Google llc (20240111884). Authenticating a File System Within Untrusted Storage simplified abstract

From WikiPatents
Jump to navigation Jump to search

Authenticating a File System Within Untrusted Storage

Organization Name

google llc

Inventor(s)

Yu-Ting Hsieh of Sunnyvale CA (US)

Authenticating a File System Within Untrusted Storage - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111884 titled 'Authenticating a File System Within Untrusted Storage

Simplified Explanation

The patent application describes techniques for authenticating a file system within untrusted storage by generating a file-system root hash corresponding to the file system during a write operation. The root hash is uniquely determined based on the contents of files within the file system and the structure of the file system. The size of the root hash is independent of the size of the file system, allowing for a dynamically-changing file system and predetermined, fixed storage for the root hash.

  • File-system authenticator generates a root hash during a write operation.
  • Root hash is uniquely determined based on file contents and structure.
  • Root hash size is independent of file system size.
  • Enables support for dynamically-changing file systems.
  • Predetermined, fixed storage for the root hash.

Potential Applications

The technology described in the patent application could be applied in various industries and scenarios, including:

  • Cloud storage services
  • Data centers
  • Network security systems

Problems Solved

The innovation addresses several issues in file system authentication, such as:

  • Ensuring data integrity in untrusted storage environments
  • Supporting dynamically-changing file systems
  • Efficiently storing authentication data

Benefits

The technology offers the following benefits:

  • Enhanced security for file systems in untrusted storage
  • Flexibility to accommodate changing file system structures
  • Efficient use of storage space for authentication data

Potential Commercial Applications

The technology could be commercially applied in:

  • Cybersecurity software solutions
  • Cloud storage platforms
  • Data backup services

Possible Prior Art

One possible prior art related to this technology is the use of cryptographic hash functions for file system authentication in secure storage environments.

Unanswered Questions

How does this technology compare to traditional file system authentication methods?

The article does not provide a direct comparison between this technology and traditional file system authentication methods.

What are the potential limitations or drawbacks of implementing this technology?

The article does not discuss any potential limitations or drawbacks of implementing this technology.


Original Abstract Submitted

this document includes techniques, apparatuses, and systems for authenticating a file system () within untrusted storage (). in particular, a file-system authenticator () generates a file-system root hash () corresponding to the file system () during a write operation. the file-system root hash () is uniquely determined based on contents of files within the file system () and a structure of the file system (). the file-system root hash () can be readily updated, which enables the file system to support a dynamically-changing file system (). also, the size of the file-system root hash () is independent of the size of the file system () within the untrusted storage (). as such, the size of trusted storage () used to store the file-system root hash () can be predetermined and fixed regardless of the size of the file system ().