WEAKLY-CONSISTENT DISTRIBUTED COLLECTION COMPROMISED REPLICA RECOVERY
First Claim
Patent Images
1. A computer implemented method of recovering from a compromise of a replica in a weakly-consistent distributed collection, the method comprising the steps of:
- (a) identifying versions of objects in the collection in a replica data store of the collection created by the compromised replica;
(b) identifying versions in the replica data store of the collection that were influenced by the compromised replica; and
(c) expunging the versions from the replica data store identified in said step (a) and said step (b).
2 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed for recovery from a compromise of a replica in a weakly-consistent distributed collection. The system employs a collection manager for revoking a compromised replica, and one or more archival replicas for storing time-stamped versions. Upon a compromise, versions tainted by the compromised replica may be expunged from the collection. Thereafter, versions determined to be unaffected by the compromise may be returned to the collection using the time-stamped versions stored in the one or more archival replicas.
72 Citations
20 Claims
-
1. A computer implemented method of recovering from a compromise of a replica in a weakly-consistent distributed collection, the method comprising the steps of:
-
(a) identifying versions of objects in the collection in a replica data store of the collection created by the compromised replica; (b) identifying versions in the replica data store of the collection that were influenced by the compromised replica; and (c) expunging the versions from the replica data store identified in said step (a) and said step (b). - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method of recovering from a compromise of a replica indicated to have occurred at a time t in a weakly-consistent distributed collection, the method comprising the steps of:
-
(a) expunging all versions that were tainted by the compromised replica from a data store of a replica; and (b) restoring a version that was expunged in said step (a) to the data store where the expunged version was not influenced by the compromised replica at or after time t. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for recovering from a compromise of a replica of a plurality of replicas in a weakly-consistent distributed collection, comprising:
-
a collection manager for establishing authorization policy to control sharing of versions between the plurality of replicas; and an archival replica in the plurality of replicas, the archival replica including a data store and an archive of versions admitted into the data store together with a time stamp of when the versions were admitted to the data store. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification