Patents by Inventor Dimitrios Skourtis
Dimitrios Skourtis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11386216Abstract: Embodiments relate to a system, program product, and method for use with a computer platform to support privacy preservation. The platform measures and verifies data privacy provided by a shared resource service provider. An assessment is utilized to support the privacy preservation with respect to a data steward, and associated shared data. It is understood that data associated with a data service has an expected level of privacy. A privacy score directly correlating to a leakage indicator of the service is formed, and an associated data container is populated with inferred entities deemed to at least meet a preferred privacy level. The privacy score effectively certifies the security of the populated data container.Type: GrantFiled: November 13, 2018Date of Patent: July 12, 2022Assignee: International Business Machines CorporationInventors: Dimitrios Skourtis, Nathalie Baracaldo Angel, Rui Zhang
-
Patent number: 11341281Abstract: A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data.Type: GrantFiled: September 14, 2018Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Dimitrios Skourtis, Deepavali M. Bhagwat
-
Patent number: 11182193Abstract: A computer-implemented method includes receiving characteristic information of a container registry. The container registry includes a plurality of container images. The method includes selecting at least two container images in the container registry and selecting parameters for optimization based on the characteristic information. The method also includes generating a cost function based on the parameters for optimization and optimizing the at least two container images in the container registry based on the cost function. A computer-implemented method includes receiving a composition of each of at least two layers in a container image. The composition of each of the at least two layers includes at least one file. The method includes mapping overlap between the composition of the at least two layers and estimating a redundancy in the container image based on the overlap. The method also includes calculating new layers which reduce the redundancy in the container image.Type: GrantFiled: July 2, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Dimitrios Skourtis, Vasily Tarasov, Lukas Rupprecht, Nimrod Megiddo
-
Patent number: 11163750Abstract: In one embodiment, a computer-implemented method for namespace and content manipulation within a storage system includes: defining policy rule(s), each policy rule dictating: how namespaces within the storage system may be transformed; and/or how content stored within the storage system may be transformed; receiving a request for access to a particular data set stored within the storage system; parsing the request to determine one or more transformations requested therein and/or required thereby; determining whether the particular data set is compliant with the one or more transformations; in response to determining the particular data set is compliant with the one or more transformations, providing access to the particular data set; and in response to determining the particular data set is not compliant with the one or more transformations, performing the one or more transformations to generate a transformed data set, and providing access to the transformed data set.Type: GrantFiled: September 27, 2018Date of Patent: November 2, 2021Assignee: International Business Machines CorporationInventors: Deepavali M. Bhagwat, Wayne A. Sawdon, Constantine Arnold, Dimitrios Skourtis
-
Patent number: 11099882Abstract: In an approach to optimizing container images through automatic layer suggestions, one or more computer processors identify one or more layers contained within an image. The one or more computer processors compare each identified layer with one or more layers contained in an image repository. The one or more computer processors calculate a layer overlap score for each compared layer. The one or more computer processors determine a potential substitute layer utilizing a respective calculated layer overlap score. The one or more computer processors, responsive to the determined substitute layer exceeding a layer overlap score threshold, substitute one or more identified layers with the determined substitute layer. The one or more computer processors restructure one or more layers of the image based on the substituted layer.Type: GrantFiled: September 26, 2019Date of Patent: August 24, 2021Assignee: International Business Machines CorporationInventors: Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov
-
Patent number: 10969988Abstract: A computer-implemented method according to one embodiment includes monitoring and storing historical data access to image data by a container within a container environment, identifying or predicting that a container is to be started utilizing the image within the container environment, predicting data to be accessed by the container, based on the historical data access by the image, and initiating a copy-on-write (COW) for the data to be accessed by the container, in response to identifying or predicting that the container is to be started.Type: GrantFiled: June 7, 2019Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Vasily Tarasov, Lukas Rupprecht, Dimitrios Skourtis
-
Publication number: 20210096894Abstract: In an approach to optimizing container images through automatic layer suggestions, one or more computer processors identify one or more layers contained within an image. The one or more computer processors compare each identified layer with one or more layers contained in an image repository. The one or more computer processors calculate a layer overlap score for each compared layer. The one or more computer processors determine a potential substitute layer utilizing a respective calculated layer overlap score. The one or more computer processors, responsive to the determined substitute layer exceeding a layer overlap score threshold, substitute one or more identified layers with the determined substitute layer. The one or more computer processors restructure one or more layers of the image based on the substituted layer.Type: ApplicationFiled: September 26, 2019Publication date: April 1, 2021Inventors: Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov
-
Publication number: 20210004251Abstract: A computer-implemented method includes receiving characteristic information of a container registry. The container registry includes a plurality of container images. The method includes selecting at least two container images in the container registry and selecting parameters for optimization based on the characteristic information. The method also includes generating a cost function based on the parameters for optimization and optimizing the at least two container images in the container registry based on the cost function. A computer-implemented method includes receiving a composition of each of at least two layers in a container image. The composition of each of the at least two layers includes at least one file. The method includes mapping overlap between the composition of the at least two layers and estimating a redundancy in the container image based on the overlap. The method also includes calculating new layers which reduce the redundancy in the container image.Type: ApplicationFiled: July 2, 2019Publication date: January 7, 2021Inventors: Dimitrios Skourtis, Vasily Tarasov, Lukas Rupprecht, Nimrod Megiddo
-
Publication number: 20200387306Abstract: A computer-implemented method according to one embodiment includes monitoring and storing historical data access to image data by a container within a container environment, identifying or predicting that a container is to be started utilizing the image within the container environment, predicting data to be accessed by the container, based on the historical data access by the image, and initiating a copy-on-write (COW) for the data to be accessed by the container, in response to identifying or predicting that the container is to be started.Type: ApplicationFiled: June 7, 2019Publication date: December 10, 2020Inventors: Vasily Tarasov, Lukas Rupprecht, Dimitrios Skourtis
-
Publication number: 20200151351Abstract: Embodiments relate to a system, program product, and method for use with a computer platform to support privacy preservation. The platform measures and verifies data privacy provided by a shared resource service provider. An assessment is utilized to support the privacy preservation with respect to a data steward, and associated shared data. It is understood that data associated with a data service has an expected level of privacy. A privacy score directly correlating to a leakage indicator of the service is formed, and an associated data container is populated with inferred entities deemed to at least meet a preferred privacy level. The privacy score effectively certifies the security of the populated data container.Type: ApplicationFiled: November 13, 2018Publication date: May 14, 2020Applicant: International Business Machines CorporationInventors: Dimitrios Skourtis, Nathalie Baracaldo Angel, Rui Zhang
-
Publication number: 20200104390Abstract: In one embodiment, a computer-implemented method for namespace and content manipulation within a storage system includes: defining policy rule(s), each policy rule dictating: how namespaces within the storage system may be transformed; and/or how content stored within the storage system may be transformed; receiving a request for access to a particular data set stored within the storage system; parsing the request to determine one or more transformations requested therein and/or required thereby; determining whether the particular data set is compliant with the one or more transformations; in response to determining the particular data set is compliant with the one or more transformations, providing access to the particular data set; and in response to determining the particular data set is not compliant with the one or more transformations, performing the one or more transformations to generate a transformed data set, and providing access to the transformed data set.Type: ApplicationFiled: September 27, 2018Publication date: April 2, 2020Inventors: Deepavali M. Bhagwat, Wayne A. Sawdon, Constantine Arnold, Dimitrios Skourtis
-
Publication number: 20200089917Abstract: A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventors: Dimitrios Skourtis, Deepavali M. Bhagwat