Using duplicated data to enhance data security in RAID environments
Abstract:
A method for processing a data object access request in a storage system having storage devices can include receiving an access request for accessing a first data object, the request being received by a controller that stores at least two consecutive data objects received by the storage system in different storage devices. The method may then include detecting that the first data object is corrupted, and determining, in response to the detecting, that a second data object has identical data as the first data object. Determining that the second data object has identical information as the first data object can include determining that a first metadata tag corresponding with the first data object and a second metadata tag corresponding with the second data object are identical. The second data object can then be provided in a response to the access request.
Information query
Patent Agency Ranking
0/0