发明名称 Computer system and its data control method
摘要 Provided are a computer system and its data control method that enable safe backup of data and reduction in the capacity of data to be backed up. A control processor refers to a differential and, if a differential bit is “0,” encrypts data of an online VOL with an encryption circuit by using key information, and transfers the encrypted data to a second storage system. If the differential bit is “1,” the control processor performs redundancy elimination processing to journal data, thereafter compresses the journal data with a compression circuit, encrypts the compressed journal data with an encryption circuit according to the key information, and transfers the journal data that was encrypted after compression to the second storage system.
申请公布号 US9075534(B2) 申请公布日期 2015.07.07
申请号 US201313793178 申请日期 2013.03.11
申请人 Hitachi, Ltd. 发明人 Satoyama Ai;Eguchi Yoshiaki
分类号 G06F7/00;G06F3/06 主分类号 G06F7/00
代理机构 Foley & Lardner LLP 代理人 Foley & Lardner LLP
主权项 1. A computer system, comprising: a first storage system connected to a network; and a second storage system connected to the first storage system; wherein the first storage system includes a first physical storage device configured to store data and a first controller configured to manage a storage area of the first physical storage device as a plurality of logical volumes, including a first logical volume and a second logical volume, and to control writing and reading of data into and from the first physical storage device, wherein the second storage system includes a second physical storage device configured to store data and a second controller configured to manage a storage area of the second physical storage device as a plurality of logical volumes, including a third logical volume and a fourth logical volume, and to control writing and reading of data into and from the second physical storage device, wherein the first controller is configured to manage a first virtualized logical volume virtualized in correspondence with the third logical volume, and a second virtualized logical volume virtualized in correspondence with the fourth logical volume, wherein the first logical volume is configured to store data that are designated in an access request from a host computer connected to the network, the second logical volume is configured to store journal data related to the first logical volume, including first differential data as a differential of data that are stored in the first logical volume at a first time as a first generation of a plurality of generations and data that are stored in the first logical volume at a second time that is later than the first time as a second generation of the plurality of generations, wherein the first controller is configured to perform de-duplication process on the journal data stored in the second logical volume by eliminating same journal data included over the plurality of generations, and to send the de-duplicated journal data as backup data to the second storage system, wherein the second controller is configured to store the de-duplicated journal data in the third logical volume, as pre-compression journal data, wherein the second controller is configured to send the pre-compression journal data to the first storage system, wherein, upon subsequently receiving the pre-compression journal data from the second storage system, the first controller is configured to compress the pre-compression journal data and to encrypt the compressed journal data thereafter, wherein the first controller is configured to send the encrypted journal data encrypted after the compression to the second storage system, and wherein, upon receiving the encrypted journal data from the first storage system, the second controller is configured to store the encrypted journal data in the fourth logical volume, as post-compression journal data.
地址 Tokyo JP