Protecting virtual machine data in cloud environments
First Claim
1. A method comprising:
- receiving a request for requested data at an encryption virtual machine, wherein the requested data is encrypted,the encryption virtual machine is configured to receive the request from a plurality of application virtual machines via a plurality of loaders,the requested data comprises one or more operating system modules, andthe operating system modules are configured to be used by the plurality of application virtual machines;
accessing the requested data in a storage volume, whereinthe storage volume is communicatively coupled to the encryption virtual machine,the encryption virtual machine is coupled between the plurality of application virtual machines and the storage volume,the requested data is retrieved from the storage volume, andthe requested data is decrypted at the encryption virtual machine; and
sending the decrypted data to the plurality of loaders.
7 Assignments
0 Petitions
Accused Products
Abstract
Various systems, methods, and processes to protect virtual machine data in a cloud environment are disclosed. A request for requested data is received at an encryption virtual machine. The requested data is encrypted, and the encryption virtual machine is configured to receive the request from an application virtual machine via a loader. The requested data includes one or more operating system modules, and the operating system modules are configured to be used by the application virtual machine. The requested data is accessed in a storage volume, which is communicatively coupled to the encryption virtual machine. The requested data is then retrieved from the storage volume and decrypted at the encryption virtual machine. The decrypted data is then sent to the loader.
71 Citations
20 Claims
-
1. A method comprising:
-
receiving a request for requested data at an encryption virtual machine, wherein the requested data is encrypted, the encryption virtual machine is configured to receive the request from a plurality of application virtual machines via a plurality of loaders, the requested data comprises one or more operating system modules, and the operating system modules are configured to be used by the plurality of application virtual machines; accessing the requested data in a storage volume, wherein the storage volume is communicatively coupled to the encryption virtual machine, the encryption virtual machine is coupled between the plurality of application virtual machines and the storage volume, the requested data is retrieved from the storage volume, and the requested data is decrypted at the encryption virtual machine; and sending the decrypted data to the plurality of loaders. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium comprising program instructions executable to:
-
receive a request for requested data at an encryption virtual machine, wherein the requested data is encrypted, the encryption virtual machine is configured to receive the request from a plurality of application virtual machines via a plurality of loaders, the requested data comprises one or more operating system modules, and the operating system modules are configured to be used by the plurality of application virtual machines; access the requested data in a storage volume, wherein the storage volume is communicatively coupled to the encryption virtual machine, the encryption virtual machine is coupled between the plurality of application virtual machines and the storage volume, the requested data is retrieved from the storage volume, and the requested data is decrypted at the encryption virtual machine; and send the decrypted data to the plurality of loaders. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
one or more hardware processors; and a memory coupled to the one or more hardware processors, wherein the memory stores program instructions executable by the one or more hardware processors to; receive a request for requested data at an encryption virtual machine, wherein the requested data is encrypted, the encryption virtual machine is configured to receive the request from a plurality of application virtual machines via a plurality of loaders, the requested data comprises one or more operating system modules, and the operating system modules are configured to be used by the plurality of application virtual machines; access the requested data in a storage volume, wherein the storage volume is communicatively coupled to the encryption virtual machine, the encryption virtual machine is coupled between the plurality of application virtual machines and the storage volume, the requested data is retrieved from the storage volume, and the requested data is decrypted at the encryption virtual machine; and send the decrypted data to the plurality of loaders. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification