System and Methods for Jurisdiction Independent Data Storage in a Multi-Vendor Cloud Environment
First Claim
1. A cloud based system for providing data security, the system comprising;
- a processor;
said processor creates a source data file;
wherein said source data file is split into at least one fragments;
an encryption key;
said encryption key associated with the at least one fragments; and
wherein the at least one fragments is encrypted by the encryption key;
a plurality of cloud storage providers;
wherein the at least one fragments is distributed among the plurality of cloud storage providers whereby no single cloud storage provider possesses all of the at least one fragments;
a pointer file;
wherein said pointer file is created on a local computer;
wherein said pointer file stores the location of the at least one fragments; and
wherein said pointer file is accessed;
said encryption key authenticates the plurality of cloud storage providers;
the at least one fragments are transferred from the plurality of cloud storage providers to the local computer;
wherein the at least one fragments are reassembled; and
the source data file is deleted.
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud based system for providing data security, the system having a processor which creates a source data file; wherein the source data file is split into at least one fragments; an encryption key associated with the at least one fragments; and wherein the at least one fragments is encrypted by the encryption key; a plurality of cloud storage providers; wherein the at least one fragments is distributed among the plurality of cloud storage providers whereby no single cloud storage provider possesses all of the at least one fragments; a pointer file which is created on a local computer; wherein the pointer file stores the location of the at least one fragments; and wherein the pointer file is accessed; the encryption key authenticates the plurality of cloud storage providers; the at least one fragments are transferred from the plurality of cloud storage providers to the local computer; and wherein the at least one fragments are reassembled; and the source data file is deleted.
3 Citations
13 Claims
-
1. A cloud based system for providing data security, the system comprising;
-
a processor;
said processor creates a source data file;
wherein said source data file is split into at least one fragments;an encryption key;
said encryption key associated with the at least one fragments; and
wherein the at least one fragments is encrypted by the encryption key;a plurality of cloud storage providers;
wherein the at least one fragments is distributed among the plurality of cloud storage providers whereby no single cloud storage provider possesses all of the at least one fragments;a pointer file;
wherein said pointer file is created on a local computer;
wherein said pointer file stores the location of the at least one fragments; and
wherein said pointer file is accessed;
said encryption key authenticates the plurality of cloud storage providers;
the at least one fragments are transferred from the plurality of cloud storage providers to the local computer;
wherein the at least one fragments are reassembled; and
the source data file is deleted. - View Dependent Claims (2, 3, 4, 5, 10, 12)
-
-
6. A computer implemented method for providing data security in a cloud based system, the method comprising:
-
creating via a processor, a source data file; splitting, via a processor said source data file into at least one fragments; associating, via a processor an encryption key with the at least one fragments; encrypting, via a processor the at least one fragments by the encryption key; distributing, via a processor the at least one fragments among a plurality of cloud storage providers;
whereby no single cloud storage provider possesses all of the at least one fragments;creating a pointer file on a local computer;
wherein said pointer file;storing the location of the at least one fragments; accessing said pointer file; authenticating, via a processor the plurality of cloud storage providers by the encryption key; transferring, via a processor;
the at least one fragments from the plurality of cloud storage providers to the local computer;reassembling, via a processor the at least one fragments; and
wherein the source data file is deleted.
-
-
7. A cloud based system for providing data security, the system comprising;
-
a processor;
said processor creates a source data file;
wherein said source data file is split into at least one fragments;an encryption key;
said encryption key created by a first user and associated with the at least one fragments; and
wherein the at least one fragments is encrypted by the encryption key;a plurality of cloud storage providers;
wherein the at least one fragments is distributed among the plurality of cloud storage providers whereby no single cloud storage provider possesses all of the at least one fragments;a pointer file;
wherein said pointer file is created on a first local computer and the source data file is deleted;
wherein said pointer files stores the location of the at least one fragments;and wherein said pointer file and said encryption key is shared with a second user; wherein said pointer file is accessed by the second user on a second local computer; and wherein the second user uses said encryption key to authenticate the plurality of cloud storage providers;
the at least one fragments are transferred from the plurality of cloud storage providers to the second local computer of the second user;
wherein the at least one fragments are reassembled by the second user on the second local computer. - View Dependent Claims (8, 9, 11)
-
-
13. A computer implemented method for providing data security in a cloud based system, the method comprising:
-
creating via a processor, a source data file on a first local computer of a first user; splitting, via a processor said source data file into at least one fragments; wherein the first user is creating an encryption key and Associating, via a processor the encryption key with the at least one fragments; encrypting, via a processor the at least one fragments by the encryption key; distributing, via a processor the at least one fragments among a plurality of cloud storage providers;
whereby no single cloud storage provider possesses all of the at least one fragments;creating a pointer file on the first local computer whereby the source data file is deleted; wherein said pointer file and the encryption is shared by the first user to a second user; and wherein said pointer file stores the location of the at least one fragments; and wherein the second user is accessing said pointer file and using said encryption key to authenticate the plurality of cloud storage provider; and
cause the transferring of the at least one fragments from the plurality of cloud storage providers to a second local computer of the second user; andwherein the at least one fragments are reassembled on the second local computer of the second user.
-
Specification