17813994. EFFICIENT METHOD FOR DATA INVULNERABILITY ARCHITECTURE (DIA) AND DATA CORRUPTION DETECTION FOR DEDUPED CLOUD OBJECTS simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

EFFICIENT METHOD FOR DATA INVULNERABILITY ARCHITECTURE (DIA) AND DATA CORRUPTION DETECTION FOR DEDUPED CLOUD OBJECTS

Organization Name

Dell Products L.P.

Inventor(s)

Jagannathdas Rath of Bengaluru (IN)

Kalyan C. Gunda of Bangalore (IN)

EFFICIENT METHOD FOR DATA INVULNERABILITY ARCHITECTURE (DIA) AND DATA CORRUPTION DETECTION FOR DEDUPED CLOUD OBJECTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17813994 titled 'EFFICIENT METHOD FOR DATA INVULNERABILITY ARCHITECTURE (DIA) AND DATA CORRUPTION DETECTION FOR DEDUPED CLOUD OBJECTS

Simplified Explanation

The abstract of the patent application describes a method for cloud storage that involves receiving a write request to store an object, storing the object at the cloud storage site, receiving a read request to access the object, evaluating the object for corruption, and sending a message indicating the outcome of the evaluation. The operations at the cloud storage site can be performed by an Object Lambda function configured by a dedupe application.

  • The method involves receiving a write request to store an object at a cloud storage site.
  • The object is stored at the cloud storage site.
  • A read request is received at the cloud storage site to access the object.
  • An evaluation of the object is performed at the cloud storage site to determine if it is corrupted.
  • A message is sent to identify the outcome of the evaluation.

Potential applications of this technology:

  • Cloud storage services can utilize this method to ensure the integrity of stored objects.
  • Deduplication applications can configure Object Lambda functions to perform operations at the cloud storage site.

Problems solved by this technology:

  • Ensures that objects stored in the cloud storage site are not corrupted.
  • Provides a mechanism to evaluate the integrity of objects in the cloud storage site.

Benefits of this technology:

  • Enhances the reliability and trustworthiness of cloud storage services.
  • Enables efficient deduplication operations in the cloud storage environment.


Original Abstract Submitted

One example method includes receiving, at a cloud storage site, a write request that identifies an object to be written to the cloud storage site, storing the object at the cloud storage site, receiving, at the cloud storage site, a read request that identifies the object, performing, at the cloud storage site, an evaluation of the object to determine if the object is corrupted, and sending a message identifying an outcome of the evaluation. One or more of the operations at the cloud storage site may be performed by an Object Lambda function that has been configured by a dedupe application.