Managing ownership of redundant data
First Claim
1. A storage system, comprising:
- a first storage tier;
a second storage tier;
a controller configured to;
store instances of a file in the first storage tier and the second storage tier, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier;
associate each instance of the file on the first and second storage tier with a unique program identifier (UPI);
receive a request to access the file or instance thereof from a user in a group of users;
search for a UPI associated with an orphaned instance of the file that exists on the first storage tier; and
provide the user requesting access to the file with remote access to the orphaned instance of the file on the first storage tier,wherein the orphaned instance of the file on the first storage tier was previously disassociated from a second user, and the orphaned instance of the file is identified utilizing a data structure that tracks data ownership of users in the group of users.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, a method includes storing instances of a file in a first storage tier and a second storage tier of a storage system, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier. Each instance of the file on the first and second storage tier is associated with a unique program identifier (UPI). A request to access the file or instance thereof is received from a user in a group of users, and a UPI associated with an instance of the file that exists on the first storage tier is searched for. Remote access to the instance of the file on the first storage tier is provided to the user requesting access to the file. Additional embodiments are also presented.
-
Citations
20 Claims
-
1. A storage system, comprising:
-
a first storage tier; a second storage tier; a controller configured to; store instances of a file in the first storage tier and the second storage tier, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier; associate each instance of the file on the first and second storage tier with a unique program identifier (UPI); receive a request to access the file or instance thereof from a user in a group of users; search for a UPI associated with an orphaned instance of the file that exists on the first storage tier; and provide the user requesting access to the file with remote access to the orphaned instance of the file on the first storage tier, wherein the orphaned instance of the file on the first storage tier was previously disassociated from a second user, and the orphaned instance of the file is identified utilizing a data structure that tracks data ownership of users in the group of users. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
storing instances of a file in a first storage tier and a second storage tier of a storage system, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier; associating each instance of the file on the first and second storage tier with a unique program identifier (UPI); receiving a request to access the file or instance thereof from a user in a group of users; searching for a UPI associated with an orphaned instance of the file that exists on the first storage tier; and providing the user requesting access to the file with remote access to the orphaned instance of the file on the first storage tier; wherein the orphaned instance of the file on the first storage tier was previously disassociated from a second user, and the orphaned instance of the file is identified utilizing a data structure that tracks data ownership of users in the group of users. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product, comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processing circuit to cause the processing circuit to:
-
store, by the processing circuit, instances of a file in a first storage tier and a second storage tier, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier; associate, by the processing circuit, each instance of the file on the first and second storage tier with a unique program identifier (UPI); receive, by the processing circuit, a request to access the file or instance thereof from a user in a group of users; search, by the processing circuit, for a UPI associated with an orphaned instance of the file that exists on the first storage tier; and provide, by the processing circuit, the user requesting access to the file with remote access to the orphaned instance of the file on the first storage tier, wherein the orphaned instance of the file on the first storage tier was previously disassociated from a second user, and the orphaned instance of the file is identified utilizing a data structure that tracks data ownership of users in the group of users. - View Dependent Claims (19, 20)
-
Specification