Hidden proactive replication of data
First Claim
1. In an environment that includes at least one computer system that stores a plurality of replicas of given data, a method for hiding the location of the replicas comprising the following:
- an act of determining a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
an act of securing the relocation module against giving information identifying the target location to any user at least prior to the act of determining;
an act of moving the replica to the target location; and
an act of updating a secure catalog of replica locations to reflect that the target location is associated with the replica.
2 Assignments
0 Petitions
Accused Products
Abstract
Moving replicas in a cryptographically secure manner such that the target location and timing of the movements are completely hidden from any user, or is kept as a secret by a limited number of users who have been given advanced notice of the new location and relocation time for a replica. A catalog of replica locations that describe the current location of the replicas is stored in encrypted form so as to prevent individuals from determining the exact location of the replicas. Since the location of the replicas is hidden at any given moment, attackers may not use the location of the replicas in order to attack all of the replicas at the same time. Accordingly, recovery mechanisms may have an opportunity to recover from any given attack by once again creating replicas from those replicas that had not been attacked.
-
Citations
42 Claims
-
1. In an environment that includes at least one computer system that stores a plurality of replicas of given data, a method for hiding the location of the replicas comprising the following:
-
an act of determining a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
an act of securing the relocation module against giving information identifying the target location to any user at least prior to the act of determining;
an act of moving the replica to the target location; and
an act of updating a secure catalog of replica locations to reflect that the target location is associated with the replica. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer program product for use in an environment that includes at least one computer system that stores a plurality of replicas of given data, the computer program product for implementing a method for hiding the location of the replicas the computer-program product comprising one or more computer-readable-media having stored thereon the following:
-
computer-executable instructions for determining a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
computer-executable instructions for securing the relocation module against giving information identifying the target location to any user at least prior to the act of determining;
computer-executable instructions moving the replica to the target location; and
computer-executable instructions for updating a secure catalog of replica locations to reflect that the target location is associated with the replica. - View Dependent Claims (31)
-
-
32. A computer program product for use in an environment that includes at least one computer system that stores a plurality of replicas of given data, the computer program product for implementing a method for hiding the location of the replicas the computer-program product comprising one or more computer-readable media having stored thereon a relocation module adapted to perform the following:
-
determine a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
abstain from giving information identifying the target location to any user at least prior to the act of determining;
move the replica to the target location; and
update a secure catalog of replica locations to reflect that the target location is associated with the replica. - View Dependent Claims (33)
-
-
34. In an environment that includes at least one computer system that stores a plurality of replicas of given data, a method for hiding the location of the replicas comprising the following:
-
an act of determining a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
an act of securing the relocation module against giving information identifying the target location to any user at least prior to the act of determining;
an act of informing a group of one or more users of an association between the target location and the replica; and
an act of moving the replica to the target location. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A computer program product for use in an environment that includes at least one computer system that stores a plurality of replicas of given data, the computer program product for implementing a method for hiding the location of the replicas, the computer program product comprising one or more computer-readable media having stored thereon the following:
-
computer-executable instructions for determining a target location for a replica to be moved to using a relocation algorithm implemented by a relocation module;
computer-executable instructions for securing the relocation module against giving information identifying the target location to any user at least prior to the act of determining;
computer-executable instructions for informing a group of one or more users of an association between the target location and the replica; and
computer-executable instructions for moving the replica to the target location. - View Dependent Claims (42)
-
Specification