Method and apparatus for obfuscating slice names in a dispersed storage system
First Claim
1. A method for execution by a dispersed storage (DS) processing module of a computing device to secure a slice name, the method comprises:
- receiving, by an interface of the computing device, a data segment for dispersed storage;
encoding, by the DS processing module of the computing device, the data segment in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices;
generating, by the DS processing module of the computing device, a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section;
performing, by the DS processing module of the computing device, a securing function on at least the data identification section to produce a secure data identification section; and
replacing, by the DS processing module of the computing device, within the slice name, the data identification section with the secure data identification section to produce a secure slice name.
5 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a processing module receiving a data segment for dispersed storage. The method continues with the processing module encoding the data segment in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices. The method continues with the processing module generating a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section. The method continues with the processing module performing a securing function on at least the data identification section to produce a secure data identification section. The method continues with the processing module replacing, within the slice name, the data identification section with the secure data identification section to produce a secure slice name.
93 Citations
20 Claims
-
1. A method for execution by a dispersed storage (DS) processing module of a computing device to secure a slice name, the method comprises:
-
receiving, by an interface of the computing device, a data segment for dispersed storage; encoding, by the DS processing module of the computing device, the data segment in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices; generating, by the DS processing module of the computing device, a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section; performing, by the DS processing module of the computing device, a securing function on at least the data identification section to produce a secure data identification section; and replacing, by the DS processing module of the computing device, within the slice name, the data identification section with the secure data identification section to produce a secure slice name. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for execution by a dispersed storage (DS) processing module of a computing device, the method comprises:
-
receiving, by an interface of the computing device, an access request to a data segment, wherein the data segment is encoded in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices that are stored in a plurality of DS storage units; generating, by the DS processing module of the computing device, a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section; performing, by the DS processing module of the computing device, a securing function on at least the data identification section to produce a secure data identification section; replacing, by the DS processing module of the computing device, within the slice name, the data identification section with the secure data identification section to produce a secure slice name; and accessing, by the DS processing module of the computing device, the error coded slice based on the secure slice name. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computing device comprises:
-
an interface; memory; and a processor operably coupled to the memory, wherein the processor is operable to; receive, via the interface, a data segment for dispersed storage; encode the data segment in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices; generate a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section; perform a securing function on at least the data identification section to produce a secure data identification section; and replace, within the slice name, the data identification section with the secure data identification section to produce a secure slice name. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computing device comprises:
-
an interface; memory; and a processor coupled to the memory and the interface, wherein the processor is operable to; receive, via the interface, an access request to a data segment, wherein the data segment is encoded in accordance with an error coding dispersed storage function to produce a plurality of error coded data slices that are stored in a plurality of DS storage units; generate a slice name for an error coded data slice of the plurality of error coded data slices, wherein the slice name includes a dispersed storage routing information section and a data identification section; perform a securing function on at least the data identification section to produce a secure data identification section; replace, within the slice name, the data identification section with the secure data identification section to produce a secure slice name; and access, via the interface, the error coded slice based on the secure slice name. - View Dependent Claims (17, 18, 19, 20)
-
Specification