Security for multi-tenant deduplication datastore against other tenants
First Claim
1. A method comprising:
- receiving a first user hash value associated with data of a first user of a deduplication system, andcomparing the first user hash value with each of a plurality of hash values stored in a first user hash store of the deduplication system, the plurality of hash values stored in the first user hash store associated with the first user,wherein when it is determined that the first user hash value matches one of the plurality of hash values stored in the first user hash store, sending a first user hash value identifier to the first user, andwherein when it is determined that the first user hash value does not match one of the plurality of hash values stored in the first user hash store,comparing the first user hash value to each of a plurality of hash values stored in a global user hash store of the deduplication system, the plurality of hash values stored in the global hash store associated with a plurality of users, and the plurality of users including the first user,requesting the data associated with the first user hash value from the first user, andreceiving the requested data from the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method comprises receiving a first user hash value associated with data of a first user of a deduplication system, and comparing the first user hash value with each of a plurality of hash values stored in a first user hash store of the deduplication system. When it is determined that the first user hash value does not match one of the plurality of hash values stored in the first user hash store, first user hash value may be compared to each of a plurality of hash values stored in a global user hash store of the deduplication system associated with a plurality of users. When it is determined that the first user hash value matches one of the plurality of hash values stored in the global user hash store, the method may further comprise deleting the data after receiving the data associated with the first user hash value.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving a first user hash value associated with data of a first user of a deduplication system, and comparing the first user hash value with each of a plurality of hash values stored in a first user hash store of the deduplication system, the plurality of hash values stored in the first user hash store associated with the first user, wherein when it is determined that the first user hash value matches one of the plurality of hash values stored in the first user hash store, sending a first user hash value identifier to the first user, and wherein when it is determined that the first user hash value does not match one of the plurality of hash values stored in the first user hash store, comparing the first user hash value to each of a plurality of hash values stored in a global user hash store of the deduplication system, the plurality of hash values stored in the global hash store associated with a plurality of users, and the plurality of users including the first user, requesting the data associated with the first user hash value from the first user, and receiving the requested data from the first user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a hash value receiving device configured to receive a first user hash value associated with data of a first user of a deduplication system, and a first hash value comparing device configured to compare the first user hash value with each of a plurality of hash values stored in a first user hash store of the deduplication system, the plurality of hash values stored in the first user hash store associated with the first user, and wherein when it is determined that the first user hash value does not match one of the plurality of hash values stored in the first user hash store, the system further comprises; a second hash value comparing device configured to compare the first user hash value to each of a plurality of hash values stored in a global user hash store of the deduplication system, the plurality of hash values stored in the global hash store associated with a plurality of users, and the plurality of users including the first user, and a data requesting device configured to request the data associated with the first user hash value from the first user, and a data receiving device configured to receive the data from the first user. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product comprising:
a computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code comprising; computer readable program code configured to receive a first user hash value associated with data of a first user of a deduplication system, and computer readable program code configured to compare the first user hash value with each of a plurality of hash values stored in a first user hash store of the deduplication system, the plurality of hash values stored in the first user hash store associated with the first user, computer readable program code configured to, when it is determined that the first user hash value does not match one of the plurality of hash values stored in the first user hash store; compare the first user hash value to each of a plurality of hash values stored in a global user hash store of the deduplication system, the plurality of hash values stored in the global hash store associated with a plurality of users, and the plurality of users including the first user, request the data associated with the first user hash value from the first user, and receive the data from the first user. - View Dependent Claims (14, 15, 16, 17, 18)
Specification