×

Dispersed storage network with customized security and methods for use therewith

  • US 10,180,884 B2
  • Filed: 06/26/2014
  • Issued: 01/15/2019
  • Est. Priority Date: 09/30/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method comprises:

  • receiving an access request corresponding to a data segment of a data object stored in the DSN, wherein the data segment is dispersed storage error encoded into a set of encoded data slices, wherein a decode threshold number of encoded data slices of the set of encoded data slices is needed to recover the data segment, wherein the decoded threshold number is greater than one, and wherein the set of encoded data slices is stored or is to be stored in a plurality of dispersed storage units of the DSN;

    determining connection security requirements corresponding to the access request;

    determining a subset of the plurality of dispersed storage units based on the connection security requirements, wherein the subset includes at least the decode threshold number of dispersed storage units of the plurality of dispersed storage units;

    determining, based on the connection security requirements, a connection security level for communicating with the subset of the plurality of dispersed storage units regarding the access request; and

    communicating respective portions of the access request to corresponding dispersed storage units of the subset of the plurality of dispersed storage units in accordance with the connection security level for processing by the subset of the plurality of dispersed storage units;

    wherein determining the connection security level includes determining a first connection security level for one of the subset of the plurality of dispersed storage units based on a first proximity of the one of the subset of the plurality of dispersed storage units from the one or more computing devices, and further includes determining a second connection security level for another one of the subset of the plurality of dispersed storage units based on a second proximity of the another one of the subset of the plurality of dispersed storage units from the one or more computing devices.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×