×

Techniques using an encryption tier property with application hinting and I/O tagging

  • US 9,684,593 B1
  • Filed: 03/12/2013
  • Issued: 06/20/2017
  • Est. Priority Date: 11/30/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of storing data comprising:

  • issuing a command from a client to a data storage system, said data storage system including a plurality of storage tiers comprising a first storage tier of physical storage devices and a second storage tier of physical storage devices, wherein data stored on any physical storage device of the first storage tier is stored in an encrypted form and data stored on any physical storage device of the second storage tier is not stored in an encrypted form, said command including a hint and specifying a first logical address range of a first logical device, wherein the hint is applied to data stored at the first logical address range of the first logical device and the hint indicates whether data stored at the first logical address range of the first logical device is stored in an encrypted form;

    receiving said command at the data storage system;

    storing first data written by an operation to said first logical device in said first logical address range on one or more physical storage devices of any of said first storage tier and said second storage tier in accordance with said hint; and

    responsive to the hint indicating to store the first data in an encrypted form and the first storage tier having insufficient available storage to store the first data, performing processing including;

    determining whether the first storage tier has had insufficient available storage for storing data written more than a threshold number of times in a time period; and

    responsive to determining the first storage tier has had insufficient available storage for storing data written more than a threshold number of times in the time period, failing the operation to store the first data, and otherwise performing other processing including;

    writing the first data in encrypted form on a physical storage device of the second storage tier; and

    responsive to sufficient storage in the first storage tier being available to store the first data, relocating the first data from the second storage tier to the first storage tier.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×