-
151.
公开(公告)号:US20200228530A1
公开(公告)日:2020-07-16
申请号:US16249791
申请日:2019-01-16
Applicant: EMC IP Holding Company LLC
Inventor: David Zlotnick , Assaf Natanzon
Abstract: One example method includes receiving, at a blockchain node of an auditing cloud service, information associated with one or more data management transactions, registering, at the blockchain node, the information received concerning the data management transactions, receiving, by the cloud auditing service, a request for access to the information registered at the blockchain node, and, enabling, by the cloud auditing service, access to the requested information.
-
公开(公告)号:US10713221B2
公开(公告)日:2020-07-14
申请号:US16048763
申请日:2018-07-30
Applicant: EMC IP Holding Company LLC
Inventor: Zvi Schneider , Amitai Alkalay , Assaf Natanzon
IPC: G06F17/00 , G06F16/174 , G06F16/13
Abstract: An aspect of dual layer deduplication for a file system running over a deduplication block storage system includes accessing a file by a file system driver of the file system. The file is stored as one of a plurality of files in the file system. A further aspect includes breaking the file down into multiple blocks and generating chunks from the blocks. For at least one of the chunks, a trail of zeros is added until a size of a respective one of the chunks is a multiple of a block size of the deduplication block storage system.
-
公开(公告)号:US20200119911A1
公开(公告)日:2020-04-16
申请号:US16158689
申请日:2018-10-12
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Assaf Natanzon
Abstract: A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and migration of encrypted data between storage systems that support deduplication. More specifically, a first encrypted data, which may have been encrypted using a first public cryptographic key and consolidated on a source storage system, may be translated into an interim (yet still encrypted) state using a first split private cryptographic key. Thereafter, using a compound conversion key, the interim state data may be further translated into a second encrypted data, which may be characterized as being encrypted by a second public cryptographic key. Therefore, substantively, the method and system disclosed herein may be directed to the translation of encrypted data from one encryption scheme to another while in-flight from a source storage system to a target storage system.
-
公开(公告)号:US20200110667A1
公开(公告)日:2020-04-09
申请号:US16155789
申请日:2018-10-09
Applicant: EMC IP Holding Company LLC
Inventor: Luay Al-Alem , Antony Bett , Assaf Natanzon , Michael Rhodes
IPC: G06F11/14
Abstract: One example method includes receiving an indication that an application has experienced a problem, where the application comprises a plurality of microservices, discovering that one of the microservices is a partial cause of the problem, identifying one or more connections among the microservices, where one or more of the connections indicates a dependency, or lack of dependency, among two or more microservices, and restoring the microservice that is a partial cause of the problem, and also restoring any other microservices that are dependent on that microservice.
-
公开(公告)号:US20200042406A1
公开(公告)日:2020-02-06
申请号:US16053976
申请日:2018-08-03
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Luay Al-Alem , Antony Bett , Michael Rhodes
Abstract: Systems and methods for discovering applications. An application may be discovered by determining a topology of the application in a containerized platform. Discovering the topology may include determining the components of the application and then determining relationships between the components. The relationships may include whether a component (e.g., a microservice) is user facing and may be based on traffic patterns between the components. The components or microservices may be prioritized or ranked based on the topology. The topology can be used when performing a data protection operation such as a restore operation.
-
公开(公告)号:US20200034560A1
公开(公告)日:2020-01-30
申请号:US16048980
申请日:2018-07-30
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Udi Shemer , Zvi Schneider , Amitai Alkalay
Abstract: An apparatus, in one example, comprises a storage system configured to perform one or more deduplication operations on encrypted datasets received for a plurality of tenants and store at least a portion of the encrypted datasets, the datasets having been encrypted for respective ones of the plurality of tenants using a common encryption key. The apparatus further comprises a cryptographic module associated with the storage system, the cryptographic module configured to, in response to a request to access an encrypted dataset stored by the storage system corresponding to a given one of the plurality of tenants, further encrypt the encrypted dataset using a tenant encryption key associated with the given one of the plurality of tenants. The storage system is further configured to send the further encrypted dataset to the given one of the plurality of tenants that requested access.
-
157.
公开(公告)号:US20200034452A1
公开(公告)日:2020-01-30
申请号:US16048763
申请日:2018-07-30
Applicant: EMC IP Holding Company LLC
Inventor: Zvi Schneider , Amitai Alkalay , Assaf Natanzon
IPC: G06F17/30
Abstract: An aspect of dual layer deduplication for a file system running over a deduplication block storage system includes accessing a file by a file system driver of the file system. The file is stored as one of a plurality of files in the file system. A further aspect includes breaking the file down into multiple blocks and generating chunks from the blocks. For at least one of the chunks, a trail of zeros is added until a size of a respective one of the chunks is a multiple of a block size of the deduplication block storage system.
-
公开(公告)号:US20200034254A1
公开(公告)日:2020-01-30
申请号:US16049493
申请日:2018-07-30
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon
Abstract: Providing seamless mobility of stateful pods in a container management system, by: receiving an indication that a pod needs to be moved from a first site to a replica site, identifying, through a moving target defense (MTD) process, all persistent volumes attached to the pod; determining if an RPO/RTO objective for the movement is below a threshold value, draining all local I/O operations to a container having the persistent volumes attached; killing containers of the pod using the persistent volumes after the draining, waiting for data to be flushed to the replica site, initiating a failover of a first storage of the first site, and restarting a container to run on the replica site attached to replica storage. In this process, a resource management system (RMS) is used to provide an address of a secure golden copy of the container as the address of the replica site.
-
公开(公告)号:US20200028799A1
公开(公告)日:2020-01-23
申请号:US16038325
申请日:2018-07-18
Applicant: EMC IP Holding Company LLC
Inventor: Stephen J. Todd , Dragan Savic , Assaf Natanzon , Said Tabet
IPC: H04L12/911
Abstract: In a system environment comprising a plurality of computing resources, wherein at least a portion of the computing resources are mobile, a method manages a transfer of one or more portions of a data set between at least a subset of the plurality of computing resources in accordance with a data distribution process. The data distribution process comprises computing one or more probability values to estimate whether or not a given mobile computing resource that is seeking at least a portion of the data set will be in a vicinity of at least one other computing resource that currently has or can obtain the portion of the data set, and based on the computation step, causing a transfer of the portion of the data set to the given mobile computing resource over a communication link locally established between the two computing resources when in the vicinity of one another.
-
公开(公告)号:US20200026603A1
公开(公告)日:2020-01-23
申请号:US16038717
申请日:2018-07-18
Applicant: EMC IP Holding Company LLC
Inventor: John S. Harwood , Assaf Natanzon
Abstract: Systems and methods are provided for implementing memory checkpointing using a distributed non-volatile memory system. For example, an application runs on a plurality of server nodes in a server cluster. Each server node includes system memory having volatile system memory and non-volatile system memory. A current application state of the application is maintained in the system memory of one or more server nodes. A checkpoint operation is performed to generate a distributed checkpoint image of the current application state of the application. The distributed checkpoint image is stored in the non-volatile system memory of the plurality of server nodes. Fault-tolerant parity data is generated for the distributed checkpoint image, and the fault-tolerant parity data for the distributed checkpoint image is stored in the non-volatile system memory of one or more of the plurality of server nodes.
-
-
-
-
-
-
-
-
-