Detection of sensitive personal information in a storage device

ABSTRACT

A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.

TECHNICAL FIELD

The present invention relates generally to detecting sensitive personalinformation, and more particularly to detecting sensitive personalinformation in a storage device by identifying changed blocks containingsensitive personal information using a character scanning technique(e.g., regular expression) and then translating those blocks from ablock level to a file level using a hierarchical reverse mappingtechnique to identify file objects that are deemed to contain sensitivepersonal information.

BACKGROUND

Currently, sensitive personal information (also referred to aspersonally identifiable information) is detected in a storage device innear real-time via textual processing of the files in a file system forthe storage device. Sensitive personal information, as used herein,refers to information (e.g., financial and health information, socialsecurity numbers, data about children, geolocation data) that can beused on its own or with other information to identify, contact or locatea single person or to identify an individual in context. A file istechnically defined as an ordered set of characters implemented over ablock device. A file then is a collection of extents, with each extentcorresponding to a contiguous set of blocks, obtained from a blockdevice (also referred to as a logical unit number (LUN)). A block is acontiguous set of bits or bytes that forms an identifiable unit of data.Since sensitive personal information is detected in the storage devicein near real-time via textual processing of the files at the file layer,all of the blocks associated with those files are also processed. As aresult, a large quantity of blocks are being processed in order todetect sensitive personal information in the storage device in nearreal-time. The system needs to detect sensitive personal information atthe file layer since the end user (or other consumer) is usually onlyinterested in that level of granularity of detection.

Hence, the common approach to detecting sensitive personal informationinvolves detecting sensitive personal information at a file by filelevel leading to large amounts of data being processed even for smallchanges within a file, perhaps spanning a single block. By processing alarge quantity of blocks, an inordinate amount of computing resources isbeing utilized to detect sensitive personal information. Furthermore, byprocessing a large quantity of blocks, it increases the time indetecting sensitive personal information.

SUMMARY

In one embodiment of the present invention, a method for detectingsensitive personal information in a storage device comprises processinga block delta list, where the block delta list is a list of changedblocks in a storage device, and where the block delta list includesdeltas associated with the changed blocks that indicate differences inthe changed blocks from a first point of time to a second point of time.The method further comprises identifying changed blocks from the blockdelta list. The method additionally comprises searching the identifiedchanged blocks for sensitive personal information using a characterscanning technique. Furthermore, the method comprises identifying achanged block deemed to contain the sensitive personal information.Additionally, the method comprises translating the identified changedblock from a block level to a file level using a hierarchical reversemapping technique.

Other forms of the embodiment of the method described above are in asystem and in a computer program product.

The foregoing has outlined rather generally the features and technicaladvantages of one or more embodiments of the present invention in orderthat the detailed description of the present invention that follows maybe better understood. Additional features and advantages of the presentinvention will be described hereinafter which may form the subject ofthe claims of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the present invention can be obtained when thefollowing detailed description is considered in conjunction with thefollowing drawings, in which:

FIG. 1 illustrates a storage system configured in accordance with anembodiment of the present invention;

FIG. 2 illustrates the reverse map lookup data structure to arbitrarilylook-up a physical block number in a logical unit number (LUN) to obtaina file name in the name space of the file system at the top of thesoftware stack in accordance with an embodiment of the presentinvention;

FIG. 3 illustrates an embodiment of the present invention of a hardwareconfiguration of a computing system which is representative of ahardware environment for practicing the present invention;

FIG. 4 is a flowchart of a method for establishing a block delta list inaccordance with an embodiment of the present invention; and

FIG. 5 is a flowchart of a method for detecting sensitive personalinformation in a storage device in accordance with an embodiment of thepresent invention.

DETAILED DESCRIPTION

The present invention comprises a method, system and computer programproduct for detecting sensitive personal information in a storagedevice. In one embodiment of the present invention, a block delta listcontaining a list of changed blocks in the storage device is processed.A block delta list is a list of changed blocks as well as the deltas(differences in the block from a first point of time to a second pointof time) associated with those changed blocks. A changed block refers toa block (contiguous set of bits or bytes that forms an identified unitof data) whose identifiable unit of data has changed over a period oftime. For example, a block may have changed due to the storing ofsensitive personal information. After identifying the changed blocksfrom the block delta list, a search is performed on those identifiedchanged blocks for sensitive personal information using a characterscanning technique, such as regular expression. “Regular expression,” asused herein, refers to a sequence of characters (metacharacters and/orregular characters) that define a search pattern. After identifying achanged block deemed to contain sensitive personal information, thechanged block is translated from the block level to the file level usinga hierarchical reverse mapping technique. Such a translation is made soas to identify the file on the file level containing the sensitivepersonal information. In one embodiment, the hierarchical reversemapping technique uses block level translations and file system inodetranslations. By only analyzing the changed blocks to determine if theycontain sensitive personal information as opposed to analyzing the filesat the file layer, including all of the blocks associated with thosefiles, a lesser quantity of blocks needs to be processed in order todetect sensitive personal information in the storage device in nearreal-time. In this manner, a lesser amount of computing resources needsto be utilized to detect sensitive personal information. Furthermore,the processing time in detecting sensitive personal information isreduced.

In the following description, numerous specific details are set forth toprovide a thorough understanding of the present invention. However, itwill be apparent to those skilled in the art that the present inventionmay be practiced without such specific details. In other instances,well-known circuits have been shown in block diagram form in order notto obscure the present invention in unnecessary detail. For the mostpart, details considering timing considerations and the like have beenomitted inasmuch as such details are not necessary to obtain a completeunderstanding of the present invention and are within the skills ofpersons of ordinary skill in the relevant art.

Referring now to the Figures in detail, FIG. 1 illustrates a storagesystem 100 for practicing the principles of the present invention inaccordance with an embodiment of the present invention. Storage system100 includes a file system 101, which is used to control how data isstored and retrieved. Storage system 100 further includes a storagecontroller 102, which may be physical or virtual. Storage controller 102is configured to control the storing of data in storage devices103A-103C, which may be physical or virtual, connected to storagecontroller 102. Storage devices 103A-103C may collectively orindividually be referred to as storage devices 103 or storage device103, respectively.

In connection with controlling the storing of data in storage devices103, file system 101 and storage controller 102 communicate the logicalunit numbers (LUNS) 104 between each other, where a LUN is a uniqueidentifier for designating an individual or collection of physical orvirtual storage devices 103. In this manner, the particular storagedevice 103 may be easily identified.

Furthermore, a namespace, which refers to a set of symbols that is usedto organize objects so that these objects may be referred to by a name,may be communicated to storage controller 102 from file system 101, toidentify files assigned to that name. Also, an inode of file system 101is a data structure that describes a file system object, such as a file.The file system inode translations, which include the attributes (e.g.,metadata, such as time of last change, access, modification) and blocklocations of the file's data, is communicated to storage controller 102to assist in the translation of a block from the block level to the filelevel. The namespace and file system inode translations are shown inelement 105 of file system 101. Such information 105 may be stored in acache 106 in storage controller 102.

Furthermore, storage controller 102 may store a LUN level block deltalist 107 containing a list of changed blocks, where a changed blockrefers to a block (contiguous set of bits or bytes that forms anidentified unit of data) whose identifiable unit of data has changedover a period of time. For example, a block may have changed due to thestoring of sensitive personal information. These changed blocks may thenbe analyzed to determine if they contain sensitive personal information,such as by using a character scanning technique, as discussed below. Byonly analyzing these changed blocks to determine if they containsensitive personal information as opposed to analyzing the files at thefile layer, including all of the blocks associated with those files, alesser quantity of blocks needs to be processed in order to detectsensitive personal information in storage device 103 in near real-time.In one embodiment, prior to the point in time in analyzing the changedblocks, it has been previously determined whether the blocks containsensitive personal information. As a result, only the changed blocks areof interest to determine if they contain sensitive personal information.In this manner, a lesser amount of computing resources needs to beutilized to detect sensitive personal information. Furthermore, theprocessing time in detecting sensitive personal information is reduced.Hence, there is an improvement of computer efficiency thereby improvingthe functionality of computing systems. That is, the present inventionprovides a technical solution to the technical problem of using aninordinate amount of computing resources and time in detecting sensitivepersonal information in storage devices.

Furthermore, as shown in FIG. 1, storage controller 102 includes a queue108 for storing a block delta list that is later processed by storagecontroller 102, such as by processing unit (PU) 109.

Furthermore, FIG. 1 is not to be limited in scope to the number ofdepicted elements. For example, while FIG. 1 illustrates a single PU109, storage controller 102 may utilize any number of processing units(e.g., graphical processing units). In another example, while FIG. 1illustrates a single file system 101, storage system 100 may include anynumber of file systems 101, including different types of file systems.

In one embodiment, storage system 100, including file system 101 andstorage controller 102, may reside on a computing system, such as shownin FIG. 3. In one embodiment, file system 101 is a part of the operatingsystem. In another embodiment, file system 101 refers to the hardwareused for nonvolatile storage, the software application that controls thehardware or the architecture of both the hardware and software. In oneembodiment, storage controller 102 may be a virtualized storagecontroller, such as having its operations executed by a virtual machinewhich is run by a hypervisor, which may be implemented in microcoderunning on the processor or it may be implemented in software as part ofa virtual operating system.

Furthermore, in one embodiment, the present invention utilizes a datastructure as shown in FIG. 2, referred to herein as the “reverse maplookup data structure,” to arbitrarily look-up a physical block numberin a LUN to obtain a file name in the name space of the file system atthe top of the software stack. In this manner, one is able to locate thefiles that have sensitive personal information in the ever changing filesystem sitting on top of the physical storage LUN.

In one embodiment, the storage hierarchy of the reverse map lookup datastructure may consist of multiple layers, such as the file system layer201, the logical volume manager (LVM) layer 202 and the storagecontroller layer 203 as shown in FIG. 2.

Referring to FIG. 2, in conjunction with FIG. 1, in one embodiment, eachlayer 201, 202, 203 exposes a logical layer and an underlying physicallayer upon which the logical layer is built.

As illustrated in FIG. 2, file system layer 201 includes the fileextents 204 (“superblock”) and the file name space 205 (previouslydiscussed above in connection with element 105).

As further illustrated in FIG. 2, LVM layer 202 includes the logicalvolume mappings (“Logical Volume Maps”) 206, such as the mappingsbetween the logical and physical block device names as well as the LVMname space 207.

Furthermore, as illustrated in FIG. 2, storage controller layer 203includes the LUN mappings (“LUN Maps”) 208, such as associating a LUNwith an igroup, as well as the LUN name space 209.

In one embodiment, storage controller layer 203 exposes the underlyingphysical layer of spindles (physical disk drives) 210A-210C. Spindles210A-210C may collectively or individually be referred to as spindles210 or spindle 210, respectively. FIG. 2 is not to be limited in scopeto the depicted number of spindles 210.

In one embodiment, the logical to physical mappings are obtained fromeach layer 201, 202, 203, where the “physical” blocks are hashed to afile name (see 211), a LVM name (see 212) and a LUN name (see 213),respectively.

Furthermore, as shown in FIG. 2, the block delta list (see element 107of FIG. 1) is obtained from storage controller layer 203 which isprocessed in parallel or iterative (see 214). The file for the block isthen found by performing a lookup 215. Furthermore, the physical blocksfrom hash 211, 212, 213 are identified by performing lookups 215, 216,217, respectively, where the information from lookup 215 is used toperform lookup 216, and the information from lookup 216 is used toperform lookup 217.

The result of lookup 217 is identifying file names containing sensitivepersonal information. These file names are merged 218 so that the enduser can identify a set of files that contain sensitive personalinformation.

This list of file names at the top of the storage hierarchy containingsensitive personal information can be identified in near real-time usingthe principles of the present invention.

Referring to 218, in one embodiment, any change in a file object thatremoves sensitive personal information is detected in the same way as ablock change and that block change is checked against a persisted set ofphysical blocks that previously had sensitive personal information. Whenall known sensitive blocks associated with that same file are cleaned(i.e., the sensitive personal information in the blocks associated withthe same file is removed or redacted), the merge 218 will remove themarked file from the list of files (list of file names) maintained bystorage system 100 known to contain sensitive personal information.

In one embodiment, if the sensitive personal information contained in ablock is removed, then the block is added to a “remove list” (list ofblocks to be removed). If the remove list of blocks for a file goes tozero, then the file is removed from the list of files maintained bystorage system 100 known to contain sensitive personal information.

In one embodiment, storage system 100 solves the functionFname=Lookup(Block ID) at any layer of the hierarchy using block deltalist 107. By solving such a function, storage system 100 hashes thephysical blocks from the logical to physical mappings for each layer asit moves up the layers 203, 202 and 201 in a chain fashion. In eachcase, a 2-tuple of the logical name and the logical block of the layerabove it are returned. In one embodiment, the hash map is based purelyon the start of an extent in each layer. In one embodiment, a hash tableof the starting offset of the extent is utilized as the key and thepayload is the logical object name. In one embodiment, in general, theblock in the lowest layer 203 does not span 2 objects/extents as itwould break the functionality of storage system 100.

Referring now to FIG. 3, FIG. 3 illustrates an embodiment of the presentinvention of a hardware configuration of a computing system 300 which isrepresentative of a hardware environment for practicing the presentinvention. Referring to FIG. 3, computing system 300 has a processor 301coupled to various other components by system bus 302. An operatingsystem 303 runs on processor 301 and provides control and coordinatesthe functions of the various components of FIG. 3. An application 304 inaccordance with the principles of the present invention runs inconjunction with operating system 303 and provides calls to operatingsystem 303 where the calls implement the various functions or servicesto be performed by application 304. Application 304 may include, forexample, a program for detecting sensitive personal information in astorage device as discussed further below in connection with FIGS. 4-5.

Referring again to FIG. 3, read-only memory (“ROM”) 305 is coupled tosystem bus 302 and includes a basic input/output system (“BIOS”) thatcontrols certain basic functions of computing system 300. Random accessmemory (“RAM”) 306 and disk adapter 307 are also coupled to system bus302. It should be noted that software components including operatingsystem 303 and application 304 may be loaded into RAM 306, which may becomputing system's 300 main memory for execution. Disk adapter 307 maybe an integrated drive electronics (“IDE”) adapter that communicateswith a disk unit 308, e.g., disk drive. It is noted that the program fordetecting sensitive personal information in a storage device, asdiscussed further below in connection with FIGS. 4-5, may reside in diskunit 308 or in application 304.

Computing system 300 further includes a communications adapter 309coupled to bus 302. Communications adapter 309 interconnects bus 302with an outside network thereby allowing computing system 300 tocommunicate with other devices.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a computer, or other programmable data processing apparatusto produce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks. These computerreadable program instructions may also be stored in a computer readablestorage medium that can direct a computer, a programmable dataprocessing apparatus, and/or other devices to function in a particularmanner, such that the computer readable storage medium havinginstructions stored therein comprises an article of manufactureincluding instructions which implement aspects of the function/actspecified in the flowchart and/or block diagram block or blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be accomplished as one step, executed concurrently,substantially concurrently, in a partially or wholly temporallyoverlapping manner, or the blocks may sometimes be executed in thereverse order, depending upon the functionality involved. It will alsobe noted that each block of the block diagrams and/or flowchartillustration, and combinations of blocks in the block diagrams and/orflowchart illustration, can be implemented by special purposehardware-based systems that perform the specified functions or acts orcarry out combinations of special purpose hardware and computerinstructions.

As stated in the Background section, since sensitive personalinformation is detected in the storage device in near real-time viatextual processing of the files at the file layer, all of the blocksassociated with those files are also processed. As a result, a largequantity of blocks are being processed in order to detect sensitivepersonal information in the storage device in near real-time. Byprocessing a large quantity of blocks, an inordinate amount of computingresources is being utilized to detect sensitive personal information.Furthermore, by processing a large quantity of blocks, it increases thetime in detecting sensitive personal information.

The principles of the present invention provide a means for detectingsensitive personal information in a storage device using fewer computingresources in a shorter amount of time by identifying changed blockscontaining sensitive personal information using a character scanningtechnique and then translating those blocks from a block level to a filelevel using a hierarchical reverse mapping technique as discussed belowin connection with FIGS. 4-5. FIG. 4 is a flowchart of a method forestablishing a block delta list. FIG. 5 is a flowchart of a method fordetecting sensitive personal information in a storage device.

As stated above, FIG. 4 is a flowchart of a method 400 for establishinga block delta list in accordance with an embodiment of the presentinvention.

Referring to FIG. 4, in conjunction with FIGS. 1-3, in step 401, storagecontroller 102 conducts an initial scan of the blocks in storage device103.

In step 402, storage controller 102 identifies any changed blocks instorage device 103. A changed block refers to a block (contiguous set ofbits or bytes that forms an identified unit of data) whose identifiableunit of data has changed over a period of time. For example, a block mayhave changed due to the storing of sensitive personal information. Inone embodiment, prior to the point in time in analyzing the changedblocks (discussed further below in connection with FIG. 5), it has beenpreviously determined whether the blocks contain sensitive personalinformation. As a result, only the changed blocks are of interest todetermine if they contain sensitive personal information. In oneembodiment, storage controller 102 detects differences in a block from afirst point of time to a second point of time and records suchdifferences in files called deltas.

In step 403, storage controller 102 adds the identified changed block toa block delta list 107. A block delta list, as used herein, refers to alist of changed blocks. In one embodiment, such a list includes thedeltas associated with those changed blocks that indicate thedifferences in those blocks from a first point of time to a second pointof time.

In step 404, storage controller 102 queues block delta list 107 in queue108.

Once block delta list 107 is queued in queue 108, such information maybe used by storage controller 102 to determine if the changed blockscontain sensitive personal information, such as by using a characterscanning technique, as discussed below in connection with FIG. 5.

FIG. 5 is a flowchart of a method 500 for detecting sensitive personalinformation in a storage device in accordance with an embodiment of thepresent invention.

Referring to FIG. 5, in conjunction with FIGS. 1-4, in step 501, storagecontroller 102 processes block delta list 107 in queue 108. In oneembodiment, the changed blocks in the block delta list 107 are processedin parallel.

In step 502, storage controller 102 identifies the changed blocks fromblock delta list 107.

In step 503, storage controller 102 searches the changed blocks forsensitive personal information using a character scanning technique,such as convolutional neural network, recurrent neural network, regularexpression, etc. “Regular expression,” as used herein, refers to asequence of characters (metacharacters and/or regular characters) thatdefine a search pattern. In one embodiment, the search pattern is usedby string searching algorithms for “find” operations on strings. By onlyanalyzing the changed blocks to determine if they contain sensitivepersonal information as opposed to analyzing the files at the filelayer, including all of the blocks associated with those files, a lesserquantity of blocks needs to be processed in order to detect sensitivepersonal information in storage device 103 in near real-time. In thismanner, a lesser amount of computing resources needs to be utilized todetect sensitive personal information. Furthermore, the processing timein detecting sensitive personal information is reduced. Hence, there isan improvement of computer efficiency thereby improving thefunctionality of computing systems. That is, the present inventionprovides a technical solution to the technical problem of using aninordinate amount of computing resources and time in detecting sensitivepersonal information in storage devices.

In step 504, storage controller 102 identifies a changed block deemed tocontain sensitive personal information. In one embodiment, suchsensitive personal information is identified by matching the regularexpression (the search pattern) with the data stored in the changedblock. For example, the regular expression may include the strings of“Name” and “SSN” (SSN refers to social security number). Storagecontroller 102 may then search the changed blocks for those containingthe strings of “Name” and “SSN.” When there is a match, the changedblock may be said to contain sensitive personal information.

In step 505, a determination is made by storage controller 102 as towhether the sensitive personal information is located in the middle ofthe identified changed block. A determination is made as to whether thesensitive personal information is located in the middle of theidentified changed block in order to ensure that the changed blockcontains the entirety of the sensitive personal information.

If the sensitive personal information is located in the middle of theidentified changed block, then, in step 506, storage controller 106translates the changed block deemed to contain sensitive personalinformation from the block level to the file level using a hierarchicalreverse mapping technique. Such a translation is made so as to identifythe file on the file level containing the sensitive personalinformation. In one embodiment, the hierarchical reverse mappingtechnique uses block level translations and file system inodetranslations. The block level translations may include the attributes(e.g., metadata, such as time of last change, access, modification) andlocation of the block. The file system inode translations may includethe attributes (e.g., metadata, such as time of last change, access,modification) and block locations of the file's data. Such informationmay be used by storage controller 102 to translate the changed blockfrom a block level to a file level (e.g., particular file on aparticular file system).

If, however, the sensitive personal information is not located in themiddle of the identified changed block, then the sensitive personalinformation is located at an edge (e.g., beginning or end) of theidentified changed block.

If the sensitive personal information is located at an edge of theidentified changed block, then, in step 507, storage controller 102searches the blocks in storage device 103 to locate adjacent block(s) tothe identified changed block.

In step 508, storage controller 102 combines the adjacent block(s) withthe identified changed block to form a new single block.

Storage controller 102 then determines whether the sensitive personalinformation is located at the middle of the new single block in step505.

In one embodiment, the present invention is able to be implemented withstorage systems that implement block redundancy elimination orblock-level deduplication. In one embodiment, the present invention isable to be implemented with storage systems that implement block levelcompression and/or encryption if the necessary compression algorithm andencryption keys are made available.

Furthermore, the present invention can utilize the cloud infrastructureto detect sensitive personal information in a storage device byidentifying changed blocks containing sensitive personal informationusing a character scanning technique and then translating those blocksfrom a block level to a file level using a hierarchical reverse mappingtechnique to identify file objects that are deemed to contain sensitivepersonal information. For example, storage system 100 of FIG. 1 can beimplemented using the cloud infrastructure. A person of ordinary skillin the art would be capable of applying the principles of the presentinvention to such implementations. Further, embodiments applying theprinciples of the present invention to such implementations would fallwithin the scope of the present invention.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

1. A method for detecting sensitive personal information in a storagedevice, the method comprising: processing a block delta list, whereinsaid block delta list is a list of changed blocks in a storage device,wherein said block delta list includes deltas associated with saidchanged blocks that indicate differences in said changed blocks from afirst point of time to a second point of time; identifying changedblocks from said block delta list; searching said identified changedblocks for sensitive personal information using a character scanningtechnique; identifying a changed block deemed to contain said sensitivepersonal information; and translating said identified changed block froma block level to a file level using a hierarchical reverse mappingtechnique.
 2. The method as recited in claim 1 further comprising:conducting an initial scan of blocks in said storage device.
 3. Themethod as recited in claim 2 further comprising: identifying any changedblocks in said storage device, wherein a block is a contiguous set ofbits or bytes that forms an identifiable unit of data, wherein a changedblock is said block with an identifiable unit of data that has changedover a period of time, wherein said block is changed due to a storing ofsensitive information.
 4. The method as recited in claim 3 furthercomprising: adding said identified changed blocks to said block deltalist.
 5. The method as recited in claim 1, wherein said hierarchicalreverse mapping technique uses block level translations and file systeminode translations.
 6. The method as recited in claim 1, wherein saidcharacter scanning technique comprises a convolutional neural network, arecurrent neural network or a regular expression.
 7. The method asrecited in claim 1, wherein said identified changed block is translatedfrom said block level to said file level using said hierarchical reversemapping technique in response to said sensitive personal informationbeing located in a middle of said identified changed block.
 8. Acomputer program product for detecting sensitive personal information ina storage device, the computer program product comprising one or morecomputer readable storage mediums having program code embodiedtherewith, the program code comprising the programming instructions for:processing a block delta list, wherein said block delta list is a listof changed blocks in a storage device, wherein said block delta listincludes deltas associated with said changed blocks that indicatedifferences in said changed blocks from a first point of time to asecond point of time; identifying changed blocks from said block deltalist; searching said identified changed blocks for sensitive personalinformation using a character scanning technique; identifying a changedblock deemed to contain said sensitive personal information; andtranslating said identified changed block from a block level to a filelevel using a hierarchical reverse mapping technique.
 9. The computerprogram product as recited in claim 8, wherein the program code furthercomprises the programming instructions for: conducting an initial scanof blocks in said storage device.
 10. The computer program product asrecited in claim 9, wherein the program code further comprises theprogramming instructions for: identifying any changed blocks in saidstorage device, wherein a block is a contiguous set of bits or bytesthat forms an identifiable unit of data, wherein a changed block is saidblock with an identifiable unit of data that has changed over a periodof time, wherein said block is changed due to a storing of sensitiveinformation.
 11. The computer program product as recited in claim 10,wherein the program code further comprises the programming instructionsfor: adding said identified changed blocks to said block delta list. 12.The computer program product as recited in claim 8, wherein saidhierarchical reverse mapping technique uses block level translations andfile system inode translations.
 13. The computer program product asrecited in claim 8, wherein said character scanning technique comprisesa convolutional neural network, a recurrent neural network or a regularexpression.
 14. The computer program product as recited in claim 8,wherein said identified changed block is translated from said blocklevel to said file level using said hierarchical reverse mappingtechnique in response to said sensitive personal information beinglocated in a middle of said identified changed block.
 15. A system,comprising: a memory for storing a computer program for detectingsensitive personal information in a storage device; and a processorconnected to said memory, wherein said processor is configured toexecute the program instructions of the computer program comprising:processing a block delta list, wherein said block delta list is a listof changed blocks in a storage device, wherein said block delta listincludes deltas associated with said changed blocks that indicatedifferences in said changed blocks from a first point of time to asecond point of time; identifying changed blocks from said block deltalist; searching said identified changed blocks for sensitive personalinformation using a character scanning technique; identifying a changedblock deemed to contain said sensitive personal information; andtranslating said identified changed block from a block level to a filelevel using a hierarchical reverse mapping technique.
 16. The system asrecited in claim 15, wherein the program instructions of the computerprogram further comprise: conducting an initial scan of blocks in saidstorage device.
 17. The system as recited in claim 16, wherein theprogram instructions of the computer program further comprise:identifying any changed blocks in said storage device, wherein a blockis a contiguous set of bits or bytes that forms an identifiable unit ofdata, wherein a changed block is said block with an identifiable unit ofdata that has changed over a period of time, wherein said block ischanged due to a storing of sensitive information.
 18. The system asrecited in claim 17, wherein the program instructions of the computerprogram further comprise: adding said identified changed blocks to saidblock delta list.
 19. The system as recited in claim 15, wherein saidhierarchical reverse mapping technique uses block level translations andfile system inode translations.
 20. The system as recited in claim 15,wherein said character scanning technique comprises a convolutionalneural network, a recurrent neural network or a regular expression. tosaid block delta list.