Tenant driven security in a storage cloud
First Claim
Patent Images
1. A method, comprising:
- determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider;
allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot, wherein the access to the hard disk occurs at a physical layer and includes translating a virtual address, received from a tool layer, into a physical address, wherein;
the virtual address is stored in libraries in the tool layer;
the physical address includes at least one of a surface, track, and sensor associated with the hard disk, andthe physical address provides access to data in the hard disk; and
sending the data to class loaders in the tool layer, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders.
1 Assignment
0 Petitions
Accused Products
Abstract
Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider. The method further includes allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot.
15 Citations
22 Claims
-
1. A method, comprising:
-
determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider; allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot, wherein the access to the hard disk occurs at a physical layer and includes translating a virtual address, received from a tool layer, into a physical address, wherein; the virtual address is stored in libraries in the tool layer; the physical address includes at least one of a surface, track, and sensor associated with the hard disk, and the physical address provides access to data in the hard disk; and sending the data to class loaders in the tool layer, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system implemented in hardware, comprising:
-
a computer infrastructure operable to; deny a tenant access to a hard disk provided by a service provider before sensing that the tenant has placed a physical key into a slot associated with the hard disk; sense that the tenant has placed the physical key into the slot; allow the tenant to have access to the hard disk after the physical key has been sensed in the slot, wherein the access to the hard disk occurs at a physical layer and includes translating a virtual address into a physical address associated with a location within the hard disk, wherein; the virtual address is stored in libraries in the tool layer; the physical address includes at least one of a surface, track, and sensor associated with the hard disk, and the physical address provides access to data in the hard disk; and sending the data to class loaders in the tool layer, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a tangible computer usable storage device or memory having readable program code embodied in the tangible computer usable storage device or memory, the computer program product includes at least one component operable to:
-
determine that a tenant has placed a physical key into a slot associated with a hard disk serviced by a service provider; allow the tenant access to the hard disk after determining that the tenant has placed the physical key into the slot, wherein the access to the hard disk includes translating virtual addresses into physical addresses associated with a location within the hard disk, wherein; the virtual address is stored in libraries in the tool layer; the physical address includes at least one of a surface, track, and sensor associated with the hard disk, and the physical address provides access to data in the hard disk; and send the data to class loaders in the tool layer, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders. - View Dependent Claims (19)
-
-
20. A method of tenant drive security, comprising:
-
providing a computer infrastructure being operable to; provide a tenant using a service with access to a hard disk, a personalized physical key, and a key hook substrate associated with the hard disk; generate, in a physical layer, a unique key once the physical key is placed into a slot of the key hook substrate; deny, by default, access to the hard disk until the physical key is placed into the slot; send the unique key to a hard disk controller; and set a flag to complied in relevant sectors of the hard disk to allow access to the hard disk, wherein the access includes translating a virtual address, received from libraries in a tool layer, into a physical address, wherein; the virtual address is stored in the libraries in the tool layer; the physical address includes at least one of a surface, track, and sensor associated with the hard disk, and the physical address provides access to data in the hard disk; and sending the data to class loaders in the tool layer, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders. - View Dependent Claims (21)
-
-
22. A computer system for tenant driven security, the system comprising:
-
a CPU, a computer readable memory and a tangible computer readable storage media; first program instructions to provide a tenant using a service with access to a hard disk, a personalized physical key, and a key hook substrate associated with the hard disk; second program instructions to generate a unique key once the physical key is placed into a slot of the key hook substrate; third program instructions to deny, by default, access to the hard disk until the physical key is placed into the slot; fourth program instructions to send the unique key to a hard disk controller; fifth program instructions to set a flag to complied in relevant sectors of the hard disk to allow access, wherein the flag is initially set to non-complied to indicate that access to the hard disk is not allowed; sixth program instructions to set the flag to complied based on the generated soft key, to indicate that access to the hard disk is allowed, wherein; the access to the hard disk occurs at a physical layer and includes translating a virtual address, received from a tool layer, into a physical address; the virtual address is stored in libraries in the tool layer;
the physical address includes at least one of a surface, track, and sensor associated with the hard disk, andthe physical address provides access to data in the hard disk; and
seventh program instructions to send the data to class loaders in the tool area, wherein the class loaders create instances in byte memories including the data, and wherein different services located in the tool layer access the byte memories from the class loaders, andwherein the first, second, third, fourth, fifth, sixth, and seventh program instructions are stored on the tangible computer readable storage media for execution by the CPU via the computer readable memory.
-
Specification