Responding to a maintenance free storage container security threat
First Claim
1. A method for responding to a security threat for a maintenance free storage container, the method comprises:
- identifying a security threat for the maintenance free storage container, wherein the maintenance free storage container allows for multiple storage servers of a plurality of storage servers to be in a failure mode without replacement, wherein a set of the storage servers of the plurality of storage servers stores a set of encoded data slices, wherein a data segment of a data object is dispersed storage error encoded to produce the set of encoded data slices, wherein the data segment is recoverable from a decode threshold number of encoded data slices of the set of encoded data slices, and wherein the security threat is regarding integrity of data stored within the maintenance free storage container;
determining a failure mode level that is indicative of whether one or more of the multiple storage servers are in the failure mode;
selecting a security threat countermeasure based on the security threat and the failure mode level; and
implementing the security threat countermeasure.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for responding to a security threat for a maintenance free storage container begins by a dispersed storage (DS) processing module identifying a security threat for the maintenance free storage container, wherein the maintenance free storage container allows for multiple storage servers of a plurality of storage servers to be in a failure mode without replacement. The method continues with the DS processing module determining a failure mode level that is indicative of whether one or more of the multiple storage servers are in the failure mode. The method continues with the DS processing module selecting a security threat countermeasure based on the security threat and the failure mode level. The method continues with the DS processing module implementing the security threat countermeasure.
82 Citations
14 Claims
-
1. A method for responding to a security threat for a maintenance free storage container, the method comprises:
-
identifying a security threat for the maintenance free storage container, wherein the maintenance free storage container allows for multiple storage servers of a plurality of storage servers to be in a failure mode without replacement, wherein a set of the storage servers of the plurality of storage servers stores a set of encoded data slices, wherein a data segment of a data object is dispersed storage error encoded to produce the set of encoded data slices, wherein the data segment is recoverable from a decode threshold number of encoded data slices of the set of encoded data slices, and wherein the security threat is regarding integrity of data stored within the maintenance free storage container; determining a failure mode level that is indicative of whether one or more of the multiple storage servers are in the failure mode; selecting a security threat countermeasure based on the security threat and the failure mode level; and implementing the security threat countermeasure. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A dispersed storage (DS) module comprises:
-
a first module, when operable within a computing device, causes the computing device to; identify a security threat for a maintenance free storage container, wherein the maintenance free storage container allows for multiple storage servers of a plurality of storage servers to be in a failure mode without replacement, wherein a set of the storage servers of the plurality of storage servers stores a set of encoded data slices, wherein a data segment of a data object is dispersed storage error encoded to produce the set of encoded data slices, wherein the data segment is recoverable from a decode threshold number of encoded data slices of the set of encoded data slices, and wherein the security threat is regarding integrity of data stored within the maintenance free storage container; a second module, when operable within the computing device, causes the computing device to; determine a failure mode level that is indicative of whether one or more of the multiple storage servers are in the failure mode; and a third module, when operable within the computing device, causes the computing device to; select a security threat countermeasure based on the security threat and the failure mode level; and implement the security threat countermeasure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification