Method of Data Protection Using a Storage Area Network
Burton J. Rosenberg
Conventionally, data security is achieved through various encryption methods. Encryption typically requires a key, thereby introducing numerous key management issues. The problem of data security is replaced by problems of key management, such as who is trusted with the key, how is it delivered to trusted parties, how trusted parties store and present the key, how is the key recovered if lost, and revoked if compromised. In certain contexts (for example, when the data must reside at a single location, and must be encrypted for security) the considerable problem of key management is inescapable. However, in other contexts (for example, when the data can be saved at several locations and simultaneous compromise at all locations is unlikely) these key management complications are unnecessary. A method is needed to provide adequate data protection and allow simple and transparent data access without the need for keys and key management.
The invention provides a method of splitting data between separate storage devices in a way that only if enough pieces are brought together the data can be reconstructed. It uses the technology of block level data storage to distribute the shares of data across a network so that each piece is stored in a separate location, with separate backup and storage methodologies and policies. Because each share reveals nothing about the data there is no possibility that an inadvertent security failure or a corrupt insider at a single location will compromise the data security. Some of the benefits, provided by the invention, include:
Secure data storage, archival, and back-up without encryption keys.
Resistance to data loss from catastrophic device or site failure.
Improved architecture of Storage Area Network with built-in data security.
Simple installation that requires no application level changes to existing data storage systems.
The invention provides improved security of data storage, archival, and back-up without the use of encryption.
This invention facilitates secure data storage.
A U.S. patent application entitled “METHOD AND SYSTEM FOR DATA SECURITY” was filed on August 17, 2007.
We are seeking a commercialization partner with capabilities in product development, sales, and marketing. An exclusive worldwide license is available.
About the Inventors
Dr. Burton Rosenberg is an Associate Professor of Computer Science at the University of Miami. His interests include cryptography and data visualization. He is the discoverer of several security flaws in protocols and applications by Microsoft, Citrix, and others. He holds a Ph.D. from Princeton University, a Masters from Columbia, and a Bachelors from MIT. His background includes both in academia and industry, having been employed by Citrix, Medical Labs Automation, and as a digital signal processing consultant to Acoustic Research.
Optimal Exercise of Russian Options in the Binomial Model. Robert W, Chen, Burton Rosenberg, Computational Finance and its Applications, WIT Press (2006) pp 171-181.
Inferring Model Parameters in Markets with Collars. Robert Chen, Burton Rosenberg, Yi-Tsung Lee, Computational Finance and its Applications, WIT Press (2004) 167-175.