Reducing data loss in a computing storage environment
First Claim
Patent Images
1. A method for reducing data loss by a processor device in a computing storage environment, the method comprising:
- prioritizing a plurality of data blocks for creating an N number of additional secondary copies of data using a plurality of factors representing a vulnerability factor for each one of the plurality of data blocks for identifying those of the plurality of data blocks having a probability of failure, wherein the plurality of data blocks includes at least a primary copy and a secondary copy of the data;
comparing the vulnerability factor for one of the plurality of data blocks with the vulnerability factor of at least one alternative one of the plurality of data blocks and allocating resources to either the one of the plurality of data blocks or the at least one alternative one of the plurality of data blocks that has a greater vulnerability factor based on the comparison;
computing the vulnerability factor for each one of the plurality of data blocks;
using the vulnerability factor for determining whether the N number of the additional secondary copies are to be created;
creating a list of the plurality of data blocks;
adding to the list of the plurality of data blocks an N number of additional data blocks having free space for creating the N number of the additional secondary copies for those of the plurality of data blocks having the probability of failure; and
removing one of the primary copy, the secondary copy, and the N number of the additional secondary copies from one of the plurality of data blocks in the list if the one of the primary copy, the secondary copy, and the N number of the additional secondary copies has failed.
1 Assignment
0 Petitions
Accused Products
Abstract
For reducing data loss by a processor device in a computing storage environment, data blocks are prioritized for creating an N number of additional secondary copies of data using a vulnerability factor for identifying those of the data blocks having a probability of failure. The data blocks include at least a primary copy and a secondary copy of the data.
10 Citations
33 Claims
-
1. A method for reducing data loss by a processor device in a computing storage environment, the method comprising:
-
prioritizing a plurality of data blocks for creating an N number of additional secondary copies of data using a plurality of factors representing a vulnerability factor for each one of the plurality of data blocks for identifying those of the plurality of data blocks having a probability of failure, wherein the plurality of data blocks includes at least a primary copy and a secondary copy of the data; comparing the vulnerability factor for one of the plurality of data blocks with the vulnerability factor of at least one alternative one of the plurality of data blocks and allocating resources to either the one of the plurality of data blocks or the at least one alternative one of the plurality of data blocks that has a greater vulnerability factor based on the comparison; computing the vulnerability factor for each one of the plurality of data blocks; using the vulnerability factor for determining whether the N number of the additional secondary copies are to be created; creating a list of the plurality of data blocks; adding to the list of the plurality of data blocks an N number of additional data blocks having free space for creating the N number of the additional secondary copies for those of the plurality of data blocks having the probability of failure; and removing one of the primary copy, the secondary copy, and the N number of the additional secondary copies from one of the plurality of data blocks in the list if the one of the primary copy, the secondary copy, and the N number of the additional secondary copies has failed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for reducing data loss in a computing storage environment, the system comprising:
at least one processor device operable in the computing storage environment, wherein the at least one processor device; prioritizes a plurality of data blocks for creating an N number of additional secondary copies of data using a plurality of factors representing a vulnerability factor for each one of the plurality of data blocks for identifying those of the plurality of data blocks having a probability of failure, wherein the plurality of data blocks includes at least a primary copy and a secondary copy of the data, compares the vulnerability factor for one of the plurality of data blocks with the vulnerability factor of at least one alternative one of the plurality of data blocks and allocating resources to either the one of the plurality of data blocks or the at least one alternative one of the plurality of data blocks that has a greater vulnerability factor based on the comparison, computes the vulnerability factor for each one of the plurality of data blocks; uses the vulnerability factor for determining whether the N number of the additional secondary copies are to be created, creates a list of the plurality of data blocks, adds to the list of the plurality of data blocks an N number of additional data blocks having free space for creating the N number of the additional secondary copies for those of the plurality of data blocks having the probability of failure, and removes one of the primary copy, the secondary copy, and the N number of the additional secondary copies from one of the plurality of data blocks in the list if the one of the primary copy, the secondary copy, and the N number of the additional secondary copies has failed. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
23. A computer program product for reducing data loss in a computing storage environment by a processor device, the computer program product comprising a non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
a first executable portion prioritizes a plurality of data blocks for creating an N number of additional secondary copies of data using a plurality of factors representing a vulnerability factor for each one of the plurality of data blocks for identifying those of the plurality of data blocks having a probability of failure, wherein the plurality of data blocks includes at least a primary copy and a secondary copy of the data; compares the vulnerability factor for one of the plurality of data blocks with the vulnerability factor of at least one alternative one of the plurality of data blocks and allocating resources to either the one of the plurality of data blocks or the at least one alternative one of the plurality of data blocks that has a greater vulnerability factor based on the comparison; computes the vulnerability factor for each one of the plurality of data blocks; uses the vulnerability factor for determining whether the N number of the additional secondary copies are to be created; creates a list of the plurality of data blocks; adds to the list of the plurality of data blocks an N number of additional data blocks having free space for creating the N number of the additional secondary copies for those of the plurality of data blocks having the probability of failure; and removes one of the primary copy, the secondary copy, and the N number of the additional secondary copies from one of the plurality of data blocks in the list if the one of the primary copy, the secondary copy, and the N number of the additional secondary copies has failed. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification