发明名称 |
Protecting de-duplication repositories against a malicious attack |
摘要 |
Methods and systems for protecting de-duplication repositories against a malicious attack are disclosed. One method receives at least one block of data to store in a data storage system. A de-duplication engine comprising a secret key is utilized to generate a secret key hash of the at least one block of data. A comparison of the secret key hash of the at least one block of data with a secret key hash table of previously stored data on the data storage system to identify duplicated data, the secret key hash comparing protecting the data storage system against a malicious attack. |
申请公布号 |
US9094195(B2) |
申请公布日期 |
2015.07.28 |
申请号 |
US200912572525 |
申请日期 |
2009.10.02 |
申请人 |
|
发明人 |
Leppard Andrew;Kennington Alan |
分类号 |
G06F11/30;G06F12/14;H04L9/08;H04L9/00;H04L9/06 |
主分类号 |
G06F11/30 |
代理机构 |
|
代理人 |
|
主权项 |
1. A malicious-attack-preventing data de-duplication storage system comprising:
a memory that stores a secret key, where the secret key is a password or a padding sequence; and a processor that:
produces a modified data block by appending the secret key to the end of the data block, pre-pending the secret key to the beginning of the data block, or xor-ing the data block with the secret key, where the secret key is associated with the data block;produces a secret key hash by hashing the modified data block; andprovides the secret key hash to the de-duplication system. |
地址 |
|