Efficient storage of encrypted data in a dispersed storage network
First Claim
1. A method comprises:
- obtaining data to store;
determining whether similar data to the data is stored; and
when the similar data is stored;
encrypting the data using an encryption key of the similar data in accordance with an encryption function to produce encrypted data;
compressing the encrypted data in accordance with a compression function to produce compressed data; and
storing the compressed data; and
when the similar data is not stored;
generating a first encryption key based on the data;
encrypting the data using the first encryption key in accordance with the encryption function to produce first encrypted data;
compressing the first encrypted data in accordance with the compression function to produce first compressed data; and
storing the first compressed data.
5 Assignments
0 Petitions
Accused Products
Abstract
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored.
99 Citations
18 Claims
-
1. A method comprises:
-
obtaining data to store; determining whether similar data to the data is stored; and when the similar data is stored; encrypting the data using an encryption key of the similar data in accordance with an encryption function to produce encrypted data; compressing the encrypted data in accordance with a compression function to produce compressed data; and storing the compressed data; and when the similar data is not stored; generating a first encryption key based on the data; encrypting the data using the first encryption key in accordance with the encryption function to produce first encrypted data; compressing the first encrypted data in accordance with the compression function to produce first compressed data; and storing the first compressed data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprises:
-
obtaining data to store; determining whether similar data to the data is stored; and when the similar data is not stored; generating an encryption key to be similar to the data; generating a key reference regarding the encryption key; performing a mathematical function on the data based on the encryption key to produce a data result having a near constant bit pattern; compressing the data result in accordance with a compression function to produce compressed data; storing the compressed data and the key reference in a first storage manner; and storing the encryption key in a second storage manner. - View Dependent Claims (8, 9)
-
-
10. A computer comprises:
-
an interface; and a processing module operable to; obtain data to store; determine whether similar data to the data is stored; and when the similar data is stored; encrypt the data using an encryption key of the similar data in accordance with an encryption function to produce encrypted data; compress the encrypted data in accordance with a compression function to produce compressed data; and store, via the interface, the compressed data; and when the substantially similar data is not stored; generate a first encryption key based on the data; encrypt the data using the first encryption key in accordance with the encryption function to produce first encrypted data; compress the first encrypted data in accordance with the compression function to produce first compressed data; and store, via the interface, the first compressed data. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer comprises:
-
an interface; and a processing module operable to; obtain data to store; determine whether similar data to the data is stored; and when the similar data is not stored; generate an encryption key to be similar to the data; generate a key reference regarding the encryption key; perform a mathematical function on the data based on the encryption key to produce a data result having a near constant bit pattern; compress the data result in accordance with a compression function to produce compressed data; store, via the interface, the compressed data and the key reference in a first storage manner; and store, via the interface, the encryption key in a second storage manner. - View Dependent Claims (17, 18)
-
Specification