Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Providing security in a cloud storage environment

a cloud storage environment and security technology, applied in the field of cloud storage environments, can solve the problems of unauthorized outsiders/users, customer of cloud service operating at the client device experiencing a compromised quality of service, and administrators may accidentally or maliciously run destructive commands configured to compromise the security of data associated with the data,

Inactive Publication Date: 2014-05-15
NETWORK APPLIANCE INC
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a method, apparatus, and system for providing security in a cloud storage environment. The system includes a cloud manager that stores information about the access level of a storage controller associated with a customer of the security service. When the customer requests access to the security information, the cloud manager provides the necessary information to the customer. The system also generates an invoice based on the amount of security information requested and the access level provided to the customer. Overall, the system ensures secure storage and access of data in the cloud.

Problems solved by technology

Also, for example, the cloud administrator may accidentally or maliciously run destructive commands configured to compromise the security of data associated with the client device.
An unauthorized outsider / user may also break into the system and perform the aforementioned act of malice.
Tampering of the hardware and / or software associated with a storage controller may result in a customer of the cloud service operating at the client device experiencing a compromised quality of service.
Although the role-based model may provide structure, the unauthorized outsider / user may still possess the requisite means to access data associated with the customer that resides on the storage controllers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Providing security in a cloud storage environment
  • Providing security in a cloud storage environment
  • Providing security in a cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]Example embodiments, as described below, may be used to provide security as a service in a cloud storage environment. Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments.

[0026]FIG. 1 shows a storage system 102 interfaced with a number of host devices 1041-N through a network 106, according to one or more embodiments. In one or more embodiments, host devices 1041-N may be general-purpose computing devices configured to execute applications. In one or more embodiments, network 106 may be a storage area network (SAN), a local area network (LAN), a wide area network (WAN), a virtual private network (VPN) using communication links over, for example, the Internet, or any combination thereof. In one or more embodiments, storage system 102 may directly communicate with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of providing security as a service in a cloud storage environment includes storing, through a cloud manager of the cloud storage environment, a security level of access of a storage controller associated with a customer of the security as a service, and receiving a request from the customer to access security information of the storage controller associated therewith. The method also includes providing, through the cloud manager, security information of the storage controller associated with the customer in accordance with the request and the stored security level of access of the storage controller associated with the customer.

Description

CLAIM OF PRIORITY[0001]This is a Continuation in Part application and claims priority from U.S. Utility application Ser. No. 12 / 951,089 titled: “METHOD AND SYSTEM FOR IMPROVING STORAGE SECURITY IN A CLOUD COMPUTING ENVIRONMENT” filed on Nov. 22, 2010.FIELD OF TECHNOLOGY[0002]This disclosure relates generally to cloud storage environments and, more particularly, to a method, an apparatus, and / or a system of providing security in a cloud storage environment.BACKGROUND[0003]In a cloud computing environment, storage requirements of one or more client device(s) may be flexibly met through a corresponding one or more storage controller(s) configured to host one or more virtual server(s) appropriately provisioned thereto. A cloud administrator may have the requisite privileges to configure a virtual server associated with a client device on any storage controller. Also, for example, the cloud administrator may accidentally or maliciously run destructive commands configured to compromise th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L12/24
CPCH04L41/28H04L41/5029G06Q30/04H04L63/08H04L63/105H04L67/1097G06F21/30G06Q20/00
Inventor MANE, NANDKUMAR LALASAHEBARASANAL, II, RAJASHEKHAR MALLIKARJUN
Owner NETWORK APPLIANCE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products