Patents by Inventor Srinivasan Narayanamurthy
Srinivasan Narayanamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230297264Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.Type: ApplicationFiled: May 26, 2023Publication date: September 21, 2023Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
-
Patent number: 11662930Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.Type: GrantFiled: February 21, 2022Date of Patent: May 30, 2023Assignee: NetApp, Inc.Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
-
Publication number: 20220171557Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.Type: ApplicationFiled: February 21, 2022Publication date: June 2, 2022Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
-
Patent number: 11256433Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.Type: GrantFiled: March 15, 2019Date of Patent: February 22, 2022Assignee: NetApp, Inc.Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
-
Patent number: 11210007Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.Type: GrantFiled: April 17, 2019Date of Patent: December 28, 2021Assignee: NetApp, Inc.Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
-
Publication number: 20210389893Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.Type: ApplicationFiled: August 30, 2021Publication date: December 16, 2021Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
-
Patent number: 11106375Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.Type: GrantFiled: April 4, 2019Date of Patent: August 31, 2021Assignee: NetApp, Inc.Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
-
Patent number: 10901844Abstract: A distributed storage system can use a high rate MSR erasure code to repair multiple nodes when multiple node failures occur. An encoder constructs m r-ary trees to determine the symbol arrays for the parity nodes. These symbol arrays are used to generate the parity data according to parity definitions or parity equations. The m r-ary trees are also used to identify a set of recovery rows across helper nodes for repairing a systematic node. When failed systematic nodes correspond to different ones of the m r-ary trees, a decoder may select additional recovery rows. The decoder selects additional recovery rows when the parity definitions do not provide a sufficient number of independent linear equations to solve the unknown symbols of the failed nodes. The decoder can select recovery rows contiguous to the already identified recovery rows for access efficiency.Type: GrantFiled: October 11, 2019Date of Patent: January 26, 2021Assignee: NETAPP, INC.Inventors: Syed Abid Hussain, Srinivasan Narayanamurthy
-
Publication number: 20200319810Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.Type: ApplicationFiled: April 17, 2019Publication date: October 8, 2020Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
-
Publication number: 20200320046Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.Type: ApplicationFiled: April 4, 2019Publication date: October 8, 2020Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
-
Publication number: 20200293212Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.Type: ApplicationFiled: March 15, 2019Publication date: September 17, 2020Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
-
Publication number: 20200117542Abstract: A distributed storage system can use a high rate MSR erasure code to repair multiple nodes when multiple node failures occur. An encoder constructs m r-ary trees to determine the symbol arrays for the parity nodes. These symbol arrays are used to generate the parity data according to parity definitions or parity equations. The m r-ary trees are also used to identify a set of recovery rows across helper nodes for repairing a systematic node. When failed systematic nodes correspond to different ones of the m r-ary trees, a decoder may select additional recovery rows. The decoder selects additional recovery rows when the parity definitions do not provide a sufficient number of independent linear equations to solve the unknown symbols of the failed nodes. The decoder can select recovery rows contiguous to the already identified recovery rows for access efficiency.Type: ApplicationFiled: October 11, 2019Publication date: April 16, 2020Inventors: Syed Abid Hussain, Srinivasan Narayanamurthy
-
Patent number: 10452477Abstract: A distributed storage system can use a high rate MSR erasure code to repair multiple nodes when multiple node failures occur. An encoder constructs m r-ary trees to determine the symbol arrays for the parity nodes. These symbol arrays are used to generate the parity data according to parity definitions or parity equations. The m r-ary trees are also used to identify a set of recovery rows across helper nodes for repairing a systematic node. When failed systematic nodes correspond to different ones of the m r-ary trees, a decoder may select additional recovery rows. The decoder selects additional recovery rows when the parity definitions do not provide a sufficient number of independent linear equations to solve the unknown symbols of the failed nodes. The decoder can select recovery rows contiguous to the already identified recovery rows for access efficiency.Type: GrantFiled: August 26, 2016Date of Patent: October 22, 2019Assignee: NETAPP, INC.Inventors: Syed Abid Hussain, Srinivasan Narayanamurthy
-
Patent number: 9946716Abstract: Technology is disclosed for managing data in a distributed file system (“the technology”). The technology can gather metadata information associated with the data stored within the distributed file system, create a secondary namespace within a local file system of a local host using the gathered metadata information and store the gathered metadata information as files within the secondary namespace. Further, when a request to create a PPI of the distributed file system is received, the technology can create a PPI of the secondary namespace using a PPI creation feature of the local file system.Type: GrantFiled: April 12, 2016Date of Patent: April 17, 2018Assignee: NETAPP, INC.Inventors: Gaurav Makkar, Srinivasan Narayanamurthy, Kartheek Muthyala
-
Publication number: 20180060169Abstract: A distributed storage system can use a high rate MSR erasure code to repair multiple nodes when multiple node failures occur. An encoder constructs m r-ary trees to determine the symbol arrays for the parity nodes. These symbol arrays are used to generate the parity data according to parity definitions or parity equations. The m r-ary trees are also used to identify a set of recovery rows across helper nodes for repairing a systematic node. When failed systematic nodes correspond to different ones of the m r-ary trees, a decoder may select additional recovery rows. The decoder selects additional recovery rows when the parity definitions do not provide a sufficient number of independent linear equations to solve the unknown symbols of the failed nodes. The decoder can select recovery rows contiguous to the already identified recovery rows for access efficiency.Type: ApplicationFiled: August 26, 2016Publication date: March 1, 2018Inventors: Syed Abid Hussain, Srinivasan Narayanamurthy
-
Patent number: 9582213Abstract: Embodiments described herein provide an object store that efficiently manages and services objects for use by clients of a distributed data processing system. Illustratively, the object store may be embodied as a quasi-shared storage system that interacts with nodes of the distributed data processing system to service the objects as blocks of data stored on a plurality of storage devices, such as disks, of the storage system. To that end, an architecture of the object store may include an on-disk layout, e.g., of the storage system, and an incore layout, e.g., of the nodes, that cooperate to illustratively convert the blocks to objects for access by the clients.Type: GrantFiled: November 12, 2015Date of Patent: February 28, 2017Assignee: NetApp, Inc.Inventors: Gaurav Makkar, Srinivasan Narayanamurthy, Kartheek Muthyala, Stephen Daniel
-
Patent number: 9575974Abstract: Technology is disclosed for managing data in a distributed file system (“the technology”). The technology can gather metadata information associated with the data stored within a first file system, store the metadata information in association with a data identifier within a second file system, retrieve the stored metadata information using the data identifier from within the second file system and locate and retrieve the data associated with the metadata information from within first file system.Type: GrantFiled: December 20, 2013Date of Patent: February 21, 2017Assignee: NETAPP, INC.Inventors: Kartheek Muthyala, Gaurav Makkar, Arun Suresh, Srinivasan Narayanamurthy
-
Patent number: 9571287Abstract: Storage providers can securely store data and avoid data duplication with secure derivative data and offload the responsibility of generating the secure derivative data to the data owners. Initially, a data source will provide an encrypted version of data and the secure derivative data to a remote storage provider. The secure derivative data can include a hash of the data, a hash of the encrypted version of the data, a hash tree generated from the data, and an encrypted version of the key used to encrypt the data. When the remote storage provider later receives a request to store the same data, the remote storage provider uses the secure derivative data for secure proofs of storage and for proof of data possession.Type: GrantFiled: September 19, 2014Date of Patent: February 14, 2017Assignee: NETAPP, INC.Inventor: Srinivasan Narayanamurthy
-
Patent number: 9507800Abstract: Technology is disclosed for managing data in a distributed processing system (“the technology”). In various embodiments, the technology pushes “cold” data from a primary storage of the distributed processing system to a backup storage thereby maximizing the usage of the space on the primary storage to store “hot” data on which most data processing activities are performed in the distributed processing system. The cold data is retrieved from the backup storage into the primary storage on demand, for example, upon receiving an access request from a client. While the primary storage stores the data in a format specific to the distributed processing system, the backup storage stores the data in a different format, for example, format corresponding to the type of backup storage.Type: GrantFiled: October 23, 2013Date of Patent: November 29, 2016Assignee: NETAPP, INC.Inventors: Srinivasan Narayanamurthy, Gaurav Makkar, Kartheek Muthyala, Arun Suresh
-
Publication number: 20160246803Abstract: Technology is disclosed for managing data in a distributed file system (“the technology”). The technology can gather metadata information associated with the data stored within the distributed file system, create a secondary namespace within a local file system of a local host using the gathered metadata information and store the gathered metadata information as files within the secondary namespace. Further, when a request to create a PPI of the distributed file system is received, the technology can create a PPI of the secondary namespace using a PPI creation feature of the local file system.Type: ApplicationFiled: April 12, 2016Publication date: August 25, 2016Applicant: NETAPP, INC.Inventors: Gaurav Makkar, Srinivasan Narayanamurthy, Kartheek Muthyala