G06F3/062

POLICY-BASED DATA PLACEMENT IN AN EDGE ENVIRONMENT
20220201076 · 2022-06-23 ·

Data can be placed by an edge node in a computing environment using multiple criteria in a placement policy. For example, a processing device of an edge node can receive a write request for storing a data object. The processing device can select first and second criteria from a placement policy based on a tag for the data object. The first criterion may correspond to a required characteristic and the second criterion may correspond to a prioritized characteristic. The processing device can determine a set of remote components that fulfill the first criterion. The processing device can then identify, from the set, a destination component that fulfills the second criterion. The processing device can transmit the data object to the destination component.

HYBRID SNAPSHOT OF A GLOBAL NAMESPACE

A method of generating a hybrid snapshot includes receiving a request to generate a snapshot of a distributed file system and identifying a first storage resource of the distributed file system and a second storage resource of the distributed file system based on the request. The method further includes generating the snapshot of the distributed file system, the snapshot including a data-full snapshot of the first storage resource and a data-less snapshot of the second storage resource.

DRAM-Less SSD With Secure HMB For Low Latency
20220179593 · 2022-06-09 · ·

Aspects of the present disclosure generally relate to data storage devices and related methods that use secure host memory buffers and low latency operations. In one aspect, a controller is configured to fetch a command from a host device, and fetch entry data from a host memory buffer (HMB) of the host device in response to the command from the host device. The HMB is utilized in place of DRAM in the controller so that the data storage device is DRAM-less. In one embodiment, the entry data includes a logical to physical (L2P) address. The controller is also configured to fetch read data from the one or more memory devices using the entry data, conduct a validity check of the entry data fetched from the HMB simultaneously with the fetching of the read data from the one or more memory devices, and transmit validity result data to the host device.

Decreasing Physical Secure Erase Times in Solid State Drives
20220179578 · 2022-06-09 ·

Storage devices may be configured to desirably reduce the time required to perform a physical secure erase operation. The storage device includes a controller that is configured to direct the storage device to receive a physical secure erase command. The storage device can then identify the one or more blocks within the memory array for secure erasure based on the received physical secure erase command. For each block identified for erasure, the storage device further evaluates the block to determine the level type of cells within the block. In response to the cell level type being single-level, a single-cell erase command is issued to perform a single-level cell erase on the block. Conversely, in response to the cell level type being a higher-dimensional cell, a modified single-cell erase command to perform a modified single-level cell erase on the block is issued.

Re-duplication of de-duplicated encrypted memory
11354420 · 2022-06-07 · ·

Systems and methods for performing data duplication on data that was previously consolidated (e.g., deduplicated or merged). An example method may comprise: receiving, by a processing device, a request to modify a storage block comprising data encrypted using a location dependent cryptographic input; causing the data of the storage block to be encrypted using a location independent cryptographic input corresponding to a first storage location; copying the data encrypted using the location independent cryptographic input from the first storage location to a second storage location; causing data at the second storage location to be encrypted using a location dependent cryptographic input corresponding to the second storage location; and updating a reference of the storage block from the first storage location to the second storage location.

Memory protection in virtualized computer systems using shadow page tables
11354047 · 2022-06-07 · ·

Aspects of the disclosure provide for mechanisms for memory protection of virtual machines in a computer system. A first host page table and a second host page table is generated by a processing device running a hypervisor in view of a guest page table associated with a virtual machine. The first host page table includes a first mapping corresponding to a privileged page of a guest memory and a second mapping corresponding to an unprivileged page of the guest memory. The second host page table includes a third mapping corresponding to the unprivileged page of the guest memory. The first host page table is associated with the virtual machine. In response to detecting a transition from a first guest mode to a second guest mode by the virtual machine, the virtual machine is associated with the second page table.

Random node selection for permissioned blockchain

An example operation may include one or more of retrieving a block hash of a data block stored on a blockchain, randomly determining a subset of peer organizations from a blockchain network of the blockchain to be endorsers based on a value of the block hash, transmitting a blockchain storage request from a client to the randomly determined subset of endorser peer organizations, and collecting simulated responses from the randomly determined subset of endorser peer organizations into a storage request proposal.

In-memory database service abstraction component
11347442 · 2022-05-31 · ·

In an example embodiment, a specialized in-memory database abstraction component is introduced in a cloud cluster. The in-memory database abstraction component may receive lifecycle commands from a client-facing application and interface with a container service to create an in-memory database resource. When parameters are received by the in-memory database abstraction component from the client-facing application, the in-memory database abstraction component may act to validate the parameters, determine if a service plan is available, and determine whether the parameters meet the service plan requirements. If the service plan requirements are not met, the in-memory database abstraction component translates the parameters for the in-memory database resource.

Modular data processing and storage system
11740817 · 2023-08-29 · ·

A system enables entities to access a single platform in order to utilize electronic data storage for storing different types of information. One or more computers may operate an electronic data storage processing network that entities can access when updating information in electronic data storage. The electronic data storage processing network may operate a plurality of electronic data storage processing modules, which can include an aggregator module, a formatter module, an operator signer module, and a validator module. Based on the specific use case for which electronic data storage is utilized, recordable data that is to be added to the electronic data storage can be processed by the appropriate aggregating, formatting, signing, and validating functions provided by the electronic data storage processing modules.

System and method for acquiring data with a handheld device

A method for covertly acquiring data. Information about an activity associated with a first hand-held device is monitored by initiating covert application software in a first configuration in which a log-in must first be input to the first device. When running the software in the first configuration, no image which overtly exhibits a self-evident association with the software can be viewed on the display to identify the software or indicate that the software is running on the client. Prior to initiating monitoring with the software, a feature having no self-evident association with the covert application software can be accessed on a touch screen display of the device to initiate the software.