System for encrypted file storage optimization via differentiated key lengths
First Claim
1. A method for improving storage system efficiency, comprising:
- comparing a plurality of performance parameters of a file with a respective plurality of predetermined values; and
modifying a first key of said file in response to one performance parameter of said plurality of performance parameters not matching a respective one predetermined value, wherein said first key is utilized in a security procedure for said file.
2 Assignments
0 Petitions
Accused Products
Abstract
A key management module is utilized to improve efficiency in cryptographic systems. The key management module may monitor file usage and recommend (and/or implement) key pair changes. In particular, the key management module may be configured to periodically examine (or analyze) performance parameters (e.g., number of times written, number of times read, etc.) associated with a user'"'"'s files. A network monitor module may be configured to gather and maintain records of the associated performance parameters. The key management module may be further configured to compare the performance parameters of a given file with a table of key level ranges. The table of key lengths may be configured to provide a listing of multiple key lengths, each key length corresponding to an activity level of a performance parameter, e.g., relative read/write access frequency. The key management module may recommend changing the relative length of the read and write keys based on the comparison of the performance parameters with the table of key level ranges.
44 Citations
29 Claims
-
1. A method for improving storage system efficiency, comprising:
-
comparing a plurality of performance parameters of a file with a respective plurality of predetermined values; and modifying a first key of said file in response to one performance parameter of said plurality of performance parameters not matching a respective one predetermined value, wherein said first key is utilized in a security procedure for said file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for improving efficiency in a cryptographic system, comprising:
-
comparing a plurality of performance parameters of a file with a respective plurality of predetermined values; altering a length of a first key in response to one performance factor of said plurality of performance parameters of said tile not matching a respective one of predetermined value; and altering a length of a second key in response to said alteration of said first key, wherein said first key and said second key are utilized in a security procedure for said file. - View Dependent Claims (12, 13)
-
-
14. A method for improving efficiency in a cryptographic system, comprising:
-
comparing a plurality of performance parameters of a file with a respective range of plurality of predetermined values; altering a length of a first key in response to one performance factor of said plurality of performance parameters of said file falling outside a respective range of one predetermined value; and altering a length of a second key in response to said alteration of said first key, wherein said first key and said second key are utilized in a security procedure for said file.
-
-
15. A system for improving storage system efficiency, comprising:
-
a file system configured to provide access to a plurality of files; a network monitoring module configured to monitor a plurality of performance factors on said file system; and a key management module, wherein said key management module is configured to compare said plurality of performance factors with a respective plurality of predetermined values, and is also configured to modify a first key of a file stored on said file system in response to one performance factor of said plurality of performance factors not equaling a respective one predetermined value, wherein said first key is utilized in a security procedure for said file on said file system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system for improving storage system efficiency, comprising:
-
a file system configured to provide access to a plurality of files; a network monitoring module configured to monitor a plurality of performance factors of said plurality of files; and a key management module, wherein said key management module is configured to complete said plurality of performance factors with a respective plurality of predetermined values, is also configured to alter a length of a first key in response to said one performance factor of said plurality of performance factors not matching a respective one predetermined value, and is further configured to alter a length of a second key in response to said alteration of said first key, wherein said first key end said second key are utilized in a security procedure for said file stored on said file system. - View Dependent Claims (27, 28)
-
-
29. A system for improving storage system efficiency, comprising:
-
a file system configured to provide access to a plurality of files; a network monitoring module configured to monitor a plurality of performance factors of said plurality of files; and a key management module wherein said key management module is configured to compare said plurality of performance factors with a respective range of plurality of predetermined values, is also configured to alter a length of a first key in response to said one performance factor of said plurality of performance factors falling outside a respective range of one predetermined value, and is further configured to alter a length of a second key in response to said alteration of said first key, wherein said first key and said second key are utilized in a security procedure for said file stored on said file system.
-
Specification