System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
First Claim
1. A computer-implemented method, to be performed by at least one hardware processor, for storing data for a user in hardware storage devices, the method comprising:
- when storing data for the user;
receiving an encryption key associated with the data for the user;
causing the data to be encrypted for the user with the received encryption key to create encrypted data;
causing the encrypted data to be stored in a first hardware storage device associated with a third party;
causing the encryption key to be encrypted to create an encrypted encryption key,wherein a password or other information set by the user is required to decrypt the encrypted encryption key; and
causing the encrypted encryption key to be stored in a second hardware storage device,wherein the encrypted encryption key is accessible to allow the encrypted data stored in the first hardware storage device to be restored during a subsequent restore operation,wherein the password or other information for decrypting the encrypted encryption key is set by the user without knowledge of the third party, andwherein the third party is unable to decrypt the encrypted data stored in the first hardware storage device without first receiving the password or other information from the user.
3 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored are written into data chunks. The method includes generating an encryption key associated with a first archive file to be stored when encryption is requested for the storage operation, encrypting the archive data from the data stream using the encryption key to create an encrypted data chunk when a data stream containing the archive file is processed in the pipeline storage system, storing the encrypted data chunk on a storage medium, and storing the encryption key in a manner accessible during a restore operation of the encrypted data chunk.
-
Citations
16 Claims
-
1. A computer-implemented method, to be performed by at least one hardware processor, for storing data for a user in hardware storage devices, the method comprising:
when storing data for the user; receiving an encryption key associated with the data for the user; causing the data to be encrypted for the user with the received encryption key to create encrypted data; causing the encrypted data to be stored in a first hardware storage device associated with a third party; causing the encryption key to be encrypted to create an encrypted encryption key, wherein a password or other information set by the user is required to decrypt the encrypted encryption key; and causing the encrypted encryption key to be stored in a second hardware storage device, wherein the encrypted encryption key is accessible to allow the encrypted data stored in the first hardware storage device to be restored during a subsequent restore operation, wherein the password or other information for decrypting the encrypted encryption key is set by the user without knowledge of the third party, and wherein the third party is unable to decrypt the encrypted data stored in the first hardware storage device without first receiving the password or other information from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A storage management system for storing data for a user, the system comprising:
-
means for receiving an encryption key associated with data for the user; means for causing the data belonging to the user to be encrypted with the received encryption key to create encrypted data; means for causing the encrypted data to be stored in a data center associated with a third party; means for causing the encryption key to be encrypted to create an encrypted encryption key such that a password or other information set by the user is required to decrypt the encrypted encryption key; and means for causing the encrypted encryption key to be stored such that the encrypted encryption key is accessible to allow the encrypted data stored in the data center to be restored during a subsequent restore operation, wherein the system is configured such that the password or other information for decrypting the encrypted encryption key is set by the user without knowledge of the third party, and wherein the third party is unable to decrypt the encrypted data stored in the data center without receiving the password or other information from the user. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having instructions which, when executed by a processor of a data storage system, cause the data storage system to perform a method for storing data for a user, the method comprising:
-
receiving an encryption key associated with data for the user; causing the data belonging to the user to be encrypted using the received encryption key to create encrypted data; causing the encrypted data to be stored in a data center associated with a third party; causing the encryption key to be encrypted to create an encrypted encryption key, wherein a password or other information set by the user is required to decrypt the encrypted encryption key; and causing the encrypted encryption key to be stored, wherein the encrypted encryption key is accessible to allow the encrypted data stored in the data center to be restored during a subsequent restore operation, wherein the password or other information for decrypting the encrypted encryption key is set by the user without knowledge by the third party, and wherein the third party is unable to decrypt the encrypted data stored in the data center without first receiving the password or other information from the user. - View Dependent Claims (16)
-
Specification