Data backup and transfer across multiple cloud computing providers
First Claim
1. A system, comprising:
- one or more processors; and
memory including a plurality of computer-executable instructions that are executable by the one or more processors to perform a plurality of actions, the plurality of actions comprising;
dividing a data file into multiple data portions for storage at multiple cloud computing providers;
configuring software infrastructure components of the multiple cloud computing providers to store the data portions of the data file;
storing the data portions at different cloud computing providers of the multiple cloud computing providers;
determining a current or imminent security breach exists with respect to a target one of the data portions stored at a first cloud computing provider of the multiple cloud computing providers, the current or imminent security breach including an unauthorized or undesired access to the target data portion; and
initiating a transfer of the target data portion to an existing second cloud computing provider of the multiple cloud computing providers or a new cloud computing provider,wherein the configuring includes;
receiving an infrastructure component specification that specifies common software infrastructure components of multiple cloud computing providers that are to store the data portions of the data file;
identifying software infrastructure components of a cloud computing provider that is to store a data portion of the data file via a virtual machine (VM);
determining one or more software infrastructure components that are missing from the cloud computing provider;
generating configuration data that causes a VM configuration utility to provision the VM to be created by the cloud computing provider with the one or more missing software infrastructure components at a runtime of the VM;
sending the configuration data and a command to activate creation of the VM on a cloud of the cloud computing provider to the VM configuration utility; and
initiating storage of the data portion in the VM in response to the VM configuration utility causing the cloud computing provider to create the VM and provisioning the VM with the one or more missing software infrastructure components from another cloud computing provider.
3 Assignments
0 Petitions
Accused Products
Abstract
Data may be stored across the clouds of multiple cloud computing providers to improve data security. Software infrastructure components of an original cloud computing provider storing data via a first virtual machine (VM) may be identified. Software infrastructure components of an alternative cloud computing provider that is to store the data via a second VM may also be identified. A comparison is performed to determine components missing from the alternative cloud computing provider. Accordingly, configuration data may be created to cause a VM configuration utility to provision the second virtual machine with the missing components at a runtime of the second virtual machine. The configuration data and a command to activate creation of the second virtual machine on a cloud of the alternative cloud computing provider is sent to the VM configuration utility. Subsequently, a backup or a transfer of the data from the first virtual machine to the second virtual machine may be initiated.
133 Citations
19 Claims
-
1. A system, comprising:
-
one or more processors; and memory including a plurality of computer-executable instructions that are executable by the one or more processors to perform a plurality of actions, the plurality of actions comprising; dividing a data file into multiple data portions for storage at multiple cloud computing providers; configuring software infrastructure components of the multiple cloud computing providers to store the data portions of the data file; storing the data portions at different cloud computing providers of the multiple cloud computing providers; determining a current or imminent security breach exists with respect to a target one of the data portions stored at a first cloud computing provider of the multiple cloud computing providers, the current or imminent security breach including an unauthorized or undesired access to the target data portion; and initiating a transfer of the target data portion to an existing second cloud computing provider of the multiple cloud computing providers or a new cloud computing provider, wherein the configuring includes; receiving an infrastructure component specification that specifies common software infrastructure components of multiple cloud computing providers that are to store the data portions of the data file; identifying software infrastructure components of a cloud computing provider that is to store a data portion of the data file via a virtual machine (VM); determining one or more software infrastructure components that are missing from the cloud computing provider; generating configuration data that causes a VM configuration utility to provision the VM to be created by the cloud computing provider with the one or more missing software infrastructure components at a runtime of the VM; sending the configuration data and a command to activate creation of the VM on a cloud of the cloud computing provider to the VM configuration utility; and initiating storage of the data portion in the VM in response to the VM configuration utility causing the cloud computing provider to create the VM and provisioning the VM with the one or more missing software infrastructure components from another cloud computing provider. - View Dependent Claims (2)
-
-
3. One or more non-transitory computer-readable media storing computer-executable instructions that upon execution cause one or more processors to perform acts comprising:
-
identifying software infrastructure components of an original cloud computing provider that is currently storing data via a first virtual machine (VM); identifying software infrastructure components of an alternative cloud computing provider that is to store at least one portion of the data via a second VM, the second VM to be created by the alternative cloud computing provider; determining one or more software infrastructure components that are missing from the alternative cloud computing provider; generating configuration data that causes a VM configuration utility to provision the second VM to be created by the alternative cloud computing provider with the one or more missing software infrastructure components at a runtime of the second VM; sending the configuration data and a command to activate creation of the second VM on a cloud of the alternative cloud computing provider to the VM configuration utility; and initiating a backup or a transfer of at least one portion of the data from the first VM to the second VM in response to the VM configuration utility causing the alternative cloud computing provider to create the second VM and provisioning the second VM with the one or more missing software infrastructure components. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
identifying software infrastructure components of an original cloud computing provider that is currently storing data via a first virtual machine (VM), the data including at least one of one or more data assets that are captured by a user device or metadata that is associated with the one or more data assets; identifying software infrastructure components of an alternative cloud computing provider that is to store at least one portion of the data via a second VM, the second VM to be created by the alternative cloud computing provider; determining one or more software infrastructure components that are missing from the alternative cloud computing provider; generating configuration data that causes a VM configuration utility to provision the second VM to be created by the alternative cloud computing provider with the one or more missing software infrastructure components at a runtime of the second VM; sending the configuration data and a command to activate creation of the second VM on a cloud of the alternative cloud computing provider to the VM configuration utility; and initiating a backup or a transfer of at least one portion of the data from the first VM to the second VM in response to the VM configuration utility causing the alternative cloud computing provider to create the second VM and provisioning the second VM with the one or more missing software infrastructure components from a third-party provider. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification