Patents by Inventor Dimitrios Skourtis

Dimitrios Skourtis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11386216
    Abstract: Embodiments relate to a system, program product, and method for use with a computer platform to support privacy preservation. The platform measures and verifies data privacy provided by a shared resource service provider. An assessment is utilized to support the privacy preservation with respect to a data steward, and associated shared data. It is understood that data associated with a data service has an expected level of privacy. A privacy score directly correlating to a leakage indicator of the service is formed, and an associated data container is populated with inferred entities deemed to at least meet a preferred privacy level. The privacy score effectively certifies the security of the populated data container.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: July 12, 2022
    Assignee: International Business Machines Corporation
    Inventors: Dimitrios Skourtis, Nathalie Baracaldo Angel, Rui Zhang
  • Patent number: 11341281
    Abstract: A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: May 24, 2022
    Assignee: International Business Machines Corporation
    Inventors: Dimitrios Skourtis, Deepavali M. Bhagwat
  • Patent number: 11182193
    Abstract: A computer-implemented method includes receiving characteristic information of a container registry. The container registry includes a plurality of container images. The method includes selecting at least two container images in the container registry and selecting parameters for optimization based on the characteristic information. The method also includes generating a cost function based on the parameters for optimization and optimizing the at least two container images in the container registry based on the cost function. A computer-implemented method includes receiving a composition of each of at least two layers in a container image. The composition of each of the at least two layers includes at least one file. The method includes mapping overlap between the composition of the at least two layers and estimating a redundancy in the container image based on the overlap. The method also includes calculating new layers which reduce the redundancy in the container image.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: November 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Dimitrios Skourtis, Vasily Tarasov, Lukas Rupprecht, Nimrod Megiddo
  • Patent number: 11163750
    Abstract: In one embodiment, a computer-implemented method for namespace and content manipulation within a storage system includes: defining policy rule(s), each policy rule dictating: how namespaces within the storage system may be transformed; and/or how content stored within the storage system may be transformed; receiving a request for access to a particular data set stored within the storage system; parsing the request to determine one or more transformations requested therein and/or required thereby; determining whether the particular data set is compliant with the one or more transformations; in response to determining the particular data set is compliant with the one or more transformations, providing access to the particular data set; and in response to determining the particular data set is not compliant with the one or more transformations, performing the one or more transformations to generate a transformed data set, and providing access to the transformed data set.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: November 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Deepavali M. Bhagwat, Wayne A. Sawdon, Constantine Arnold, Dimitrios Skourtis
  • Patent number: 11099882
    Abstract: In an approach to optimizing container images through automatic layer suggestions, one or more computer processors identify one or more layers contained within an image. The one or more computer processors compare each identified layer with one or more layers contained in an image repository. The one or more computer processors calculate a layer overlap score for each compared layer. The one or more computer processors determine a potential substitute layer utilizing a respective calculated layer overlap score. The one or more computer processors, responsive to the determined substitute layer exceeding a layer overlap score threshold, substitute one or more identified layers with the determined substitute layer. The one or more computer processors restructure one or more layers of the image based on the substituted layer.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: August 24, 2021
    Assignee: International Business Machines Corporation
    Inventors: Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov
  • Patent number: 10969988
    Abstract: A computer-implemented method according to one embodiment includes monitoring and storing historical data access to image data by a container within a container environment, identifying or predicting that a container is to be started utilizing the image within the container environment, predicting data to be accessed by the container, based on the historical data access by the image, and initiating a copy-on-write (COW) for the data to be accessed by the container, in response to identifying or predicting that the container is to be started.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: April 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Vasily Tarasov, Lukas Rupprecht, Dimitrios Skourtis
  • Publication number: 20210096894
    Abstract: In an approach to optimizing container images through automatic layer suggestions, one or more computer processors identify one or more layers contained within an image. The one or more computer processors compare each identified layer with one or more layers contained in an image repository. The one or more computer processors calculate a layer overlap score for each compared layer. The one or more computer processors determine a potential substitute layer utilizing a respective calculated layer overlap score. The one or more computer processors, responsive to the determined substitute layer exceeding a layer overlap score threshold, substitute one or more identified layers with the determined substitute layer. The one or more computer processors restructure one or more layers of the image based on the substituted layer.
    Type: Application
    Filed: September 26, 2019
    Publication date: April 1, 2021
    Inventors: Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov
  • Publication number: 20210004251
    Abstract: A computer-implemented method includes receiving characteristic information of a container registry. The container registry includes a plurality of container images. The method includes selecting at least two container images in the container registry and selecting parameters for optimization based on the characteristic information. The method also includes generating a cost function based on the parameters for optimization and optimizing the at least two container images in the container registry based on the cost function. A computer-implemented method includes receiving a composition of each of at least two layers in a container image. The composition of each of the at least two layers includes at least one file. The method includes mapping overlap between the composition of the at least two layers and estimating a redundancy in the container image based on the overlap. The method also includes calculating new layers which reduce the redundancy in the container image.
    Type: Application
    Filed: July 2, 2019
    Publication date: January 7, 2021
    Inventors: Dimitrios Skourtis, Vasily Tarasov, Lukas Rupprecht, Nimrod Megiddo
  • Publication number: 20200387306
    Abstract: A computer-implemented method according to one embodiment includes monitoring and storing historical data access to image data by a container within a container environment, identifying or predicting that a container is to be started utilizing the image within the container environment, predicting data to be accessed by the container, based on the historical data access by the image, and initiating a copy-on-write (COW) for the data to be accessed by the container, in response to identifying or predicting that the container is to be started.
    Type: Application
    Filed: June 7, 2019
    Publication date: December 10, 2020
    Inventors: Vasily Tarasov, Lukas Rupprecht, Dimitrios Skourtis
  • Publication number: 20200151351
    Abstract: Embodiments relate to a system, program product, and method for use with a computer platform to support privacy preservation. The platform measures and verifies data privacy provided by a shared resource service provider. An assessment is utilized to support the privacy preservation with respect to a data steward, and associated shared data. It is understood that data associated with a data service has an expected level of privacy. A privacy score directly correlating to a leakage indicator of the service is formed, and an associated data container is populated with inferred entities deemed to at least meet a preferred privacy level. The privacy score effectively certifies the security of the populated data container.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Applicant: International Business Machines Corporation
    Inventors: Dimitrios Skourtis, Nathalie Baracaldo Angel, Rui Zhang
  • Publication number: 20200104390
    Abstract: In one embodiment, a computer-implemented method for namespace and content manipulation within a storage system includes: defining policy rule(s), each policy rule dictating: how namespaces within the storage system may be transformed; and/or how content stored within the storage system may be transformed; receiving a request for access to a particular data set stored within the storage system; parsing the request to determine one or more transformations requested therein and/or required thereby; determining whether the particular data set is compliant with the one or more transformations; in response to determining the particular data set is compliant with the one or more transformations, providing access to the particular data set; and in response to determining the particular data set is not compliant with the one or more transformations, performing the one or more transformations to generate a transformed data set, and providing access to the transformed data set.
    Type: Application
    Filed: September 27, 2018
    Publication date: April 2, 2020
    Inventors: Deepavali M. Bhagwat, Wayne A. Sawdon, Constantine Arnold, Dimitrios Skourtis
  • Publication number: 20200089917
    Abstract: A computer-implemented method according to one embodiment includes obtaining, at an untrusted environment, encrypted data from a storage location, initiating, within the untrusted environment, a performance of one or more secure computations on the encrypted data, and providing, within the untrusted environment, results of performing the one or more secure computations on the encrypted data.
    Type: Application
    Filed: September 14, 2018
    Publication date: March 19, 2020
    Inventors: Dimitrios Skourtis, Deepavali M. Bhagwat