Patents by Inventor Srisailendra Yallapragada
Srisailendra Yallapragada has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12117907Abstract: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: October 15, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Patent number: 12105595Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.Type: GrantFiled: September 28, 2022Date of Patent: October 1, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Patent number: 12032529Abstract: Methods of cloning data backup across namespaces are disclosed. One or more source files are cloned from a first namespace to a second namespace, as one or more destination files. When the cloning of the source file(s) is performed, a data structure including source file information and destination file information is generated. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where the source synthetic file uses the source file(s) as one or more base files on the first namespace. When the cloning of the source synthetic file is performed, the data structure is looked up to obtain the source file information and the destination file information. Based on the source file information and the destination file information, synthetic information of the destination synthetic file is updated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: July 9, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Patent number: 11977460Abstract: Systems and methods for reconstructing a namespace in response to a loss of data are described herein. To reconstruct the namespace, metadata super segments within a set of file containers may be located in response to a determination that original namespace metadata associated with files stored within the containers is unreadable. Content handles linking the super segment to metadata for each of the files may then be reconstructed from the super segments. Both inode numbers and M-tree identifiers are also extracted from the super segments for each of the files referenced by the super segments. Then, a plurality of U-trees is assembled by aggregating and linking the inode numbers of the files referenced within the super segments based on the M-tree identifiers. Finally, the recovered namespace metadata tree data structure for all of the files within the plurality of LP containers is assembled by aggregating and linking the U-trees.Type: GrantFiled: February 28, 2023Date of Patent: May 7, 2024Assignee: Dell Products L.P.Inventors: George Mathew, Srisailendra Yallapragada, Murthy Mamidi, Keyur Desai, Dhawal Bhagwat
-
Publication number: 20240104057Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date and a selection period to select a subset of data objects to be protected during the protection period. A retention lock is applied to the subset of data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A cloud bucket is created for storing the subset of data objects and a new filesystem is spawned for attachment to the cloud bucket. Upon expiration of the selection period, the retention locks are expired and the new filesystem is destroyed.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Publication number: 20240104052Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date and a selection period to select a subset of data objects to be protected during the protection period. A retention lock is applied to files that meet a set selection criteria, as determined by a matching or filter process. The selection criteria can include one or more of time-based selection, filetype selection, or tag-based selection.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Publication number: 20240103978Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Publication number: 20240020275Abstract: A method for providing data immutability using a deduplication filesystem for data objects stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing deletion, modification or movement of the data objects by an unauthorized entity. The method defines a renew threshold date within the protection duration, and performs a garbage collection (GC) operation at the renew threshold date to permanently delete dead data objects and carry forward live data objects, and extends the retention lock on remaining live data objects and subsequently written data objects upon completion of the GC operation.Type: ApplicationFiled: July 14, 2022Publication date: January 18, 2024Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Publication number: 20240012718Abstract: Data protection aware data migration in distributed systems is disclosed. While actively migrating data from a source to a target, the process of protecting the data is performed with respect to a recovery system. Thus, data is replicated to both the target and the recovery system. During a final phase, synchronization data is sent to both the target and the recovery system. After transmitting the synchronization data, replication or migration then between the source and the target and between the source and the recovery system ceases. The target then synchronized with the recovery system based on the synchronization data and begins operation as a new source. The old source, from which the data was migrated to the new source, may be decommissioned.Type: ApplicationFiled: July 7, 2022Publication date: January 11, 2024Inventors: Ashutosh Bahadure, Srisailendra Yallapragada
-
Patent number: 11822431Abstract: Embodiments of a system and method for migrating data from a first cloud network provided from a first cloud service provider (CSP) and a second cloud network provided by a second CSP. The method reads and packs only live data containers from the first cloud using a Garbage Collection (GC) process. It performs a collection replication process replicating a local container set (CSET) from the first cloud network to the second cloud network, and replicates data containers from the first cloud network to the second cloud network. It then uses a container manager process to write data containers on the second cloud network.Type: GrantFiled: October 20, 2021Date of Patent: November 21, 2023Assignee: Dell Products, L.P.Inventors: Chetan Risbud, Ashwani Mujoo, Srisailendra Yallapragada, Mandar J. Kulkarni
-
Publication number: 20230350857Abstract: Methods of cloning data backup across namespaces are disclosed. One or more source files are cloned from a first namespace to a second namespace, as one or more destination files. When the cloning of the source file(s) is performed, a data structure including source file information and destination file information is generated. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where the source synthetic file uses the source file(s) as one or more base files on the first namespace. When the cloning of the source synthetic file is performed, the data structure is looked up to obtain the source file information and the destination file information. Based on the source file information and the destination file information, synthetic information of the destination synthetic file is updated to use the destination file(s) as one or more base files on the second namespace.Type: ApplicationFiled: April 29, 2022Publication date: November 2, 2023Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Publication number: 20230350765Abstract: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.Type: ApplicationFiled: April 29, 2022Publication date: November 2, 2023Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Publication number: 20230274013Abstract: A method of blocking access to files encrypted with a compromised key by mapping keys and ranges of containers encrypted by the keys. Upon notification that a key is compromised, fencing a container range corresponding to data segments encrypted by the compromised key to prevent deduplication operations on the segments. The method makes a point-in-time copy of the filesystem managing the segments, wherein each file of the file system is represented as tree structure having a root level and other levels. The method iteratively inspects in a level-wise manner, each container in each level of the file trees of the files to identify containers having segments encrypted by the compromised key, and marks files corresponding to the identified containers as not readable to block the access to the files encrypted with the compromised key.Type: ApplicationFiled: February 28, 2022Publication date: August 31, 2023Inventors: Nitin Madan, Srisailendra Yallapragada, Mahadev Karadigudda, Madhu Agrahara Gopalakrishna, Srikanth Srinivasan
-
Patent number: 11740977Abstract: Embodiments for balancing cloud resource capacity for cross-node movement of files in a scaled out backup system, and for dynamically allocating cloud storage resources in a multi-node network having a file system. A process determines a destination node with dedicated cloud storage capable of storing a file selected for long term retention. It transfers the file to the cloud storage of the destination node while maintaining metadata of the file in the cloud tier local storage of the destination node, such as by using remote procedure calls between the destination and source nodes. It then updates a global namespace of the file system with a handle indicating a current location of the file as the cloud storage of the destination file, thus allowing access to the file through the metadata stored in the local storage of the source node.Type: GrantFiled: January 27, 2020Date of Patent: August 29, 2023Assignee: EMC IP Holding Company LLCInventors: Alok Katiyar, Srisailendra Yallapragada, Chetan Risbud, Sanjay Vedanthan
-
Publication number: 20230121708Abstract: Embodiments of a system and method for migrating data from a first cloud network provided from a first cloud service provider (CSP) and a second cloud network provided by a second CSP. The method reads and packs only live data containers from the first cloud using a Garbage Collection (GC) process. It performs a collection replication process replicating a local container set (CSET) from the first cloud network to the second cloud network, and replicates data containers from the first cloud network to the second cloud network. It then uses a container manager process to write data containers on the second cloud network.Type: ApplicationFiled: October 20, 2021Publication date: April 20, 2023Inventors: Chetan Risbud, Ashwani Mujoo, Srisailendra Yallapragada, Mandar J. Kulkarni
-
Publication number: 20210232459Abstract: Embodiments for balancing cloud resource capacity for cross-node movement of files in a scaled out backup system, and for dynamically allocating cloud storage resources in a multi-node network having a file system. A process determines a destination node with dedicated cloud storage capable of storing a file selected for long term retention. It transfers the file to the cloud storage of the destination node while maintaining metadata of the file in the cloud tier local storage of the destination node, such as by using remote procedure calls between the destination and source nodes. It then updates a global namespace of the file system with a handle indicating a current location of the file as the cloud storage of the destination file, thus allowing access to the file through the metadata stored in the local storage of the source node.Type: ApplicationFiled: January 27, 2020Publication date: July 29, 2021Inventors: Alok Katiyar, Srisailendra Yallapragada, Chetan Risbud, Sanjay Vedanthan
-
Patent number: 10929382Abstract: In general, embodiments of the invention relate to methods and systems for replicating data, which is stored in a source system, in a target system. More specifically, embodiments of the invention enable parallel transmission and verification of portions of the data. Once the portions of the data have been verified, embodiments of the invention combine the verified portions of the data to obtain the final combined data. The combined data is then verified.Type: GrantFiled: July 31, 2017Date of Patent: February 23, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Krithika Subramanian, Srisailendra Yallapragada, Harshadrai Parekh, Bhimsen Bhanjois
-
Patent number: 10877848Abstract: An example method includes receiving a stream that identifies I/O operations requested to be performed with respect to a data grouping, identifying, in the stream, random I/O requests and sequential I/O requests, queuing the sequential I/O requests in a priority/processing queue and processing the sequential I/O requests immediately without waiting for loading of any metadata, and processing a first one of the random I/O requests and a second one of the random I/O request. When the first and second random I/O requests each depend on the same range of metadata, the first and second random I/O requests are processed in the order received, and when the first and second random I/O requests each depend on different respective ranges of metadata, the first and second random I/O requests are processed at the same time.Type: GrantFiled: January 31, 2019Date of Patent: December 29, 2020Assignee: EMC IP HOLDING COMPANY LLCInventors: Balaji Subramanian, Yamini Allu, Srisailendra Yallapragada, Sirisha Kaipa, Vrushali Kulkarni
-
Publication number: 20190163575Abstract: An example method includes receiving a stream that identifies I/O operations requested to be performed with respect to a data grouping, identifying, in the stream, random I/O requests and sequential I/O requests, queuing the sequential I/O requests in a priority/processing queue and processing the sequential I/O requests immediately without waiting for loading of any metadata, and processing a first one of the random I/O requests and a second one of the random I/O request. When the first and second random I/O requests each depend on the same range of metadata, the first and second random I/O requests are processed in the order received, and when the first and second random I/O requests each depend on different respective ranges of metadata, the first and second random I/O requests are processed at the same time.Type: ApplicationFiled: January 31, 2019Publication date: May 30, 2019Inventors: Balaji Subramanian, Yamini Allu, Srisailendra Yallapragada, Sirisha Kaipa, Vrushali Kulkarni
-
Patent number: 10235248Abstract: In one example, a method includes receiving a stream that identifies I/O operations requested to be performed with respect to a data grouping, and identifying, in the stream, random I/O requests and sequential I/O requests. Next, the stream is split into an incoming queue containing the sequential I/O requests and a priority/processing queue containing the random I/O requests. A metadata load queue is then defined by assigning each of the random I/O requests to a respective range of metadata. The metadata of each range is loaded, and the random I/O requests re-queued. Using the loaded metadata, a random I/O operation is performed that corresponds to one of the random I/O requests. Finally, the random I/O operation and a sequential I/O operation are performed concurrently with each other.Type: GrantFiled: April 27, 2017Date of Patent: March 19, 2019Assignee: EMC IP HOLDING COMPANY LLCInventors: Balaji Subramanian, Yamini Allu, Srisailendra Yallapragada, Sirisha Kaipa, Vrushali Kulkarni