International Business Machines Corporation
Using internal sensors to detect adverse interference and take defensive actions
Last updated:
Abstract:
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. The computing device detects a potentially unauthorized access to a storage unit (SU) of a set of storage units (SUs) that distributedly stores a set of encoded data slices (EDSs) associated with a data object. The computing device issues access information to at least some other SUs based on the potentially unauthorized access to the SU that is detected. The computing device initiates a first unauthorized abatement process for the SU and/or a second unauthorized access abatement process for a first other SU based on receipt of other access information.
Utility
30 Jul 2018
30 Nov 2021