Multi-tier file system with transparent holes
First Claim
1. A method of access to content in a multi-tier file system including a first tier file and a second tier file stored in a persistent memory, the method comprising:
- initializing, by one or more processors, the second tier file in the persistent memory, wherein the second tier file is accessible using a same path and file name as the first tier file, and the second tier file has a second tier hole as a placeholder for data in the first tier file, the second tier hole having a second tier link that refers read access to a block in the first tier file;
copying, by the one or more processors, forward blocks of data from the first tier file to the second tier file based on a scheduled copy forward or an authorized write access to a particular block of the second tier file; and
responding, by the one or more processors, to an access request by providing data available from the second tier file that has been copied forward and by following the second tier link associated with the second tier hole to access the block in the first tier file to provide data from the first tier file,wherein the responding is prior to completion of the copying forward.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology disclosed includes access to content and encryption key rotation in a multi-generational file system that has a first tier file, and automatically initializes a second tier file accessible using a same path and file name as the first tier file. The disclosed technology includes copying forward blocks of data from the first tier file to the second tier file, and prior to completion of the copying forward, responding to an access request by accessing the second tier file by providing data available from the second tier file that has been copied forward and by following links associated with the holes to access blocks in the first tier file to provide data from the first tier file. The first tier files are encrypted using a first encryption key; and applying a second encryption key to encrypt data in the second tier files during the copying forward and write access.
154 Citations
25 Claims
-
1. A method of access to content in a multi-tier file system including a first tier file and a second tier file stored in a persistent memory, the method comprising:
-
initializing, by one or more processors, the second tier file in the persistent memory, wherein the second tier file is accessible using a same path and file name as the first tier file, and the second tier file has a second tier hole as a placeholder for data in the first tier file, the second tier hole having a second tier link that refers read access to a block in the first tier file; copying, by the one or more processors, forward blocks of data from the first tier file to the second tier file based on a scheduled copy forward or an authorized write access to a particular block of the second tier file; and responding, by the one or more processors, to an access request by providing data available from the second tier file that has been copied forward and by following the second tier link associated with the second tier hole to access the block in the first tier file to provide data from the first tier file, wherein the responding is prior to completion of the copying forward. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device that provides access to content in a multi-tier file system, the device including:
a processor, memory coupled to the processor, and computer instructions loaded into the memory that, when executed, cause the processor to implement a process that includes; using a file system having a first tier file in persistent memory, and the file system running on a hardware processor; the file system automatically initializing a second tier file in the persistent memory, wherein the second tier file is accessible using a same path and file name as the first tier file, and the second tier file has a second tier hole as a placeholder for data in the first tier file, the hole having a second tier link that refers read access to a block in an earlier tier of the second tier file; copying forward blocks of data from the first tier file to the second tier file based on a scheduled copy forward or an authorized write access to a particular block of the second tier file; and prior to completion of the copying forward, the file system-responding to an access request by accessing the second tier file by providing data available from the second tier file that has been copied forward and by following the second tier link associated with the second tier hole to access the block in the first tier file to provide data from the first tier file. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
19. A non-transitory computer readable storage medium that stores program instructions that, when executed, cause a computer to implement a method of access to content in a multi-tier file system, the implementation including:
using a file system having a first tier file in persistent memory, and the file system running on a hardware processor; the file system automatically initializing a second tier file in the persistent memory, wherein the second tier file is accessible using a same path and file name as the first tier file, and the second tier file has a second tier hole as a placeholder for data in the first tier file, the second tier hole having a second tier link that refers read access to a block in an earlier tier of the second tier file; copying forward blocks of data from the first tier file to the second tier file based on a scheduled copy or an authorized write access to a particular block of the second tier file; and prior to completion of the copying forward, the file system responding to an access request by accessing the second tier file by providing data available from the second tier file that has been copied forward and by following the second tier link associated with the second tier hole to access the block in the first tier file to provide data from the first tier file. - View Dependent Claims (20, 21, 22, 23, 24, 25)
Specification