Detecting intentional corruption of data in a dispersed storage network
First Claim
1. A method for detecting intentional corruption of data in a dispersed storage network (DSN), the method comprises:
- selecting, by a storage unit of the DSN, a selected encoded data slice of a set of encoded data slices for corruption analysis, wherein a data segment of the data was dispersed error encoded to produce the set of encoded data slices, wherein an integrity value was created for each encoded data slice of at least some of the set of encoded data slices to produce a set of integrity values, wherein encoded data slices of the set of encoded data slices and the set of integrity values are stored in a set of storage units, and wherein the set of storage units includes the storage unit;
requesting and receiving, by the storage unit, the set of integrity values from another storage unit of the set of storage units;
comparing, by the storage unit, the received set of integrity values with the set of integrity values that are stored by the storage unit; and
when the comparison of the received set of integrity values with the set of integrity values that are stored by the storage unit is unfavorable, identifying, by the storage unit, the selected encoded data slice as being corrupted.
4 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a dispersed storage (DS) processing module of a DS unit selecting a data slice for corruption analysis and requesting integrity information for the data slice from one or more other DS units of a dispersed storage network. When the one or more requested integrity information is received, the method continues with the DS processing module analyzing the one or more received integrity information and local integrity information of the data slice stored in the DS unit. When the analysis of the one or more received integrity information and the local integrity information of the data slice is unfavorable, the method continues with the DS processing module identifying the data slice as being corrupted.
-
Citations
18 Claims
-
1. A method for detecting intentional corruption of data in a dispersed storage network (DSN), the method comprises:
-
selecting, by a storage unit of the DSN, a selected encoded data slice of a set of encoded data slices for corruption analysis, wherein a data segment of the data was dispersed error encoded to produce the set of encoded data slices, wherein an integrity value was created for each encoded data slice of at least some of the set of encoded data slices to produce a set of integrity values, wherein encoded data slices of the set of encoded data slices and the set of integrity values are stored in a set of storage units, and wherein the set of storage units includes the storage unit; requesting and receiving, by the storage unit, the set of integrity values from another storage unit of the set of storage units; comparing, by the storage unit, the received set of integrity values with the set of integrity values that are stored by the storage unit; and when the comparison of the received set of integrity values with the set of integrity values that are stored by the storage unit is unfavorable, identifying, by the storage unit, the selected encoded data slice as being corrupted. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable storage device comprises:
-
a first memory section that stores operational instructions that, when executed by a storage unit, causes the storage unit to; select a selected encoded data slice of a set of encoded data slices for corruption analysis, wherein a data segment of data was dispersed error encoded to produce the set of encoded data slices, wherein an integrity value was created for each encoded data slice of at least some of the set of encoded data slices to produce a set of integrity values, wherein encoded data slices of the set of encoded data slices and the set of integrity values are stored in a set of storage units, and wherein the set of storage units includes the storage unit; a second memory section that stores operational instructions that, when executed by the storage unit, causes the storage unit to; request and receive the set of integrity values from another storage unit of the set of storage units; and a third memory section that stores operational instructions that, when executed by the storage unit, causes the storage unit to; compare the received set of integrity values with the set of integrity values that are stored by the storage unit; and when the comparison of the received set of integrity values with the set of integrity values that are stored by the storage unit is unfavorable, identify the selected encoded data slice as being corrupted. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A storage unit comprises:
-
an interface; memory; and a processing module operably coupled to the memory and the interface, wherein the processing module is operable to; select a selected encoded data slice of a set of encoded data slices for corruption analysis, wherein a data segment of data was dispersed error encoded to produce the set of encoded data slices, wherein an integrity value was created for each encoded data slice of at least some of the set of encoded data slices to produce a set of integrity values, wherein encoded data slices of the set of encoded data slices and the set of integrity values are stored in a set of storage units, and wherein the set of storage units includes the storage unit; request and receive, via the interface, the set of integrity values from another storage unit of the set of storage units; and compare the received set of integrity values with the set of integrity values that are stored in the memory; and when the comparison of the received set of integrity values with the set of integrity values that are stored in the memory is unfavorable, identify the selected encoded data slice as being corrupted. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification