Anonymous peer storage
First Claim
1. A computer-implemented method for distributed storage, the method comprising:
- invoking an action of backing up one or more files utilizing distributed storage for a user at a node Ni in a multi-node network;
allocating to the user an amount of storage space in the distributed storage in proportion to how much local storage space the user provides to the distributed storage for other users;
encrypting the one or more files into a combined encrypted file with a private key required to decrypt the combined encrypted file;
splitting the combined encrypted file into Pi portions (P1, P2 . . . Pn) and associating a file identifier Fi to each Pi;
anonymously distributing the Pi portions and associated identifier Fi to other nodes Nj and Nk wherein each of j and k is different from i, and wherein the anonymously distributing includes distributing a given Pi portion to more than one node such that there is redundancy of storage, and wherein nodes Nj and Nk do not have knowledge of how many data portions of the encrypted file exist, and wherein nodes Nj and Nk do not have knowledge of any other storage node sharing a common data set, and wherein nodes Nj and Nk do not have knowledge of other storage nodes communicating with the user;
retaining a look up file containing for the each Pi, the (Nj, Nk) pairs, the Fi, and the private key for future retrieval and decryption;
purging Pi portions that are stale or no longer of interest; and
responsive to receiving an anonymous request containing the Fi by one of the Nj and the Nk, returning the Pi.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for anonymous peer storage. In one example, techniques include invoking an action of backing up one or more files utilizing distributed storage for a node Ni in a multi-node network; encrypting the one or more files into a combined encrypted file with a private key required to decrypt the combined encrypted file; splitting the combined encrypted file into Pi portions (P1, P2 . . . Pn) and associating a file identifier Fi to each Pi; anonymously distributing the Pi portions and associated identifier Fi to other nodes Nj and Nk wherein each of j and k is different from i; retaining a look up file containing for the each Pi, the (Nj, Nk) pairs, the Fi, and the private key for future retrieval and decryption; and responsive to receiving an anonymous request containing the Fi by one of the Nj and the Nk, returning the Pi.
7 Citations
12 Claims
-
1. A computer-implemented method for distributed storage, the method comprising:
-
invoking an action of backing up one or more files utilizing distributed storage for a user at a node Ni in a multi-node network; allocating to the user an amount of storage space in the distributed storage in proportion to how much local storage space the user provides to the distributed storage for other users; encrypting the one or more files into a combined encrypted file with a private key required to decrypt the combined encrypted file; splitting the combined encrypted file into Pi portions (P1, P2 . . . Pn) and associating a file identifier Fi to each Pi; anonymously distributing the Pi portions and associated identifier Fi to other nodes Nj and Nk wherein each of j and k is different from i, and wherein the anonymously distributing includes distributing a given Pi portion to more than one node such that there is redundancy of storage, and wherein nodes Nj and Nk do not have knowledge of how many data portions of the encrypted file exist, and wherein nodes Nj and Nk do not have knowledge of any other storage node sharing a common data set, and wherein nodes Nj and Nk do not have knowledge of other storage nodes communicating with the user; retaining a look up file containing for the each Pi, the (Nj, Nk) pairs, the Fi, and the private key for future retrieval and decryption; purging Pi portions that are stale or no longer of interest; and responsive to receiving an anonymous request containing the Fi by one of the Nj and the Nk, returning the Pi. - View Dependent Claims (2, 3, 4)
-
-
5. A computer system comprising:
-
one or more processors, one or more computer-readable memories, and one or more computer-readable, tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories to; invoke an action of backing up one or more files utilizing distributed storage for a user at a node Ni in a multi-node network; allocate to the user an amount of storage space in the distributed storage in proportion to how much local storage space the user provides to the distributed storage for other users; encrypt the one or more files into a combined encrypted file with a private key required to decrypt the combined encrypted file;
split the combined encrypted file into Pi portions (P1, P2 . . . Pn) and associating a file identifier Fi to each Pi;anonymously distribute the Pi portions and associated identifier Fi to other nodes Nj and Nk wherein each of j and k is different from i, and wherein the anonymously distribution includes distribute a given Pi portion to more than one node such that there is redundancy of storage; retain a look up file containing for the each Pi, the (Nj, Nk) pairs, the Fi, and the private key for future retrieval and decryption; purge Pi portions that are stale or no longer of interest; and responsive to receiving an anonymous request containing the Fi by one of the Nj and the Nk, return the Pi. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product comprising a computer-readable storage medium having program code embodied therewith, the program code executable by a computing device to:
-
invoke an action of backing up one or more files utilizing distributed storage for a user at a node Ni in a multi-node network; allocate to the user an amount of storage space in the distributed storage in proportion to how much local storage space the user provides to the distributed storage for other users; encrypt the one or more files into a combined encrypted file with a private key required to decrypt the combined encrypted file; split the combined encrypted file into Pi portions (P1, P2 . . . Pn) and associating a file identifier Fi to each Pi; anonymously distributing the Pi portions and associated identifier Fi to other nodes Nj and Nk wherein each of j and k is different from i, and wherein the anonymously distributing includes distributing a given Pi portion to more than one node such that there is redundancy of storage; retain a look up file containing for the each Pi, the (Nj, Nk) pairs, the Fi, and the private key for future retrieval and decryption; purge Pi portions that are stale or no longer of interest; and responsive to receiving an anonymous request containing the Fi by one of the Nj and the Nk, return the Pi. - View Dependent Claims (10, 11, 12)
-
Specification