WO2010126644A2 - Methods and systems for stripe blind encryption - Google Patents
Methods and systems for stripe blind encryption Download PDFInfo
- Publication number
- WO2010126644A2 WO2010126644A2 PCT/US2010/024889 US2010024889W WO2010126644A2 WO 2010126644 A2 WO2010126644 A2 WO 2010126644A2 US 2010024889 W US2010024889 W US 2010024889W WO 2010126644 A2 WO2010126644 A2 WO 2010126644A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data item
- stripe
- blinding factor
- encryption key
- logic operation
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000013500 data storage Methods 0.000 claims abstract description 45
- 238000009795 derivation Methods 0.000 claims description 10
- 238000010276 construction Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims 2
- 230000006870 function Effects 0.000 description 13
- 238000007726 management method Methods 0.000 description 13
- 150000003839 salts Chemical class 0.000 description 11
- 230000015654 memory Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 3
- 230000006378 damage Effects 0.000 description 3
- 230000002085 persistent effect Effects 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004630 atomic force microscopy Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1471—Saving, restoring, recovering or retrying involving logging of persistent data for recovery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2094—Redundant storage or storage space
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1113926A GB2480030A (en) | 2009-02-23 | 2010-02-22 | Methods and systems for stripe blind encryption |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15461809P | 2009-02-23 | 2009-02-23 | |
US12/391,099 US8145598B2 (en) | 2009-02-23 | 2009-02-23 | Methods and systems for single instance storage of asset parts |
US12/391,099 | 2009-02-23 | ||
US61/154,618 | 2009-02-23 | ||
US12/402,470 | 2009-03-11 | ||
US12/402,470 US20100215175A1 (en) | 2009-02-23 | 2009-03-11 | Methods and systems for stripe blind encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010126644A2 true WO2010126644A2 (en) | 2010-11-04 |
WO2010126644A3 WO2010126644A3 (en) | 2011-01-06 |
Family
ID=42790994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2010/024889 WO2010126644A2 (en) | 2009-02-23 | 2010-02-22 | Methods and systems for stripe blind encryption |
Country Status (3)
Country | Link |
---|---|
US (1) | US20100215175A1 (en) |
GB (1) | GB2480030A (en) |
WO (1) | WO2010126644A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140105401A1 (en) * | 2012-07-12 | 2014-04-17 | Elwha Llc | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box |
US8806175B2 (en) | 2009-02-23 | 2014-08-12 | Longsand Limited | Hybrid hash tables |
US9521370B2 (en) | 2012-07-12 | 2016-12-13 | Elwha, Llc | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box |
US9781389B2 (en) | 2012-07-12 | 2017-10-03 | Elwha Llc | Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box |
US9825760B2 (en) | 2012-07-12 | 2017-11-21 | Elwha, Llc | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090259669A1 (en) * | 2008-04-10 | 2009-10-15 | Iron Mountain Incorporated | Method and system for analyzing test data for a computer application |
US8145598B2 (en) * | 2009-02-23 | 2012-03-27 | Iron Mountain Incorporated | Methods and systems for single instance storage of asset parts |
US8090683B2 (en) * | 2009-02-23 | 2012-01-03 | Iron Mountain Incorporated | Managing workflow communication in a distributed storage system |
US8914669B2 (en) * | 2010-04-26 | 2014-12-16 | Cleversafe, Inc. | Secure rebuilding of an encoded data slice in a dispersed storage network |
US8751819B1 (en) * | 2011-09-22 | 2014-06-10 | Symantec Corporation | Systems and methods for encoding data |
CN104375848B (en) * | 2013-08-14 | 2017-06-16 | 英华达(上海)科技有限公司 | Information Microprocessor System for Real Time Record and method |
US9811546B1 (en) * | 2014-06-30 | 2017-11-07 | EMC IP Holding Company LLC | Storing data and metadata in respective virtual shards on sharded storage systems |
US9680651B2 (en) * | 2014-10-27 | 2017-06-13 | Seagate Technology Llc | Secure data shredding in an imperfect data storage device |
US9558128B2 (en) | 2014-10-27 | 2017-01-31 | Seagate Technology Llc | Selective management of security data |
US9767130B2 (en) * | 2014-12-31 | 2017-09-19 | Nexenta Systems, Inc. | Methods and systems for key sharding of objects stored in distributed storage system |
EP3652887A1 (en) | 2017-07-10 | 2020-05-20 | Zamna Technologies Limited | Method and system for data security within independent computer systems and digital networks |
WO2019111056A1 (en) * | 2017-12-06 | 2019-06-13 | Vchain Technology Limited | Method and system for data security, validation, verification and provenance within independent computer systems and digital networks |
US10873459B2 (en) * | 2018-09-24 | 2020-12-22 | Nxp B.V. | Password authentication using white-box cryptography |
US10985912B2 (en) | 2018-10-05 | 2021-04-20 | Intuit Inc. | Homomorphic key derivation |
CN115242540B (en) * | 2022-08-03 | 2023-09-26 | 平安银行股份有限公司 | Data processing method and system |
Family Cites Families (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5287499A (en) * | 1989-03-22 | 1994-02-15 | Bell Communications Research, Inc. | Methods and apparatus for information storage and retrieval utilizing a method of hashing and different collision avoidance schemes depending upon clustering in the hash table |
US5440727A (en) * | 1991-12-18 | 1995-08-08 | International Business Machines Corporation | Asynchronous replica management in shared nothing architectures |
US5812398A (en) * | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
US5813008A (en) * | 1996-07-12 | 1998-09-22 | Microsoft Corporation | Single instance storage of information |
US6041423A (en) * | 1996-11-08 | 2000-03-21 | Oracle Corporation | Method and apparatus for using undo/redo logging to perform asynchronous updates of parity and data pages in a redundant array data storage environment |
US20020028783A1 (en) * | 1999-09-09 | 2002-03-07 | O'brien John S. | Method of stimulating prosaposin receptor activity |
US7716060B2 (en) * | 1999-03-02 | 2010-05-11 | Germeraad Paul B | Patent-related tools and methodology for use in the merger and acquisition process |
US6711585B1 (en) * | 1999-06-15 | 2004-03-23 | Kanisa Inc. | System and method for implementing a knowledge management system |
US6477544B1 (en) * | 1999-07-16 | 2002-11-05 | Microsoft Corporation | Single instance store for file systems |
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
JP2001265361A (en) * | 2000-03-14 | 2001-09-28 | Sony Corp | Device and method for providing information, device and method for providing information, and program storage medium |
KR20030014224A (en) * | 2000-10-11 | 2003-02-15 | 트러스트카피 프라이빗 리미티드 | Remote Printing of Secure and/or Authenticated Documents |
US6865577B1 (en) * | 2000-11-06 | 2005-03-08 | At&T Corp. | Method and system for efficiently retrieving information from a database |
US7003551B2 (en) * | 2000-11-30 | 2006-02-21 | Bellsouth Intellectual Property Corp. | Method and apparatus for minimizing storage of common attachment files in an e-mail communications server |
US6629198B2 (en) * | 2000-12-08 | 2003-09-30 | Sun Microsystems, Inc. | Data storage system and method employing a write-ahead hash log |
US6678809B1 (en) * | 2001-04-13 | 2004-01-13 | Lsi Logic Corporation | Write-ahead log in directory management for concurrent I/O access for block storage |
AU2002304842A1 (en) * | 2001-08-20 | 2003-03-10 | Datacentertechnologies N.V. | File backup system and method |
US7047358B2 (en) * | 2001-12-26 | 2006-05-16 | Boon Storage Technologies, Inc. | High-performance log-structured RAID |
JP3702231B2 (en) * | 2002-01-31 | 2005-10-05 | 株式会社東芝 | Disk array apparatus and dynamic storage capacity expansion method in the same |
US20030188153A1 (en) * | 2002-04-02 | 2003-10-02 | Demoff Jeff S. | System and method for mirroring data using a server |
US8335915B2 (en) * | 2002-05-14 | 2012-12-18 | Netapp, Inc. | Encryption based security system for network storage |
JP4254178B2 (en) * | 2002-09-11 | 2009-04-15 | 富士ゼロックス株式会社 | Distributed storage control apparatus and method |
US20040088556A1 (en) * | 2002-10-31 | 2004-05-06 | Weirauch Charles R. | Using digital watermarking for protection of digital data |
JP4186602B2 (en) * | 2002-12-04 | 2008-11-26 | 株式会社日立製作所 | Update data writing method using journal log |
US7424637B1 (en) * | 2003-03-21 | 2008-09-09 | Networks Appliance, Inc. | Technique for managing addition of disks to a volume of a storage system |
US20050015416A1 (en) * | 2003-07-16 | 2005-01-20 | Hitachi, Ltd. | Method and apparatus for data recovery using storage based journaling |
GB2404538A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital content |
US20050033777A1 (en) * | 2003-08-04 | 2005-02-10 | Moraes Mark A. | Tracking, recording and organizing changes to data in computer systems |
US7165082B1 (en) * | 2003-10-31 | 2007-01-16 | Veritas Operating Corporation | Incremental method for backup of email messages |
JP2005157463A (en) * | 2003-11-20 | 2005-06-16 | Pioneer Electronic Corp | Data classifying method, summary data generating method, data classifying device, summary data generating device, data classifying program, summary data generating program and information recording medium |
US7197599B2 (en) * | 2003-12-29 | 2007-03-27 | Intel Corporation | Method, system, and program for managing data updates |
US7386663B2 (en) * | 2004-05-13 | 2008-06-10 | Cousins Robert E | Transaction-based storage system and method that uses variable sized objects to store data |
US20050262361A1 (en) * | 2004-05-24 | 2005-11-24 | Seagate Technology Llc | System and method for magnetic storage disposal |
US20060031230A1 (en) * | 2004-07-21 | 2006-02-09 | Kumar Sinha M | Data storage systems |
US7765369B1 (en) * | 2004-11-05 | 2010-07-27 | Commvault Systems, Inc. | Method and system for selectively deleting stored data |
US7490207B2 (en) * | 2004-11-08 | 2009-02-10 | Commvault Systems, Inc. | System and method for performing auxillary storage operations |
US7958148B2 (en) * | 2004-11-17 | 2011-06-07 | Iron Mountain Incorporated | Systems and methods for filtering file system input and output |
US20060106782A1 (en) * | 2004-11-17 | 2006-05-18 | Steven Blumenau | Systems and methods for searching digital assets using virtual folders having labels based on taxonomy tags |
US7444360B2 (en) * | 2004-11-17 | 2008-10-28 | International Business Machines Corporation | Method, system, and program for storing and using metadata in multiple storage locations |
US7788240B2 (en) * | 2004-12-29 | 2010-08-31 | Sap Ag | Hash mapping with secondary table having linear probing |
US7702850B2 (en) * | 2005-03-14 | 2010-04-20 | Thomas Earl Ludwig | Topology independent storage arrays and methods |
US7765191B2 (en) * | 2005-04-15 | 2010-07-27 | Emc Corporation | Methods and apparatus for managing the replication of content |
US20060248055A1 (en) * | 2005-04-28 | 2006-11-02 | Microsoft Corporation | Analysis and comparison of portfolios by classification |
US7617370B2 (en) * | 2005-04-29 | 2009-11-10 | Netapp, Inc. | Data allocation within a storage system architecture |
US7680806B2 (en) * | 2005-05-17 | 2010-03-16 | Cisco Technology, Inc. | Reducing overflow of hash table entries |
US7562188B2 (en) * | 2005-06-17 | 2009-07-14 | Intel Corporation | RAID power safe apparatus, systems, and methods |
JP2007140746A (en) * | 2005-11-16 | 2007-06-07 | Hitachi Ltd | Computer system, management computer and recovery management method |
JP4829632B2 (en) * | 2006-02-10 | 2011-12-07 | 株式会社リコー | Data encryption apparatus, data encryption method, data encryption program, and recording medium |
US8806227B2 (en) * | 2006-08-04 | 2014-08-12 | Lsi Corporation | Data shredding RAID mode |
US20080263363A1 (en) * | 2007-01-22 | 2008-10-23 | Spyrus, Inc. | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption |
US20080243878A1 (en) * | 2007-03-29 | 2008-10-02 | Symantec Corporation | Removal |
US8489830B2 (en) * | 2007-03-30 | 2013-07-16 | Symantec Corporation | Implementing read/write, multi-versioned file system on top of backup data |
EP2186250B1 (en) * | 2007-08-31 | 2019-03-27 | IP Reservoir, LLC | Method and apparatus for hardware-accelerated encryption/decryption |
US8989388B2 (en) * | 2008-04-02 | 2015-03-24 | Cisco Technology, Inc. | Distribution of storage area network encryption keys across data centers |
US20090259669A1 (en) * | 2008-04-10 | 2009-10-15 | Iron Mountain Incorporated | Method and system for analyzing test data for a computer application |
US8589697B2 (en) * | 2008-04-30 | 2013-11-19 | Netapp, Inc. | Discarding sensitive data from persistent point-in-time image |
US9215066B2 (en) * | 2008-06-25 | 2015-12-15 | Oracle America, Inc. | Method and system for making information in a data set of a copy-on-write file system inaccessible |
US8397051B2 (en) * | 2009-02-23 | 2013-03-12 | Autonomy, Inc. | Hybrid hash tables |
US8090683B2 (en) * | 2009-02-23 | 2012-01-03 | Iron Mountain Incorporated | Managing workflow communication in a distributed storage system |
-
2009
- 2009-03-11 US US12/402,470 patent/US20100215175A1/en not_active Abandoned
-
2010
- 2010-02-22 WO PCT/US2010/024889 patent/WO2010126644A2/en active Application Filing
- 2010-02-22 GB GB1113926A patent/GB2480030A/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
None |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8806175B2 (en) | 2009-02-23 | 2014-08-12 | Longsand Limited | Hybrid hash tables |
US20140105401A1 (en) * | 2012-07-12 | 2014-04-17 | Elwha Llc | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box |
US9521370B2 (en) | 2012-07-12 | 2016-12-13 | Elwha, Llc | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box |
US9596436B2 (en) | 2012-07-12 | 2017-03-14 | Elwha Llc | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box |
US9667917B2 (en) * | 2012-07-12 | 2017-05-30 | Elwha, Llc | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box |
US9781389B2 (en) | 2012-07-12 | 2017-10-03 | Elwha Llc | Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box |
US9825760B2 (en) | 2012-07-12 | 2017-11-21 | Elwha, Llc | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box |
US10277867B2 (en) | 2012-07-12 | 2019-04-30 | Elwha Llc | Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box |
US10348494B2 (en) | 2012-07-12 | 2019-07-09 | Elwha Llc | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box |
Also Published As
Publication number | Publication date |
---|---|
WO2010126644A3 (en) | 2011-01-06 |
US20100215175A1 (en) | 2010-08-26 |
GB201113926D0 (en) | 2011-09-28 |
GB2480030A (en) | 2011-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20100215175A1 (en) | Methods and systems for stripe blind encryption | |
US10873450B2 (en) | Cryptographic key generation for logically sharded data stores | |
Zhou et al. | SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management | |
US9559837B2 (en) | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |
US9122888B2 (en) | System and method to create resilient site master-key for automated access | |
US20190147170A1 (en) | Processing data queries in a logically sharded data store | |
US20100268966A1 (en) | Efficient and secure data storage utilizing a dispersed data storage system | |
Pang et al. | StegFS: A steganographic file system | |
US8656187B2 (en) | Dispersed storage secure data decoding | |
US8826023B1 (en) | System and method for securing access to hash-based storage systems | |
US8200964B2 (en) | Method and apparatus for accessing an encrypted file system using non-local keys | |
GB2567146A (en) | Method and system for secure storage of digital data | |
AU2017440029B2 (en) | Cryptographic key generation for logically sharded data stores | |
EP3163789B1 (en) | Forward-secure crash-resilient logging device | |
Virvilis et al. | A cloud provider-agnostic secure storage protocol | |
Sarkar et al. | Enhancing data storage security in cloud computing through steganography | |
CN115021988B (en) | Method and system for secure backup and recovery of data based on verifiable secret sharing | |
Kroeger et al. | The case for distributed data archival using secret splitting with percival | |
Pang et al. | Steganographic schemes for file system and b-tree | |
US8738531B1 (en) | Cryptographic distributed storage system and method | |
US20220147508A1 (en) | Method of ensuring confidentiality and integrity of stored data and metadata in an untrusted environment | |
Carbunar et al. | Write-once read-many oblivious RAM | |
Aslam et al. | Data deduplication with encrypted big data management in cloud computing | |
Bel et al. | Inkpack: A Secure, Data-Exposure Resistant Storage System | |
Bel et al. | Inkpack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10747712 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 1113926 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20100222 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1113926.8 Country of ref document: GB |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10747712 Country of ref document: EP Kind code of ref document: A2 |
|
ENPC | Correction to former announcement of entry into national phase, pct application did not enter into the national phase |
Ref country code: GB |