Method and system for performing deferred file removal in a...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C711S162000, C711S170000, C711S202000

Reexamination Certificate

active

06247024

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to removal of files from a file system and more particularly to a method and system for deferring removal of files without data integrity exposures.
BACKGROUND OF THE INVENTION
Conventional computer files systems are used to create, edit, and store files. Typically, such conventional computer systems include a virtual storage or memory and a storage device, such as a disk. In order to access the files created, such conventional computer systems associate metadata with each file. The metadata for the file indicates the physical location of the file on the disk. For example, the metadata typically includes a map indicating the blocks on the disk in which the file is stored. The metadata may also indicate other attributes of the file and may be used for other purposes. During operation, the conventional system typically keeps a copy of a portion of the file and its metadata in the virtual storage in order to have fast access to the file when performing operations on the file.
When operations are performed on the files, the metadata associated with the files should also be updated on the storage device. For example, if additional information is written to the file or some information is deleted from the file the metadata on the disk should be updated to indicate that the file is stored on different blocks on the disk. However, updating the metadata stored on the disk may be very slow. This is because accessing the disk may be much more time consuming than accessing the virtual storage. Consequently, the metadata typically is changed only in virtual storage when the operation is performed. The changes to metadata are saved to disk, or hardened, at predetermined intervals. As a result, the metadata on the disk may be periodically updated without substantially slowing the performance of the conventional system.
When a file is removed, or deleted, several operations are typically performed. As with other operations, the metadata associated with a file is updated after removal of the file. In addition, the location on the disk where the file was stored are freed. This allows other data to be stored in the locations. Moreover, a directory which lists the file is updated to delete the file from the directory.
In one conventional computer system, updating metadata for removal of a file is treated the same as for other operations. Changes to the directory are treated in the same manner as changes to the metadata. Thus, the metadata for the removed file is changed in virtual storage and these changes in the metadata hardened to disk at the next predetermined interval. Similarly, the directory in virtual storage is rewritten without the removed file and these changes hardened to disk at the next predetermined interval. However, the locations in which the removed file was stored are freed immediately. In certain operating systems, such as UNIX, this is done because the operating systems require that locations for a removed file be immediately available for use by another data file. As a result, additional time is not taken to access the disk when the file is removed and the locations for the removed file can be used to store another file.
Although this conventional system functions in most cases, data integrity exposures may occur. A data exposure occurs when data for a file is inadvertently made accessible through a different file. It is possible to create a new file before the changes to the metadata for the removed file are hardened to disk. Because the locations in which the removed file was stored were freed upon removal, the new file could be written to those locations. The system may crash after the new file is written to these locations but before the changes to the metadata and the directory are hardened to disk. When the system is rebooted, the new file is written in the locations on the disk. However, because the changes to the metadata for the removed file were not hardened to disk, the metadata for the removed file will be present. This metadata indicates that data for the removed file can be found in the same locations, which now hold data for the new file. Because the metadata for the removed file was not changed, the data for the new file can be accessed by accessing the removed file. A data integrity exposure has, therefore, occurred. This is considered an illegal situation by certain operating systems, such as UNIX, and can result in undesirable occurrences. For example, users who are authorized to access the removed file but not the new file can view and edit the data for the new file residing in the locations.
Another conventional system prevents data integrity exposures by treating a removal of a file differently from other operations. Such conventional systems immediately harden changes to the metadata for a removed file. Thus, the data integrity exposure does not occur.
However, because each metadata is hardened for each removal, performance of the system suffers. For each removal, the disk is accessed to update the metadata for the removed file. As a result, performance of the system is slowed. This reduction in performance is particularly large when multiple files are removed concurrently. Multiple files may be removed by certain user-initiated commands or when an application clears a cache or temporary files. For each file removed, the disk is accessed to update the metadata. Consequently, as the number of files being removed grows, the loss in performance grows.
Accordingly, what is needed is a system and method for removing data files without data integrity exposures and without drastic reductions in performance. The present invention addresses such a need.
SUMMARY OF THE INVENTION
The present invention provides a method and system for removing a file from a system. The system includes a storage device and a virtual storage. The file has associated metadata that indicates a location of the file on the storage device. A first copy of the associated metadata resides on the virtual storage. A second copy of the associated metadata resides on the storage device. The system and method comprise marking the file as removed and updating the second copy of the associated metadata substantially immediately if the system is to run out of space on the storage device and a next scheduled update of the second copy of the associated metadata has not occurred. The system and method further comprise indicating that the location is available for storing data substantially immediately if the system is to run out of space on the storage device and the next scheduled update has not occurred. In one aspect, the system and method also comprise updating the second copy of the associated metadata during the next scheduled update if the system is not to run out of space before the next scheduled update. In this aspect, the system and method also comprise indicating that the location is available for storing data during the next scheduled update if the system is not to run out of space before the next scheduled update.
According to the system and method disclosed herein, the present invention can defer updating metadata associated with a file that is removed without data integrity exposures, thereby increasing overall system performance.


REFERENCES:
patent: 4481606 (1984-11-01), Nozawa et al.
patent: 4761737 (1988-08-01), Duvall et al.
patent: 4945474 (1990-07-01), Elliott
patent: 5155835 (1992-10-01), Belsan
patent: 5222217 (1993-06-01), Blount et al.
patent: 5297278 (1994-03-01), Wang et al.
patent: 5345575 (1994-09-01), English et al.
patent: 5410667 (1995-04-01), Belsan et al.
patent: 5479655 (1995-12-01), Iwamoto et al.
patent: 5511177 (1996-04-01), Kagimasa et al.
patent: 5530850 (1996-06-01), Ford et al.
patent: 5555388 (1996-09-01), Shaughnessy
patent: 5559957 (1996-09-01), Balk
patent: 5592669 (1997-01-01), Robinson et al.
patent: 5604900 (1997-02-01), Iwamoto et al.
patent: 5642501 (1997-06-01), Doshi et al.
patent: 5644698 (1997-07-01), Cannon
patent: 5668958 (1997-09-01), Bendert et al.
patent: 5692178 (1997-11-01), Shaughne

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for performing deferred file removal in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for performing deferred file removal in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for performing deferred file removal in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2481258

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.