METHODS AND SYSTEMS FOR SELECTIVE ENCRYPTION AND SECURED EXTENT QUOTA MANAGEMENT FOR STORAGE SERVERS IN CLOUD COMPUTING
First Claim
1. A method, comprising:
- associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk;
associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk; and
accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk. The method further includes accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk.
31 Citations
25 Claims
-
1. A method, comprising:
-
associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk; associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk; and accessing the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system implemented in hardware, comprising:
a computer infrastructure operable to; associate a virtual disk to an application on a computing device, the virtual disk associated with at least one encrypting storage disk and at least one non-encrypting storage disk, and used by the application to access of the at least one encrypting storage disk and the at least one-encrypting storage disk; and access one of the at least one encrypting storage disk and the at least one non-encrypting storage disk based on the associating of the virtual disk to the application, to write or read confidential or non-confidential data associated with the application into a respective one of the at least one encrypting storage disk and the at least one non-encrypting storage disk. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
20. A computer program product comprising a computer usable storage medium having readable program code embodied in the storage medium, the computer program product includes at least one component operable to:
-
associate at least one secure storage disk and at least one non-secure storage disk to a virtual disk; associate the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk; and access the at least one secure storage disk and the at least one non-secure storage disk based on the associating of the virtual disk to the application, to write or read confidential and non-confidential data associated with the application into a respective one of the at least one secure storage disk and the at least one non-secure storage disk. - View Dependent Claims (21)
-
-
22. A method of deploying a system for selective encryption and secured extent quota management for storage servers, comprising:
providing a computer infrastructure, being operable to; receive input data; determine whether the received input data is confidential; and send one of an encryption command and a non-encryption command to a storage controller based on whether the received input data is confidential. - View Dependent Claims (23)
-
24. A computer system for selective encryption and secured extent quota management for storage servers, the system comprising:
-
a CPU, a computer readable memory and a computer readable storage media; first program instructions to associate at least one encrypting storage disk and at least one non-encrypting storage disk to a virtual disk; second program instructions to associate the virtual disk to an application on a computing device to allow access of the at least one encrypting storage disk and the at least one non-encrypting storage disk; third program instructions to access the at least one encrypting storage disk based on an encryption command received from the application, to write or read confidential data associated with the application into the at least one encrypting disk; and fourth program instructions to access the at least one non-encrypting storage disk based on a non-encryption command received from the application, to write or read non-confidential data associated with the application into the at least one non-encrypting disk, wherein the first, second, third, and fourth program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (25)
-
Specification