Browse Prior Art Database

Method for Securing Cloud Storage Via RAID Ordering and Distribution

IP.com Disclosure Number: IPCOM000238777D
Publication Date: 2014-Sep-17
Document File: 2 page(s) / 57K

Publishing Venue

The IP.com Prior Art Database

Abstract

Method to add an additional layer of security to cloud data by distributing the data bits across various cloud storage spaces in a unique size and ordering pattern.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

Method for Securing Cloud Storage Via RAID Ordering and Distribution


Many consumers and companies are moving data to cloud solutions . Since the data is no longer stored locally , securing the data is now dependent on the cloud provider . This can sometimes be achieved by encrypting the data at the cloud provider's end with signers and certificate methodology . However, the data is often stored in one cloud location . This can be compromised should a hacker gain entry to the cloud storage environment and /or acquire the administrator credentials. Disgruntled employees or employees offered large monetary funds can also be known to copy data they have access to. Once compromised, unencrypted data is fully exposed and encrypted data can be copied off and efforts made to decipher the encryption.

This method utilizes a different approach to remove the intact data and add in unknown elements for deciphering the data. Essentially a new service known as an encryption server will work as an encryption /decryption engine for the end user/company. This server stores no pertinent data and has secure connections to various partner cloud servers . Based on the end user/company's selection of the provided clouds, their data is divided bit-by-bit to each cloud such that what is stored in each cloud has no meaning unless all cloud data and the correct rebuild sequence is available . Thus, the individual stored contents on each cloud are useless and a hacked or compromised cloud environment will not yield useful data. Furthermore, as the encryption server holds no data and the engine only acts on properly provided cloud/sequence data, exposed information is extremely limited.

First time data storage :


1) User connects to the encryption server page and creates a log -in ID/password


2) User selects how many clouds to store their data across and has the option to select individual clouds based upon personal preference. Cloud locations are also provided should a country 's regulation require data to be stored within the country itself


3) User uploads their data to the encryption server


4) Encr...