Clustered filesystems for mix of trusted and untrusted nodes
First Claim
Patent Images
1. A method for controlling access to data, the method comprising:
- interconnecting, with a network a plurality of nodes including a server node and a plurality of client nodes;
receiving, via the network, a request to the server node from a first client node of the plurality of client nodes to update an access control list attribute maintained by the server node, each of said plurality of client nodes and the server node being coupled to a storage area network via an independent connection;
sending a message, via the network from the server node to one or more other client nodes of the plurality of client nodes that have a read token of one or more read tokens, wherein the message sent to the one or more other client nodes instructs the one or more other client nodes to release the one or more read tokens, wherein the releasing of the one or more read tokens invalidates information cached at the one or more other client nodes regarding the access control list attribute;
updating the access control list attribute according to the received request;
receiving, at the server node, a request from a second client node of the plurality of client nodes for a current content of an access control list, wherein the current content of the access control list includes the updated access control list attribute; and
providing a read token and the current content of the access control list to the second client node after receiving the request from the second client node, wherein the read token provided to the second client node identifies that the current content of the access control list provided to the second client node is valid.
5 Assignments
0 Petitions
Accused Products
Abstract
A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory access control label as an extended attribute of each filesystem object regardless of whether required by a client node accessing the filesystem object. The mandatory access control label indicates the sensitivity and integrity of the filesystem object and is used by the trusted metadata server(s) to control access to the filesystem object by all client nodes.
-
Citations
20 Claims
-
1. A method for controlling access to data, the method comprising:
-
interconnecting, with a network a plurality of nodes including a server node and a plurality of client nodes; receiving, via the network, a request to the server node from a first client node of the plurality of client nodes to update an access control list attribute maintained by the server node, each of said plurality of client nodes and the server node being coupled to a storage area network via an independent connection; sending a message, via the network from the server node to one or more other client nodes of the plurality of client nodes that have a read token of one or more read tokens, wherein the message sent to the one or more other client nodes instructs the one or more other client nodes to release the one or more read tokens, wherein the releasing of the one or more read tokens invalidates information cached at the one or more other client nodes regarding the access control list attribute; updating the access control list attribute according to the received request; receiving, at the server node, a request from a second client node of the plurality of client nodes for a current content of an access control list, wherein the current content of the access control list includes the updated access control list attribute; and providing a read token and the current content of the access control list to the second client node after receiving the request from the second client node, wherein the read token provided to the second client node identifies that the current content of the access control list provided to the second client node is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10)
-
-
8. A non-transitory computer readable storage medium having embodied thereon a program executable by a processor for implementing a method for controlling access to data, the method comprising:
-
Interconnecting, with a network, a plurality of nodes including a server node and a plurality of client nodes; receiving, via the network, a request to the server node from a first client node of the plurality of client nodes to update an access control list attribute maintained by the server node, each of said plurality of client nodes being coupled to a storage area network via an independent connection; sending a message, via the network, from the server node to one or more other client nodes of the plurality of client nodes that have a read token of one or more read tokens, wherein the message sent to the one or more other client nodes instructs the one or more other client nodes to release the one or more read tokens, wherein the releasing of the one or more read tokens invalidates information cached at the one or more other client nodes regarding the access control list attribute; updating the access control list according to the received request; receiving, at the server node, a request from a second client node of the plurality of client nodes for a current content of an access control list, wherein the current content of the access control list includes the updated access control list attribute; and providing a read token and the current content of the access control list to the second client node after receiving the request from the second client node, wherein the read token provided to the second client node identifies that the current content of the access control list provided to the second client node is valid. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for controlling access to data, the system comprising:
-
a plurality of client nodes interconnected by a communication network and each being coupled to a storage area network via an independent connection, wherein each of the plurality of client nodes includes a processor, a memory, and a network communication interface; and a server communicatively coupled to the plurality of client nodes via the communication network and coupled to the storage area network via an independent connection, wherein the server; receives, via the communication network, a request from a first client node of the plurality of client nodes to update an access control list attribute, sends a message, via the communication network, to one or more other client nodes of the plurality of client nodes that have a read token of one or more read tokens, wherein the message sent to the one or more other client nodes instructs the one or more other client nodes to release the one or more read tokens, wherein the releasing of the one or more read tokens invalidates information cached at the one or more other client nodes regarding the access control list attribute, updates the access control list attribute according to the received request, receives a request from a second client node of the plurality of client nodes for a current content of an access control list, wherein the current content of the access control list includes the updated access control list attribute, and provides a read token and the current content of the access control list to the second client node according to the request from the second client node, wherein the read token provided to the second client node identifies that the current content of the access control list provided to the second client node is valid. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification