Distributed storage network with enhanced security monitoring
First Claim
1. A method comprises:
- receiving, by a computing device in a dispersed storage network (DSN), a data access request from a requesting device regarding one or more encoded data slices, wherein a data object is dispersed storage error encoded into a plurality of sets of encoded data slices that includes the one or more encoded data slices, and wherein the plurality of sets of encoded data slices are stored in storage units of the DSN;
determining, by the computing device, whether one or more of the data access request, the requesting device, and the data object is affiliated with a DSN entity flagged for enhanced security monitoring;
when the one or more of the data access request, the requesting device, and the data object is affiliated with the DSN entity flagged for enhanced security monitoring;
determining, by the computing device, enhanced security monitoring parameters;
generating, by the computing device, security monitoring information regarding the one or more of the data access request, the requesting device, and the data object in accordance with the enhanced security monitoring parameters;
interpreting, by at least one of the computing device and a security device of the DSN, the security monitoring information to determine a DSN security threat level; and
implementing, by the at least one of the computing device and the security device, a security protocol based on the DSN security threat level.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a data access request from a requesting device regarding one or more encoded data slices. A data object is dispersed storage error encoded into a plurality of sets of encoded data slices that are stored in storage units of a dispersed storage network (DSN). The method further includes determining whether one or more of the data access request, the requesting device, and the data object is affiliated with a DSN entity flagged for enhanced security monitoring. When the one or more of the data access request, the requesting device, and the data object is affiliated with the DSN entity flagged for enhanced security monitoring, the method further includes determining enhanced security monitoring parameters; generating security monitoring information in accordance with the enhanced security monitoring parameters; determining a DSN security threat level; and implementing a security protocol based on the DSN security threat level.
-
Citations
18 Claims
-
1. A method comprises:
-
receiving, by a computing device in a dispersed storage network (DSN), a data access request from a requesting device regarding one or more encoded data slices, wherein a data object is dispersed storage error encoded into a plurality of sets of encoded data slices that includes the one or more encoded data slices, and wherein the plurality of sets of encoded data slices are stored in storage units of the DSN; determining, by the computing device, whether one or more of the data access request, the requesting device, and the data object is affiliated with a DSN entity flagged for enhanced security monitoring; when the one or more of the data access request, the requesting device, and the data object is affiliated with the DSN entity flagged for enhanced security monitoring; determining, by the computing device, enhanced security monitoring parameters; generating, by the computing device, security monitoring information regarding the one or more of the data access request, the requesting device, and the data object in accordance with the enhanced security monitoring parameters; interpreting, by at least one of the computing device and a security device of the DSN, the security monitoring information to determine a DSN security threat level; and implementing, by the at least one of the computing device and the security device, a security protocol based on the DSN security threat level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable memory comprises:
-
a first memory element that stores operational instructions that, when executed by a computing device of a dispersed storage network (DSN), causes the computing device to; receive a data access request from a requesting device regarding one or more encoded data slices, wherein a data object is dispersed storage error encoded into a plurality of sets of encoded data slices that includes the one or more encoded data slices, and wherein the plurality of sets of encoded data slices are stored in storage units of the DSN; a second memory element that stores operational instructions that, when executed by the computing device, causes the computing device to; determine whether one or more of the data access request, the requesting device, and the data object is affiliated with a DSN entity flagged for enhanced security monitoring; when the one or more of the data access request, the requesting device, and the data object is affiliated with the DSN entity flagged for enhanced security monitoring; a third memory element that stores operational instructions that, when executed by the computing device, causes the computing device to; determine enhanced security monitoring parameters; generate security monitoring information regarding the one or more of the data access request, the requesting device, and the data object in accordance with the enhanced security monitoring parameters; and a fourth memory element that stores operational instructions that, when executed by at least one of the computing device and a security device of the DSN, causes the at least one of the computing device and the security device to; interpret the security monitoring information to determine a DSN security threat level; and implement a security protocol based on the DSN security threat level. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification