Slice migration in a dispersed storage network
First Claim
1. A method for execution by a source storage unit of a dispersed storage network that includes a processor, the method comprises:
- identifying a slice name corresponding to a slice to migrate from the source storage unit to a destination storage unit;
sending the slice to migrate to the destination storage unit;
generating a slice verification request and sending the slice verification request to the destination storage unit;
receiving an integrity value from the destination storage unit;
determining when the integrity value compares favorably to the slice verification request, by determining when a hash of the slice and nonce matches the integrity value or determining when a decrypted signature of the integrity value matches a hash of the slice and the nonce or the slice and the nonce;
when the processing system determines that the integrity value compares favorably to the slice verification request, updating a slice name assignment associated with the slice name; and
deleting the slice from the source storage unit.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for use by a source storage unit of a dispersed storage network includes identifying a slice name corresponding to a slice to migrate from a source storage unit to a destination storage unit; sending the slice to migrate to the destination storage unit; generating a slice verification request and sending the slice verification request to the destination storage unit; receiving an integrity value from the destination storage unit; and determining when the integrity value compares favorably to the slice verification request. When the source storage unit determines that the integrity value compares favorably to the slice verification request, a slice name assignment associated with the slice name is updated and the slice is deleted from the source storage unit.
100 Citations
16 Claims
-
1. A method for execution by a source storage unit of a dispersed storage network that includes a processor, the method comprises:
-
identifying a slice name corresponding to a slice to migrate from the source storage unit to a destination storage unit; sending the slice to migrate to the destination storage unit; generating a slice verification request and sending the slice verification request to the destination storage unit; receiving an integrity value from the destination storage unit; determining when the integrity value compares favorably to the slice verification request, by determining when a hash of the slice and nonce matches the integrity value or determining when a decrypted signature of the integrity value matches a hash of the slice and the nonce or the slice and the nonce; when the processing system determines that the integrity value compares favorably to the slice verification request, updating a slice name assignment associated with the slice name; and deleting the slice from the source storage unit. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for execution by a destination storage unit of a dispersed storage network that includes a processor, the method comprises:
-
receiving a slice to migrate from a source storage unit; storing the slice to migrate in a memory device associated with the destination storage unit; receiving a slice verification request from the source storage unit; generating an integrity value utilizing the slice to migrate and a nonce of the slice verification request based on a verification method indicator of the request, wherein generating the integrity value includes performing a hashing function on the slice and the nonce to produce a hash result as the integrity value when the verification method indicator indicates to produce a hash result and wherein generating the integrity value includes generating a signature utilizing a private key associated with the destination storage unit over the slice and the nonce to produce a signed package as the integrity value when the verification method indicator indicates to produce a signature; and sending the integrity value to the source storage unit. - View Dependent Claims (9, 10)
-
-
11. A processing system of a source storage unit of a dispersed storage network comprises:
-
at least one processor; a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to; at least one memory section that stores operational instructions that, when executed by a processing system of a dispersed storage network (DSN) that includes a processor and a memory, causes the processing system to; identify a slice name corresponding to a slice to migrate from the source storage unit to a destination storage unit; send the slice to migrate to the destination storage unit; generate a slice verification request and send the slice verification request to the destination storage unit; receive an integrity value from the destination storage unit; determine when the integrity value compares favorably to the slice verification request, by determining when a hash of the slice and nonce matches the integrity value or determining when a decrypted signature of the integrity value matches a hash of the slice and the nonce or the slice and the nonce; when the processing system determines that the integrity value compares favorably to the slice verification request, update a slice name assignment associated with the slice name; and delete the slice from the source storage unit. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification