Archival data identification
First Claim
1. A computer-implemented method, comprising:
- under the control of one or more computer systems configured with executable instructions,receiving, from a requesting entity, a data store request to store a data object;
storing the data object at a transient data store;
prior to storing the data object in a non-transient data storage location, providing, to the requesting entity, a data object identifier for the data object, the data object identifier encoding at least storage location information used to indicate the non-transient data storage location, payload validation information, and policy information;
storing the data object in the non-transient data storage location;
receiving a data retrieval request to retrieve the data object, the data retrieval request specifying the data object identifier;
decoding the data object identifier to obtain at least the storage location information, the payload validation information, and the policy information;
validating the data retrieval request using at least the policy information;
retrieving the data object as a retrieved data object from the non-transient data storage location using at least the storage location information;
validating integrity of the retrieved data object using at least the payload validation information; and
providing the retrieved data object.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided herein that facilitate cost-effective and reliable data identification in an archival data storage system. In an embodiment, a data object stored in an archival data storage system is identified by a data object identifier which encodes storage location information that may be used to locate a data object stored in an archival data storage system that reduces the cost to store a global index. The data object identifier may also encode policy information such as access control information usable for validating subsequent access to the data object, payload validation information such as size and digest usable for verifying the integrity of the payload data, metadata validation information such as error-detection codes usable for validating integrity of the data object identifier and other information.
175 Citations
26 Claims
-
1. A computer-implemented method, comprising:
under the control of one or more computer systems configured with executable instructions, receiving, from a requesting entity, a data store request to store a data object; storing the data object at a transient data store; prior to storing the data object in a non-transient data storage location, providing, to the requesting entity, a data object identifier for the data object, the data object identifier encoding at least storage location information used to indicate the non-transient data storage location, payload validation information, and policy information; storing the data object in the non-transient data storage location; receiving a data retrieval request to retrieve the data object, the data retrieval request specifying the data object identifier; decoding the data object identifier to obtain at least the storage location information, the payload validation information, and the policy information; validating the data retrieval request using at least the policy information; retrieving the data object as a retrieved data object from the non-transient data storage location using at least the storage location information; validating integrity of the retrieved data object using at least the payload validation information; and providing the retrieved data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. An archival data storage system, comprising:
-
one or more processors; and memory, including instructions executable by the one or more processors to cause a computer system to at least; receive, from a requesting entity, a data store request to store a data object; store the data object at a transient data store; prior to storing the data object in a non-transient data storage location, provide, to the requesting entity, a data object identifier for the data object, the data object identifier encoding at least storage location information used to indicate the non-transient data storage location, payload validation information, and policy information; store the data object in the non-transient data storage location; receive a data retrieval request to retrieve the data object, the data retrieval request specifying the data object identifier; decode the data object identifier to obtain at least the storage location information, the payload validation information, and the policy information; validate the data retrieval request using at least the policy information; retrieve the data object as a retrieved data object from the non-transient data storage location using at least the storage location information; validate integrity of the retrieved data object using at least the payload validation information; and provide the retrieved data object. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. One or more non-transitory computer-readable storage media having collectively stored thereon executable instructions that, when executed by one or more processors of a computing resource provider'"'"'s computer system, cause the computer system to at least:
-
receive, from a requesting entity, a data store request to store a data object; store the data object at a transient data store; prior to storing the data object in a non-transient data storage location, provide, to the requesting entity, a data object identifier for the data object, the data object identifier encoding at least storage location information used to indicate the non-transient data storage location, payload validation information, and policy information; store the data object in the non-transient data storage location; receive a data retrieval request to retrieve the data object, the data retrieval request specifying the data object identifier; decode the data object identifier to obtain at least the storage location information, the payload validation information, and the policy information; validate the data retrieval request using at least the policy information; retrieve the data object as a retrieved data object from the non-transient data storage location using at least the storage location information; validate integrity of the retrieved data object using at least the payload validation information; and provide the retrieved data object. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification