intended for storage 230. The system memory 243 of storage controller 240 stores program instructions and data that the processor 242 may access for executing functions associated with managing storage 230. In one embodiment, system memory 243 includes, is associated, or is in communication with the operation software 250, and configured in part for accomplishing functionality of the present invention. As shown in
In some embodiments, cache 245 is implemented with a volatile memory and non-volatile memory and coupled to microprocessor 242 via a local bus (not shown in
Storage 230 may be physically comprised of one or more storage devices, such as storage arrays. A storage array is a logical grouping of individual storage devices, such as a hard disk. In certain embodiments, storage 230 is comprised of a JBOD (Just a Bunch of Disks) array or a RAID (Redundant Array of Independent Disks) array. A collection of physical storage arrays may be further combined to form a rank, which dissociates the physical storage from the logical configuration. The storage space in a rank may be allocated into logical volumes, which define the storage location specified in a write/read request.
In one embodiment, by way of example only, the storage system as shown in
The storage controller 240 includes a control switch 241 for controlling the fiber channel protocol to the host computers 210, 220, 225, a microprocessor 242 for controlling all the storage controller 240, a nonvolatile control memory 243 for storing a microprogram (operation software) 250 for controlling the operation of storage controller 240, data for control and each table described later, cache 245 for temporarily storing (buffering) data, and buffers 244 for assisting the cache 245 to read and write data, a control switch 241 for controlling a protocol to control data transfer to or from the storage devices 230, and compression operation module 255 and compression operation list module 257 in which information may be set. Multiple buffers 244 may be implemented with the present invention to assist with the operations as described herein.
In one embodiment, the host computers or one or more physical or virtual devices, 210, 220, 225 and the storage controller 240 are connected through a network adaptor (this could be a fibre channel) 260 as an interface i.e., via at least one switch called “fabric.” In one embodiment, the operation of the system shown in
The storage controller 240 is shown including a data deduplication engine 255, in which a number of write data 259 is processed. The data deduplication engine 255 may be structurally one complete module or may be associated and/or incorporated within other individual modules. Data deduplication engine 255 is configured for performing, in conjunction with other components of storage controller 240 such as microprocessor 242, data deduplication operations on write data 259 passed through storage controller 240 to storage 230.
As previously indicated, storage controller 240 includes cache 245 (or what may be termed holistically as cache system) 245 accepts write data from hosts 210, 220, and 225, or similar devices, that is then placed in cache memory 245. Data deduplication engine 255 then tests the write data for duplication in the cache memory 245. The write data 259 that the application 17 (
In one embodiment, the application 17/file system 19 first determines whether a given data block must be stored multiple times on physical storage. This may be Superblock metadata associated with the file system 19 itself, or other relevant file system information, for example. The application 17 then encrypts those data blocks with a unique key for that virtual device before a write is issued. As a following step, the application may initiate a write request to the underlying disk (device) driver, along with the encrypted data 257, in effect designating that this data block is “new” and must not be deduplicated, even if the unencrypted block is identical to a previously written data block. Encryption may be performed by the owning application on a per-disk-block basis using the LBA of that block as the weak encryption key.
Here again, the selected encryption method (including encryption key) chosen such that the key is simple to deduce when it is later read back from the underlying storage controller or storage management device. Examples of encryption keys may include the following: (1) the start LBA of the selected data block; (2) the offset of the data block within the file; and other similar encryption mechanisms that one of ordinary skill in the art would be familiar. The encryption key should be weak and predictable (i.e., the owning application will know, without storing the key anywhere, what the encryption key for a specific meta-block would be).
In a following step, the disk driver in turn prepares a write command, such as a Small Computer Systems Interface (SCSI) command to the storage controller 240. On receiving the designated, encrypted data block, the storage controller 240, via data deduplication engine 255, skips the deduplication steps of fingerprint generation, matching, etc., as one of ordinary skill in the art will appreciate, and directly writes the selected data block onto a new physical disk location, even if there may have been earlier instances of identical data being stored on the storage controller 240. Later, on a subsequent read of these data blocks (well known to the application), the application decrypts the data using the well-known and simple key (e.g., weak key/encryption mechanism). Since the encryption techniques used herein are not necessarily for data security, any overhead for performing such techniques may be efficiently minimized as much as possible.
In a preferred embodiment, an encryption or data transformation function should be chosen such that the size of the resultant data remains unaltered. For example, in a situation where 512 bytes of data are to be transformed, 512 bytes of resultant encrypted data are produced.
In one embodiment, the owning application may choose to encrypt multiple blocks of data written as a unit. The data transformation function (encryption function) should be such that decrypting each individual block returns the original data for this block. Alternatively, the application should read these multi-block units as chunks of data and decrypt them as a unit.
Turning now to
Continuing with
With the foregoing in view,
In
As a following step, a write request, along with the encrypted, selected data segment, is provided to the storage controller (step 608). The encrypted data segment is then processed through the deduplication engine, whereupon a deduplication operation is withheld from being performed on the encrypted data as the selected data segment is recognized/treated by the deduplication engine as “new” data (step 610).
In step 612, the encrypted data segment is written in a newly allocated physical storage location. In a later, subsequent read of the encrypted data, the encrypted data is then returned to the owning application and/or file system (step 614). Then, the encrypted data segment is decrypted by the application and/or file system using the affiliated encryption algorithm (step 616), which again, as one of ordinary skill in the art will appreciate, may vary according to a particular application but may be selected to minimize overhead and bandwidth. The method 600 then ends (step 618).
In step 706, the method 700 queries whether the accompanying data is encrypted (step 706). If so, the deduplication engine/storage controller forgoes performing data deduplication operations (step 708), and the encrypted data is written in a newly allocated physical storage location (step 710). Note, for purposes of illustration, the “method” 700 is said to query whether the data is encrypted. In actuality, however, the data deduplication system does not understand, and does not query, whether the data is encrypted or not. As previously explained, by virtue of encryption, the data block will not match with its duplicate copy previously written by the owning application. Hence, the deduplication system will treat this as a “new” data block, and will write the block to physical storage. Returning to step 706, if the accompanying data is not encrypted, then the deduplication engine/storage controller performs various deduplication operations on the data (step 712). The method 700 then ends (step 714).
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
This application is a Continuation of U.S. patent application Ser. No. 13/453,259, filed on Apr. 23, 2012.
Number | Name | Date | Kind |
---|---|---|---|
7567188 | Anglin et al. | Jul 2009 | B1 |
7818495 | Tanaka et al. | Oct 2010 | B2 |
7908436 | Srinivasan et al. | Mar 2011 | B1 |
8074049 | Gelson et al. | Dec 2011 | B2 |
8086799 | Mondal et al. | Dec 2011 | B2 |
8117464 | Kogelnik | Feb 2012 | B1 |
8468138 | Chhaunker et al. | Jun 2013 | B1 |
8527544 | Colgrove et al. | Sep 2013 | B1 |
8539148 | Chen et al. | Sep 2013 | B1 |
8589640 | Colgrove et al. | Nov 2013 | B2 |
8660994 | Slater et al. | Feb 2014 | B2 |
8712976 | Chen et al. | Apr 2014 | B1 |
9058118 | Urkude | Jun 2015 | B1 |
20030115447 | Pham et al. | Jun 2003 | A1 |
20030225800 | Kavuri | Dec 2003 | A1 |
20040111625 | Duffy et al. | Jun 2004 | A1 |
20040131182 | Rogaway | Jul 2004 | A1 |
20060179489 | Mas Ribes | Aug 2006 | A1 |
20060230076 | Gounares et al. | Oct 2006 | A1 |
20070168350 | Utiger | Jul 2007 | A1 |
20080098083 | Shergill et al. | Apr 2008 | A1 |
20080244172 | Kano | Oct 2008 | A1 |
20090063795 | Yueh | Mar 2009 | A1 |
20090063883 | Mori | Mar 2009 | A1 |
20090268903 | Bojinov et al. | Oct 2009 | A1 |
20090271402 | Srinivasan et al. | Oct 2009 | A1 |
20090319585 | Gokhale | Dec 2009 | A1 |
20090319772 | Singh | Dec 2009 | A1 |
20100037118 | Saliba et al. | Feb 2010 | A1 |
20100070478 | Anglin | Mar 2010 | A1 |
20100070715 | Waltermann et al. | Mar 2010 | A1 |
20100121825 | Bates et al. | May 2010 | A1 |
20100250501 | Mandagere et al. | Sep 2010 | A1 |
20100250549 | Muller et al. | Sep 2010 | A1 |
20100268960 | Moffat | Oct 2010 | A1 |
20100299311 | Anglin et al. | Nov 2010 | A1 |
20100306412 | Therrien et al. | Dec 2010 | A1 |
20100313036 | Lumb | Dec 2010 | A1 |
20100313040 | Lumb | Dec 2010 | A1 |
20100333116 | Prahlad et al. | Dec 2010 | A1 |
20110022718 | Evans et al. | Jan 2011 | A1 |
20110029739 | Nakajima et al. | Feb 2011 | A1 |
20110035541 | Tanaka et al. | Feb 2011 | A1 |
20110066628 | Jayaraman | Mar 2011 | A1 |
20110145207 | Agrawal et al. | Jun 2011 | A1 |
20110145576 | Bettan | Jun 2011 | A1 |
20110225130 | Tokoro | Sep 2011 | A1 |
20110225214 | Guo | Sep 2011 | A1 |
20110238634 | Kobara | Sep 2011 | A1 |
20110238635 | Leppard | Sep 2011 | A1 |
20110239097 | Bates et al. | Sep 2011 | A1 |
20110258398 | Saliba et al. | Oct 2011 | A1 |
20120017043 | Aizman et al. | Jan 2012 | A1 |
20120072654 | Olbrich et al. | Mar 2012 | A1 |
20120089574 | Doerner | Apr 2012 | A1 |
20120095968 | Gold | Apr 2012 | A1 |
20120158672 | Oltean et al. | Jun 2012 | A1 |
20120317084 | Liu | Dec 2012 | A1 |
20130086006 | Colgrove et al. | Apr 2013 | A1 |
20130097380 | Colgrove et al. | Apr 2013 | A1 |
20130144846 | Chhaunker et al. | Jun 2013 | A1 |
20130198742 | Kumar et al. | Aug 2013 | A1 |
20130262404 | Daga et al. | Oct 2013 | A1 |
20130262753 | Prins et al. | Oct 2013 | A1 |
Number | Date | Country |
---|---|---|
1341240 | Mar 2002 | CN |
101656720 | Feb 2010 | CN |
201110156839 | Jun 2011 | CN |
102156727 | Aug 2011 | CN |
102221982 | Oct 2011 | CN |
102281320 | Dec 2011 | CN |
2006308636 | Nov 2006 | JP |
2011033582 | Mar 2011 | WO |
Entry |
---|
Gu Yu et al., “Reliability Provision Mechanism for Large-Scale De-duplication Storage Systems,” J Tsinghua Univ (Sci & Tech), ISSN 1000-0054, vol. 50, No. 5, pp. 739-744, 2010. |
Wang et al., “Research on Secure De-duplication based on Proxy-Recreation,” Sciencepaper Online, pp. 1-6, Dec. 27, 2011. |
Number | Date | Country | |
---|---|---|---|
20150154410 A1 | Jun 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13453259 | Apr 2012 | US |
Child | 14617091 | US |