Monitoring files in cloud-based networks
First Claim
1. A method comprising:
- receiving, by a processor at a requesting entity, a request to access a file in a cloud-based network, wherein the request comprises an identifier of the file;
identifying a value in a hash structure at the requesting entity using the identifier of the file as a key into the hash structure, wherein the value comprises an initial link to a candidate storage location of the file in the cloud-based network, and wherein the initial link comprises a first generation number;
following the initial link to the candidate storage location in the cloud-based network, wherein the candidate storage location in the cloud-based network comprises an additional link;
following the additional link to an actual storage location of the file in the cloud-based network to access the file and examine a second generation number associated with the file;
updating the initial link in the value in the hash structure to point to the actual storage location of the file;
comparing the first generation number to the second generation number to determine whether the file has been relocated or modified by an entity other than the requesting entity; and
wherein the first generation number and the second generation number are counters that are incremented as the file is modified or relocated.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments relate to systems and methods for monitoring files in cloud-based networks. In particular, a file managing module can manage the access and retrieval of files stored in cloud-based networks on a distributed basis. In embodiments, the file managing module can receive a file access request from a requesting entity. The file managing module can use the file access request to determine a storage location mapped to a hash structure. Generation numbers associated with the both the storage location and the actual file at the storage location can be compared to determine whether the file has been unexpectedly modified or relocated. The file managing module can sync any discrepancy between the generation numbers and retrieve the file for the requesting entity.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, by a processor at a requesting entity, a request to access a file in a cloud-based network, wherein the request comprises an identifier of the file; identifying a value in a hash structure at the requesting entity using the identifier of the file as a key into the hash structure, wherein the value comprises an initial link to a candidate storage location of the file in the cloud-based network, and wherein the initial link comprises a first generation number; following the initial link to the candidate storage location in the cloud-based network, wherein the candidate storage location in the cloud-based network comprises an additional link; following the additional link to an actual storage location of the file in the cloud-based network to access the file and examine a second generation number associated with the file; updating the initial link in the value in the hash structure to point to the actual storage location of the file; comparing the first generation number to the second generation number to determine whether the file has been relocated or modified by an entity other than the requesting entity; and wherein the first generation number and the second generation number are counters that are incremented as the file is modified or relocated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
an interface, at a requesting entity, to receive a request to access a file in a cloud-based network; and a processor, at the requesting entity, to communicate with the interface to; identify a value in a hash structure at the requesting entity using the identifier of the file as a key into the hash structure, wherein the value comprises an initial link to a candidate storage location of the file in the cloud-based network, and wherein the initial link comprises a first generation number; follow the initial link to the candidate storage location in the cloud-based network, wherein the candidate storage location in the cloud-based network comprises an additional link; follow the additional link to an actual storage location of the file in the cloud-based network to access the file and examine a second generation number associated with the file; update the initial link in the value in the hash structure to point to the actual storage location of the file; compare the first generation number to the second generation number to determine whether the file has been relocated or modified by an entity other than the requesting entity; and wherein the first generation number and the second generation number are counters that are incremented as the file is modified or relocated. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, by the processor at a requesting entity, a request to access a file in a cloud-based network, wherein the request comprises an identifier of the file; identifying a value in a hash structure at the requesting entity using the identifier of the file as a key into the hash structure, wherein the value comprises an initial link to a candidate storage location of the file in the cloud-based network, and wherein the initial link comprises a first generation number; following the initial link to the candidate storage location in the cloud-based network, wherein the candidate storage location in the cloud-based network comprises an additional link; following the additional link to an actual storage location of the file in the cloud-based network to access the file and examine a second generation number associated with the file; updating the initial link in the value in the hash structure to point to the actual storage location of the file; comparing the first generation number to the second generation number to determine whether the file has been relocated or modified by an entity other than the requesting entity; and wherein the first generation number and the second generation number are counters that are incremented as the file is modified or relocated. - View Dependent Claims (18)
-
Specification