Patents by Inventor Ashish Chaurasia

Ashish Chaurasia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070028
    Abstract: A method for minimizing data transfer and storage utilization on cloud object storage systems is disclosed. In one embodiment, such a method replicates a file from a production system to a cloud object storage system. The method determines whether a number of hard links associated with the file is greater than one. In the event the number is greater than one, the method creates, on the cloud object storage system, a special object for the file and associates the file with the special object. Upon creating a hard link on the production system in association with the file, the method replicates the hard link from the production system to the cloud object storage system without replicating data associated with the file. A metadata reference to the special object is added to the hard link on the cloud object storage system. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: August 29, 2022
    Publication date: February 29, 2024
    Applicant: International Business Machines Corporation
    Inventors: Venkateswara Rao Puvvada, Karrthik Kalaga Gopalakrishnan, Saket Kumar, Ashish Chaurasia
  • Patent number: 11042646
    Abstract: A computer-implemented method according to one embodiment includes determining a classification associated with an instance of data, determining a vulnerability level of a first storage system at which the instance of data is currently located, and conditionally migrating the instance of data from the first storage system to a second storage system, based on the classification associated with the instance of data and the vulnerability level of the first storage system.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: June 22, 2021
    Assignee: International Business Machines Corporation
    Inventors: Nilesh P. Bhosale, Abhishek Jain, Sandeep R. Patil, Ashish Chaurasia
  • Publication number: 20200050769
    Abstract: A computer-implemented method according to one embodiment includes determining a classification associated with an instance of data, determining a vulnerability level of a first storage system at which the instance of data is currently located, and conditionally migrating the instance of data from the first storage system to a second storage system, based on the classification associated with the instance of data and the vulnerability level of the first storage system.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Inventors: Nilesh P. Bhosale, Abhishek Jain, Sandeep R. Patil, Ashish Chaurasia
  • Patent number: 9298396
    Abstract: A computer reduces data fragmentation on a thin provisioned storage system. The computer receives a storage request. The computer determines a virtual storage size based at least in part on the received storage request. The computer creates an assigned virtual list that includes a list of reserved physical storage locations associated with the storage request. The computer further receives a WRITE command, and responsive to the WRITE command, allocates storage based at least in part on the created assigned virtual list.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Sandeep R. Patil, Prasenjit Sarkar, Riyazahamad M. Shiraguppi
  • Patent number: 9262087
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises storage devices for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the storage devices to virtual volumes and establishes a second data path between the host and the storage devices through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the storage devices through the second data path.
    Type: Grant
    Filed: February 19, 2015
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Publication number: 20150160878
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises storage devices for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the storage devices to virtual volumes and establishes a second data path between the host and the storage devices through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the storage devices through the second data path.
    Type: Application
    Filed: February 19, 2015
    Publication date: June 11, 2015
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Publication number: 20150154105
    Abstract: A computer reduces data fragmentation on a thin provisioned storage system. The computer receives a storage request. The computer determines a virtual storage size based at least in part on the received storage request. The computer creates an assigned virtual list that includes a list of reserved physical storage locations associated with the storage request. The computer further receives a WRITE command, and responsive to the WRITE command, allocates storage based at least in part on the created assigned virtual list.
    Type: Application
    Filed: December 4, 2013
    Publication date: June 4, 2015
    Applicant: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Sandeep R. Patil, Prasenjit Sarkar, Riyazahamad M. Shiraguppi
  • Patent number: 8996758
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises storage devices for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the storage devices to virtual volumes and establishes a second data path between the host and the storage devices through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the storage devices through the second data path.
    Type: Grant
    Filed: March 7, 2014
    Date of Patent: March 31, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Patent number: 8886672
    Abstract: A system and method for providing access in a distributed filesystem. The disclosure describes systems and methods for providing access to filesystem objects in a distributed filesystem (DFS). In one implementation, access to filesystem objects in the DFS can be restricted to only authenticated users and client devices. To this end, the client devices of the DFS can be divided into trusted and non-trusted clients, and further access can be denied to non-trusted clients. Concepts of trusted computing can be utilized to obtain trusted clients. New clients added to the system can be added as non-trusted clients. Further, access can be restricted by extending the file access permissions to include additional bits that can control access to non-trusted clients. In certain situations, the owner of the object can be allowed access to the object from a non-trusted client.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: November 11, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Venkateswararao Jujjuri, Ujjwal Lanjewar
  • Publication number: 20140195698
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises storage devices for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the storage devices to virtual volumes and establishes a second data path between the host and the storage devices through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the storage devices through the second data path.
    Type: Application
    Filed: March 7, 2014
    Publication date: July 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Patent number: 8713218
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises disks for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the disks to virtual volumes and establishes a second data path between the host and the disks through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the disks through the second data path.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Publication number: 20130054846
    Abstract: Embodiments of the invention relate to configuring a virtualization controller in SAN data storage system without disrupting I/O operations. One aspect of the invention concerns a method that comprises establishing a first data path between a host and a storage controller in the same communication zone wherein the storage controller comprises disks for storing data; adding a virtualization controller to the zone wherein the virtualization controller maps the disks to virtual volumes and establishes a second data path between the host and the disks through the virtual volumes; removing the first data path in response to the host detecting the second data path; and performing I/O operations between the host and the disks through the second data path.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Chaurasia, Subhojit Roy
  • Publication number: 20100235396
    Abstract: A system and method for providing access in a distributed filesystem. The disclosure describes systems and methods for providing access to filesystem objects in a distributed filesystem (DFS). In one implementation, access to filesystem objects in the DFS can he restricted to only authenticated users and client devices. To this end, the client devices of the DFS can be divided into trusted and non-trusted clients, and further access can be denied to non-trusted clients. Concepts of trusted computing can be utilized to obtain trusted clients. New clients added to the system can be added as non-trusted clients. Further, access can be restricted by extending the file access permissions to include additional bits that can control access to non-trusted clients. In certain situations, the owner of the object can be allowed access to the object from a non-trusted client.
    Type: Application
    Filed: March 12, 2009
    Publication date: September 16, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Chaurasia, Venkateswararao Jujjuri, Ujjwal Lanjewar