Verification of geolocation of devices in a cloud data center

ABSTRACT

A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has moved from a first geolocation to a new geolocation. The processor(s) receive an identifier of the new geolocation for the computer resource. In response to receiving the identifier of the new geolocation for the computer resource, the processor(s) request and receive encrypted data from the new geolocation. The processor(s) apply decryption information to the encrypted data from the new geolocation, where the decryption information is specifically for decrypting encrypted data from the new geolocation. In response to the decryption information failing to decrypt the encrypted data from the new geolocation, the processor(s) determine that the identifier of the new geolocation is false and apply a geolocation based resource policy to alter the computer resource at the new geolocation.

BACKGROUND

The present disclosure relates to the field of computing devices, andspecifically to computer resources utilized by computing devices. Morespecifically, the present disclosure relates to modifying a computerresource in response to a geophysical movement of the computer resource.

SUMMARY

A processor-implemented method alters a computer resource based on itsnew geolocation. One or more processors receive a message that acomputer resource has moved from a first geolocation to a newgeolocation. The processor(s) receive an identifier of the newgeolocation for the computer resource. In response to receiving theidentifier of the new geolocation for the computer resource, theprocessor(s) request and receive encrypted data from the newgeolocation. The processor(s) apply decryption information to theencrypted data from the new geolocation, where the decryptioninformation is specifically for decrypting data that is encrypted at thenew geolocation. In response to the decryption information failing todecrypt the encrypted data from the new geolocation, the processor(s)determine that the identifier of the new geolocation is false and applya geolocation based resource policy to alter the computer resource atthe new geolocation.

The present invention may also be implemented as a computer programproduct and/or a computer system.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself, however, as well asa preferred mode of use, further purposes and advantages thereof, willbest be understood by reference to the following detailed description ofan illustrative embodiment when read in conjunction with theaccompanying drawings, where:

FIG. 1 depicts an exemplary system and network in which the presentdisclosure may be implemented;

FIG. 2 illustrates a computer resource being relocated to a newgeophysical location in accordance with one or more embodiments of thepresent invention;

FIG. 3 is a high-level flow chart of one or more steps performed by oneor more processors and/or other hardware devices to modify a computerresource that has been moved to a new geolocation;

FIG. 4 depicts a cloud computing environment according to an embodimentof the present invention; and

FIG. 5 depicts abstraction model layers of a cloud computer environmentaccording to an embodiment of the present invention.

DETAILED DESCRIPTION

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Smalltalk, C++ or the like,and conventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

With reference now to the figures, and in particular to FIG. 1, there isdepicted a block diagram of an exemplary system and network that may beutilized by and/or in the implementation of the present invention. Someor all of the exemplary architecture, including both depicted hardwareand software, shown for and within computer 101 may be utilized bysoftware deploying server 149 and/or remote server(s) 153 shown in FIG.1 and/or the managing computer 201 and/or the server 253 a and/or theserver 253 b shown in FIG. 2.

Exemplary computer 101 includes a processor 103 that is coupled to asystem bus 105. Processor 103 may utilize one or more processors, eachof which has one or more processor cores. A video adapter 107, whichdrives/supports a display 109 (which in one or more embodiments of thepresent invention is a touch-screen display capable of detecting touchinputs onto the display 109), is also coupled to system bus 105. Systembus 105 is coupled via a bus bridge 111 to an input/output (I/O) bus113. An I/O interface 115 is coupled to I/O bus 113. I/O interface 115affords communication with various I/O devices, including a keyboard117, a mouse 119, a media tray 121 (which may include storage devicessuch as CD-ROM drives, multi-media interfaces, etc.), a transceiver 123(capable of transmitting and/or receiving electronic communicationsignals), and external USB port(s) 125. While the format of the portsconnected to I/O interface 115 may be any known to those skilled in theart of computer architecture, in one embodiment some or all of theseports are universal serial bus (USB) ports.

As depicted, computer 101 is able to communicate with a softwaredeploying server 149 and/or other devices/systems using a networkinterface 129. Network interface 129 is a hardware network interface,such as a network interface card (NIC), etc. Network 127 may be anexternal network such as the Internet, or an internal network such as anEthernet or a virtual private network (VPN). In one or more embodiments,network 127 is a wireless network, such as a Wi-Fi network, a cellularnetwork, etc.

A hard drive interface 131 is also coupled to system bus 105. Hard driveinterface 131 interfaces with a hard drive 133. In one embodiment, harddrive 133 populates a system memory 135, which is also coupled to systembus 105. System memory is defined as a lowest level of volatile memoryin computer 101. This volatile memory includes additional higher levelsof volatile memory (not shown), including, but not limited to, cachememory, registers and buffers. Data that populates system memory 135includes computer 101's operating system (OS) 137 and applicationprograms 143.

OS 137 includes a shell 139, for providing transparent user access toresources such as application programs 143. Generally, shell 139 is aprogram that provides an interpreter and an interface between the userand the operating system. More specifically, shell 139 executes commandsthat are entered into a command line user interface or from a file.Thus, shell 139, also called a command processor, is generally thehighest level of the operating system software hierarchy and serves as acommand interpreter. The shell provides a system prompt, interpretscommands entered by keyboard, mouse, or other user input media, andsends the interpreted command(s) to the appropriate lower levels of theoperating system (e.g., a kernel 141) for processing. While shell 139 isa text-based, line-oriented user interface, the present invention willequally well support other user interface modes, such as graphical,voice, gestural, etc.

As depicted, OS 137 also includes kernel 141, which includes lowerlevels of functionality for OS 137, including providing essentialservices required by other parts of OS 137 and application programs 143,including memory management, process and task management, diskmanagement, and mouse and keyboard management.

Application programs 143 include a renderer, shown in exemplary manneras a browser 145. Browser 145 includes program modules and instructionsenabling a world wide web (WWW) client (i.e., computer 101) to send andreceive network messages to the Internet using hypertext transferprotocol (HTTP) messaging, thus enabling communication with softwaredeploying server 149 and other systems.

Application programs 143 in computer 101's system memory (as well assoftware deploying server 149's system memory) also include Logic forModifying a Computer Resource (LMCR) 147. LMCR 147 includes code forimplementing the processes described below, including those described inFIGS. 2-3. In one embodiment, computer 101 is able to download LMCR 147from software deploying server 149, including in an on-demand basis,wherein the code in LMCR 147 is not downloaded until needed forexecution. In one embodiment of the present invention, softwaredeploying server 149 performs all of the functions associated with thepresent invention (including execution of LMCR 147), thus freeingcomputer 101 from having to use its own internal computing resources toexecute LMCR 147.

Also within computer 101 is a geolocation sensor 151, which is able todetect the physical location of computer 101 and/or the orientation ofcomputer 101. For example, geolocation sensor 151 may incorporate globalpositioning system (GPS) sensors that identify the geophysical locationof computer using signals from an array of space-based GPS satellites.Furthermore, location and positioning sensor 151 may identify a staticIP address of computer 101, which can be mapped to a physical location.

Also in communication with computer 101 are remote server(s) 153, whichmay contain a hardware device (e.g., a server blade, a storage device, amemory, a processor, etc.) or a software resource (e.g., an application,database, one or more electronic files (e.g., text files, video files,audio files, etc.), a virtual machine, etc.) that may be migrated fromone of the remote server(s) 153 to another of the remote server(s) 153.

The hardware elements depicted in computer 101 are not intended to beexhaustive, but rather are representative to highlight essentialcomponents required by the present invention. For instance, computer 101may include alternate memory storage devices such as magnetic cassettes,digital versatile disks (DVDs), Bernoulli cartridges, and the like.These and other variations are intended to be within the spirit andscope of the present invention.

The terms “location”, “geophysical location”, and “geolocation” are usedinterchangeably herein to describe a physical location of an object,such as a software resource stored on a storage device and/or usedwithin a computer device, and/or a hardware device used in a server orother computing device.

One or more embodiments of the present provide a method and system fordetermining the geolocation of a given hardware or software in a givencloud data center. A method is presented to compute the “relative”geolocation of a resource with respect to other resources in the rack ora group of the resources. This method uses cryptography to determine thesignature of the group of resources along with the geolocation receivedfrom the GPS; the signature is used to verify if one or more resourceshave been moved away from the group. This method does not require GPScapability to be added to each of the members of the group. Anotherembodiment of the present invention uses network provenance to determineif a given resource belongs in a particular geolocation.

Thus, one or more embodiments of the present invention determine thegeolocation of servers in a data-center/cloud, determine any changes ofgeolocation of servers due to movement of these servers or their racksusing cryptographic group signatures, set membership protocols, or usingnetwork provenance protocols as outlined, and/or a combination of any ofthe these methods. Once a resource has been determined to be moved, aset of actions are carried out in order to ensure that this movement isauthorized; a policy-based enforcement of geological movement andcorresponding restrictions may also be imposed by these actions. In thelatter condition, if a server is being moved to another location that isoutside the given radius or distance metrics or outside a perimeterdefined by various geolocation parameters, then such a movement raisesan alert, increases the risk of that server that is notified to thedata-center administrators, and also restricts the server to be movedfurther without any other authorization. If the server is moved, it isdetermined by the methods outlined or other methods that can be used,and the capacity of the server is modified accordingly.

Moreover, the encryption and decryption protocols for network packetsfor the data-center servers are location-dependent.

As described herein, the present invention provides a solution toappropriately modifying a computer resource that has moved to a newgeophysical location based on that new geophysical location.

For example, a software resource (e.g., a text file, a database file, anaudio file, a video file, a virtual machine (i.e., software thatemulates a physical machine), etc.) may move from one physical locationto another (e.g., from one data center to another data center, from oneserver blade to another server blade, from one country to anothercountry, etc.). This movement (i.e., “migration”) may be physical (e.g.,physically moving a storage drive from one physical location to anotherphysical location) or electronic (e.g., transmitting the file over anetwork from one physical location to another physical location).

Similarly, a hardware device may move from one physical location toanother. For example, a server blade, processor, storage device, memory,etc. may be physically moved from one server slot to another serverslot, from one cloud-based service center to another cloud-based servicecenter, from one country to another country, etc.

When such a movement/migration occurs, there may be policies andregulatory requirements with the old and/or new locations. For example,when a file is within a geographical space (represented by a set ofgeolocations or a geometrical shape and associated geographicalcoordinates), it may remain unencrypted. However, when it goes out ofthat geographical space, to another location which is outside of thespace, it must remain encrypted. Another example would be as follows:assume that an electronic medical record (EMR) file for a patient isstored in a first country that has no regulations regardingstorage/sharing of EMR files (i.e., the EMR can be stored anywhere andshared with anyone). Assume further that a second country has verystrict regulations regarding how the EMR is stored (e.g., encrypted,behind a firewall, etc.) and shared (e.g., with only predefineddesignated accessing parties). Thus, if an unencrypted/unsecured EMR issent from the first country (where such EMRs are permissible) to thesecond country (where such EMRs are not permissible), then there is aproblem. The present invention provides one or more solutions to thisproblem.

With reference now to FIG. 2, assume that a server 253 a (analogous toone of the remote server(s) 153 shown in FIG. 1) contains (stores) a setof software resources 202, such as the depicted set of data/softwarefiles. The server 253 a is located in Zone A, which is a firstgeophysical location (geolocation).

In one or more embodiments of the present invention, the firstgeolocation is determined by readings from a geolocation sensor 251 a(analogous to geolocation sensor 151 shown in FIG. 1).

Assume now that one of the set of software resources 202 (i.e., softwareresource 206 a) is migrated (copied and/or moved) to a second server 253b (also analogous to another of the remote server(s) 153 shown inFIG. 1) within Zone B (a second geophysical location that is identifiedby geolocation sensor 251 b (also analogous to geolocation sensor 151shown in FIG. 1). This migration results in software resource 206 bresiding within the server 253 b in Zone B.

In one embodiment, software resource 206 a and software resource 206 bare a same copy of a same resource. That is, in this embodiment softwareresource 206 a moves from server 253 a to server 253 b, such thatsoftware resource 206 a no longer resides within the server 253 a.

In one embodiment, software resource 206 a and software resource 206 bare different copies of a same resource. That is, in this embodiment acopy of software resource 206 a (software resource 206 b) is stored inserver 253 b, such that software resource 206 a is retained within theserver 253 a.

In one embodiment of the present invention, the migration from Zone A toZone B is detected by a transmission path taken by software resource 206a when migrating from Zone A to Zone B (and thus becoming softwareresource 206 b). That is, assume that software resource 206 a istransmitted over a network 227 (analogous to network 127 shown inFIG. 1) from server 253 a to server 253 b via a set of intermediatenodes 212 (e.g., switches, routers, intermediate servers, etc.). Eachtime software resource 206 a passes through one of the intermediatenodes 212, the identity of that intermediate node is captured in apacket header that is transporting the software resource 206 a. Thus,the final entry in the packet header will be the identity of thedestination server 253 b. However, this packet header can be falsifiedto show that the final destination of the software resource 206 a is alocation other than Zone B and/or the server 253 b. That is, thetransmission path described in the packet header can be falsified toshow that the software resource 206 a is now residing (as softwareresource 206 b) in a server 253 c within Zone C, even though softwareresource 206 b is actually residing within server 253 b in Zone B.

In one embodiment of the present invention, the locations of server 253a and server 253 b are determined by a global positioning system (GPS)satellite 210 interrogating geolocation sensors 251 a-251 b (whenarchitected as GPS positioning sensors). That is, GPS satellite 210determines the geophysical location of geolocation sensor 251 a andgeolocation sensor 251 b. However, geolocation sensor 251 b could be anuntrustworthy geolocation sensor that has been programmed to generate afalse location signal. That is, the geolocation sensor 251 b can beconfigured to show that the final destination location of the softwareresource 206 a is a location other than Zone B and/or the server 253 b.

Assume now that software resource 206 b (or alternatively, hardwareresource 214) is not authorized to reside within Zone B, but isauthorized to reside within Zone C (identified as element 216 in FIG.2).

Thus, the present invention presents various methods for determiningwhether or not the software resource 206 a (and/or hardware resource214) has migrated from server 253 a to server 253 b (i.e., has migratedfrom Zone A to Zone B) where software resource 206 a and/or hardwareresource 214 is not authorized to operate at full capacity, rather thatfrom server 253 a to server 253 c (i.e., has migrated from Zone A toZone C) where software resource 206 a and/or hardware resource 214 isauthorized to operate at full capacity.

While FIG. 2 shows the migration of a software resource 206 a/206 b, thepresent invention may also be applied to the movement/migration of ahardware resource. That is, rather than sending a software resource fromone location to another, a hardware resource may be removed from onelocation to another. For example, assume that a hardware resource 214(e.g., a processor, a storage device, a memory, etc.) is physicallymoved from Zone A (e.g., within the server 253 a) to Zone B (e.g.,within the server 253 b). However, hardware resource 214 may not beauthorized to operate within Zone B and/or server 253 b.

In either scenario (in which a software resource or a hardware resourceis migrated from one location/zone to another location/zone), one ormore embodiments of the present invention determine where the migratedsoftware/hardware resource is actually located by usinglocation-specific decryption information.

For example, assume first that the computer resource being migrated isthe software resource 206 a shown in FIG. 2. Assume further that thepacket header of the packet that transported the software resource 206 ashows a final destination node as being an authorized location (e.g.,location 216, also referred to in FIG. 2 as Zone C). Assume now that thesoftware resource 206 a was actually sent to Zone B, despite the factthat the altered packet header shows that the final destination was ZoneC. The managing computer 201 (analogous to computer 101 shown in FIG. 1)would not initially know that the packet header had been altered withoutfurther processing. One or more embodiments of the present inventionperform such processing.

That is, in one or more embodiments of the present invention, each zone(Zone A, Zone B, Zone C) is assigned a particular encryption/decryptionprocess that utilizes certain encryption algorithms, protocols, keys,etc. (some or all of which are referred to herein as “encryptioninformation” and/or “decryption information”).

Assume now that managing computer 201 receives a message from server 253b stating 1) that server 253 b has received software resource 206 a (nowshown as software resource 206 b), which is true, and 2) that server 253b is within Zone C, which is false, since server 253 b is actuallywithin Zone B. In order to determine whether or not server 253 b isfalsifying the message about which zone it is within, managing computer201 will request encrypted data from server 253 b. In one or moreembodiments of the present invention, it does not matter what the datais, just that it is encrypted by the encryption information (program,algorithm, keys, etc.) that is authorized for the zone in which thesoftware resource 206 b is located.

That is, when a zone is set up (i.e., a cluster of software and/orhardware resources within Zone A, Zone B, Zone C, etc.), a specificencryption protocol will be set for that specific zone. That protocol isspecific for that zone only, and any attempt to import other encryptionprotocols into that zone will be blocked by a managing computer (e.g.,managing computer 201). Thus, any system within Zone A will use aparticular encryption/decryption program, public/private keys,algorithm, protocol, etc., while any system within Zone B will useanother encryption/decryption program, public/private keys, algorithm,protocol, etc., and any system within Zone C will use yet anotherencryption/decryption program, public/private keys, algorithm, protocol,etc.

In the example shown in FIG. 2, server 253 b will then send theencrypted data to the managing computer 201. However, since the server253 b has (falsely) told the managing computer 201 that it is in Zone C,when managing computer 201 tries to decrypt the encrypted data using thedecryption information for Zone C, the decryption will fail (since thedata was encrypted using encryption information specific for Zone B).The managing computer 201 will then know that the software resource 206b is not in Zone C (even if it doesn't know which zone software resource206 b is actually within), and will send instructions back to the server253 b to apply a geolocation based resource policy to alter the softwareresource 206 b (e.g., delete software resource 206 b, redact softwareresource 206 b, modify a resource (e.g., a virtual machine) that iscreated by software resource 206 b, etc.).

A similar process will execute if hardware resource 214 falsifies whichzone it has been moved to. For example, assume that hardware resource214 has been moved to a cloud-based hardware resource pool, a new bladeslot in a blade chassis, or the depicted server 253 b in FIG. 2. Themanaging computer 201 receives a message (e.g., from server 253 b) thathardware resource 214 has been moved into server 253 b. Alternatively,managing computer 201 may poll each zone and/or server (e.g., fromservers 253 a-253 b) under its management for a listing of hardwareresources within each zone. Server 253 b would then respond with amessage identifying hardware resource 214 as residing within server 253b.

However, as with the example discussed above with regard to the softwareresource 206 b, server 253 b will also falsify which zone it andhardware resource 214 are located. That is, server 253 b will tellmanaging computer 201 that it and hardware resource 214 are within ZoneC, within which hardware resource 214 (e.g., a proprietary processor, astorage device holding classified information, etc.) is authorized tooperate. However, managing computer 201 will then direct the server 253b to encrypt some data (in one or more embodiments it is irrelevant whatthe data is, so long as it is sensible (e.g., readable words) and notillogical gibberish (e.g., meaningless strings of characters) whendecrypted). When the managing computer 201 attempts to decrypt theencrypted data using the encryption/decryption information designatedfor use in decrypting data from authorized Zone C, it will not be ableto, since the server 253 b had to encrypt the data using encryptioninformation designated for use within unauthorized Zone B.

Once a determination is made that the software resource 206 a/206 band/or hardware resource 214 has in fact not moved from Zone A to ZoneC, various modifications/actions are performed on software resource 206b and/or hardware resource 214.

For example and in one embodiment of the present invention, in responseto determining that software resource 206 b is in Zone B, managingcomputer 201 (through whom all requests for software resource 206 b arehandled) will refuse to provide software resource 206 b to therequester.

In another embodiment of the present invention, in response todetermining that software resource 206 b is in Zone B, managing computer201 will modify software resource 206 b before sending it to therequester. For example, if software resource 206 b is an electronicmedical record (EMR), then managing computer 201 may redact certainprivileged/sensitive data from the EMR before sending it to therequester.

In another embodiment of the present invention, assume that the softwareresource 206 b is a virtual machine, and Zone B only has resourcescapable of supporting a certain version of the virtual machine. In thisscenario, the virtual machine will be modified accordingly by themanaging computer 201. For example, within Zone B there may be fewerprocessors, less storage space, etc. than are available within Zone A.As such, the virtual machine will be modified to be less powerful inZone B (e.g., has less bandwidth, is capable of executing fewerinstructions per second, etc.) than it was when configured for Zone A.

In an embodiment in which the computer resource being altered by thevarious modifications/actions (e.g., due to not being within Zone C) isa hardware resource 214, such modifications/actions include, but are notlimited to turning off the hardware resource 214; adjusting up or downthe bandwidth, instructions per second, etc. of the hardware resource214 (when hardware resource 214 is a processor); adjusting storagecapacity, security, partitioning, etc. of the hardware resource 214(when hardware resource 214 is a storage device), etc.

With reference now to FIG. 3, a high-level flow chart of one or moresteps performed by one or more processors and/or other hardware devicesto modify a computer resource that has been moved to a new geolocationis presented.

After initiator block 301, one or more processors (e.g., within managingcomputer 201 shown in FIG. 2) receive a message that a computer resource(e.g., software resource 206 a and/or hardware resource 214 shown inFIG. 2) has moved from a first geolocation (e.g., server 253 a) to a newgeolocation (e.g., server 253 b), as described in block 303.

As described in block 305, the processor(s) receive (e.g., from server253 b shown in FIG. 2) an identifier of the new geolocation (e.g., “ZoneC”) for the computer resource.

As described herein, in one embodiment of the present invention theidentifier of the new geolocation is generated by a global positioningsystem (GPS) sensor (e.g., geolocation sensor 251 b shown in FIG. 2)that is in communication with a GPS satellite (e.g., GPS satellite 210shown in FIG. 2), where the GPS sensor is associated with the computerresource (i.e., is part of the system such as server 253 b that holdsthe migrated software resource 206 b and/or hardware resource 214).

As described herein, in one embodiment of the present invention theidentifier of the new geolocation is taken from a transmission pathshown in a packet header of a packet used to migrate the (software)computer resource to the new geophysical location.

As described in block 307, in response to receiving the identifier ofthe new geolocation for the computer resource, the processor(s) requestand receive encrypted data from the new geolocation. That is, themanaging computer 201 will request that the host (e.g., server 253 b) ofthe newly-migrated computer resource identify the location/zone in whichthe newly-migrated computer resource is located. More specifically andin one or more embodiments, in response to receiving the identifier ofthe new geolocation for the computer resource, the processor(s) willapply a data remanence policy on data that was stored on the computerresource while at the first geolocation. This data remanence policy maydirect that the data that was stored on the computer resource while atthe first location (and still remains on the computer resource afterbeing moved to the new location), should now be encrypted or otherwiseprotected (e.g., placed behind a firewall) while the computer resourceis at the new location. Thus, in one embodiment, applying the dataremanence policy causes the data on the computer resource to beencrypted while at the new geolocation in order to create encrypted dataon the computer resource.

As described in block 309, the processor(s) apply decryption informationto the encrypted data from the new geolocation. As described above, thedecryption information is specific for each geolocation/zone, includingthe new geolocation.

As described in query block 311, a query is made by the processor(s) asto whether the decryption information used (for the identified newgeolocation) was able to decrypt the encrypted data from the newgeolocation. If not, then the processor(s) determine that the identifierof the new geolocation is false (e.g., the migrated resource is not inZone C as reported by server 253 b), as described in block 313.

As described in block 315, the processor(s) then apply a geolocationbased resource policy to alter the computer resource at the newgeolocation.

In an embodiment of the present invention, the computer resource is anelectronic database, such that applying the geolocation based resourcepolicy deletes at least a portion of data in the electronic database.For example, assume that the electronic database is in a restrictedzone. As such, the processor(s) will delete any sensitive data (due toenterprise policies, regulations, laws, etc.) that are not permitted tobe electronically stored within that restricted zone. Alternatively,such sensitive data may be encrypted by the processor(s).

In an embodiment of the present invention, if the computer resource hasbeen moved, then the managing computer will track the identity of anyonewho attempts to retrieve it after it has been moved. That is, in anembodiment of the present invention the computer resource is anelectronic database in a database server, such that applying thegeolocation based resource policy causes the database server to: capturean identity of a requester of data from the electronic database; blockaccess by the requester to the electronic database; and report theidentity of the requester to a security management system.

In an embodiment of the present invention and as described herein, thecomputer resource is a virtual machine (VM), and applying thegeolocation based resource policy reduces a functionality of the VM(i.e., reduces its bandwidth, decreases the instructions per second thatit can process, etc. based on available supporting resources in the newlocation).

In an embodiment of the present invention, the computer resource is anapplication, and applying the geolocation based resource policy reducesa functionality of the application. For example, if the application hasfeatures A, B, and C while maintained within Zone A shown in FIG. 2, itmay be modified to only have the features of A and C while outside ofZone A (or Zone C). That is, assume that the software resource 206 a/206b shown in FIG. 2 is a controller for a petrochemical refinery. While inZone A or Zone C, software resource 206 a will be able to control allactuators, fire up all furnaces, etc., as well as report conditionswithin a petrochemical refinery. However, while outside of Zone A orZone C, software resource 206 b will only be able to report conditionswithin the petrochemical refinery, and will not be able to controlactuators, furnaces, etc.

In an embodiment of the present invention, the computer resource is anelectronic database in a database server, and applying the geolocationbased resource policy causes the database server to: delete anunauthorized portion of the electronic database, where the unauthorizedportion has been predetermined to be unauthorized to be stored at thenew geolocation; and retain an authorized portion of the electronicdatabase, where the authorized portion has been predetermined to beauthorized to be stored at the new geolocation. That is, when softwareresource 206 a moves to Zone B (thus becoming software resource 206 b),some of the data will remain within software resource 206 b while otherdata within software resource 206 a will be deleted from softwareresource 206 b, since the software resource 206 b is no longer withinZone A nor is it within Zone C. Alternatively, applying the geolocationbased resource policy encrypts at least a portion of data in theelectronic database.

In an embodiment of the present invention, the computer resource is anelectronic database in a database server, and applying the geolocationbased resource policy causes the database server to label data from theelectronic database with a sensitivity level tag, where the sensitivitylevel tag is based on a current geolocation of the database. That is,assume that data from software resource 206 a is never sensitive as longas it is in Zone A. However, as soon as software resource 206 a migratesto Zone B (thus becoming software resource 206 b), some of the databecomes “sensitive”, due to legal restrictions, enterprise rules, etc.that are applicable to Zone B. At that point, the managing computer 201will label the data that is now “sensitive” accordingly.

In an embodiment of the present invention, the computer resource is anelectronic database, the geolocation based resource policy defines astate of availability for the data from the electronic database based ona current geolocation, and the state of availability is from a groupconsisting of the data being unencrypted, the data being encrypted, andthe data being unavailable in any form. That is, based on where thesoftware resource (e.g., data) has been migrated to, that data mayremain unencrypted, may be encrypted, or may be blocked from access atall, depending on the location at which it is currently residing (aftermigration).

The flow chart ends at terminator block 317.

In one or more embodiments of the present invention, the computerresource is a hardware device in a cloud-based hardware resource centeror a software resource in a cloud-based center.

As such, the present invention may be implemented in one or moreembodiments using cloud computing. Nonetheless, it is understood inadvance that although this disclosure includes a detailed description oncloud computing, implementation of the teachings recited herein are notlimited to a cloud computing environment. Rather, embodiments of thepresent invention are capable of being implemented in conjunction withany other type of computing environment now known or later developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

Referring now to FIG. 4, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 comprises one or morecloud computing nodes 10 with which local computing devices used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Nodes 10 maycommunicate with one another. They may be grouped (not shown) physicallyor virtually, in one or more networks, such as Private, Community,Public, or Hybrid clouds as described hereinabove, or a combinationthereof. This allows cloud computing environment 50 to offerinfrastructure, platforms and/or software as services for which a cloudconsumer does not need to maintain resources on a local computingdevice. It is understood that the types of computing devices 54A-54Nshown in FIG. 4 are intended to be illustrative only and that computingnodes 10 and cloud computing environment 50 can communicate with anytype of computerized device over any type of network and/or networkaddressable connection (e.g., using a web browser).

Referring now to FIG. 5, a set of functional abstraction layers providedby cloud computing environment 50 (FIG. 4) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 5 are intended to be illustrative only and embodiments of theinvention are not limited thereto. As depicted, the following layers andcorresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage devices 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and computer resource modification processing96 to modify a computer resource that has been moved to a newgeolocation in accordance with one or more embodiments of the presentinvention as described herein.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the presentinvention. As used herein, the singular forms “a”, “an” and “the” areintended to include the plural forms as well, unless the context clearlyindicates otherwise. It will be further understood that the terms“comprises” and/or “comprising,” when used in this specification,specify the presence of stated features, integers, steps, operations,elements, and/or components, but do not preclude the presence oraddition of one or more other features, integers, steps, operations,elements, components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of various embodiments of the present invention has beenpresented for purposes of illustration and description, but is notintended to be exhaustive or limited to the present invention in theform disclosed. Many modifications and variations will be apparent tothose of ordinary skill in the art without departing from the scope andspirit of the present invention. The embodiment was chosen and describedin order to best explain the principles of the present invention and thepractical application, and to enable others of ordinary skill in the artto understand the present invention for various embodiments with variousmodifications as are suited to the particular use contemplated.

Any methods described in the present disclosure may be implementedthrough the use of a VHDL (VHSIC Hardware Description Language) programand a VHDL chip. VHDL is an exemplary design-entry language for FieldProgrammable Gate Arrays (FPGAs), Application Specific IntegratedCircuits (ASICs), and other similar electronic devices. Thus, anysoftware-implemented method described herein may be emulated by ahardware-based VHDL program, which is then applied to a VHDL chip, suchas a FPGA.

Having thus described embodiments of the present invention of thepresent application in detail and by reference to illustrativeembodiments thereof, it will be apparent that modifications andvariations are possible without departing from the scope of the presentinvention defined in the appended claims.

What is claimed is:
 1. A method comprising: receiving, by one or more processors, a message that a computer resource has moved from a first geolocation to a new geolocation; receiving, by one or more processors, an identifier of the new geolocation for the computer resource; in response to receiving the identifier of the new geolocation for the computer resource, applying, by one or more processors, a data remanence policy on data that was stored on the computer resource while at the first geolocation, wherein applying the data remanence policy causes the data on the computer resource to be encrypted while at the new geolocation in order to create encrypted data on the computer resource; applying, by one or more processors, decryption information to the encrypted data from the new geolocation, wherein the decryption information is specifically for decrypting encrypted data from the new geolocation; in response to the decryption information failing to decrypt the encrypted data from the new geolocation, determining, by one or more processors, that the identifier of the new geolocation is false; and in response to determining that the identifier of the new geolocation is false, applying, by one or more processors, a geolocation based resource policy to alter the computer resource at the new geolocation.
 2. The method of claim 1, wherein the identifier of the new geolocation is generated by a global positioning system (GPS) sensor that is in communication with a GPS satellite, and wherein the GPS sensor is associated with the computer resource.
 3. The method of claim 1, wherein the computer resource is a hardware device.
 4. The method of claim 1, wherein the computer resource is a software resource.
 5. The method of claim 1, wherein the computer resource is an electronic database, and wherein applying the geolocation based resource policy deletes at least a portion of data in the electronic database.
 6. The method of claim 1, wherein the computer resource is an electronic database, and wherein applying the geolocation based resource policy encrypts at least a portion of data in the electronic database.
 7. The method of claim 1, wherein the computer resource is an electronic database in a database server, and wherein applying the geolocation based resource policy causes the database server to: capture an identity of a requester of data from the electronic database; block access by the requester to the electronic database; and report the identity of the requester to a security management system.
 8. The method of claim 1, wherein the computer resource is a virtual machine (VM), and wherein applying the geolocation based resource policy reduces a functionality of the VM.
 9. The method of claim 1, wherein the computer resource is an application, and wherein applying the geolocation based resource policy reduces a functionality of the application.
 10. The method of claim 1, wherein the computer resource is an electronic database in a database server, and wherein applying the geolocation based resource policy causes the database server to: delete an unauthorized portion of the electronic database, wherein the unauthorized portion has been predetermined to be unauthorized to be stored at the new geolocation; and retain an authorized portion of the electronic database, wherein the authorized portion has been predetermined to be authorized to be stored at the new geolocation.
 11. The method of claim 1, wherein the computer resource is an electronic database in a database server, and wherein applying the geolocation based resource policy causes the database server to: label data from the electronic database with a sensitivity level tag, wherein the sensitivity level tag is based on a current geolocation of the electronic database.
 12. The method of claim 1, wherein the computer resource is an electronic database, wherein the geolocation based resource policy defines a state of availability for the data from the electronic database based on a current geolocation, and wherein the state of availability is from a group consisting of the data being unencrypted, the data being encrypted, and the data being unavailable in any form.
 13. The method of claim 1, wherein the computer resource is a hardware device in a cloud-based hardware resource center.
 14. The method of claim 1, wherein the computer resource is a software resource in a cloud-based center.
 15. A computer program product comprising one or more computer readable storage mediums, and program instructions stored on at least one of the one or more storage mediums, the stored program instructions comprising: program instructions to receive a message that a computer resource has moved from a first geolocation to a new geolocation; program instructions to receive an identifier of the new geolocation for the computer resource; program instructions to, in response to receiving the identifier of the new geolocation for the computer resource, apply a data remanence policy on data that was stored on the computer resource while at the first geolocation, wherein applying the data remanence policy causes the data on the computer resource to be encrypted while at the new geolocation in order to create encrypted data on the computer resource; program instructions to apply decryption information to the encrypted data from the new geolocation, wherein the decryption information is specifically for decrypting encrypted data from the new geolocation; program instructions to, in response to the decryption information failing to decrypt the encrypted data from the new geolocation, determine that the identifier of the new geolocation is false; and program instructions to, in response to determining that the identifier of the new geolocation is false, apply a geolocation based resource policy to alter the computer resource at the new geolocation.
 16. The computer program product of claim 15, wherein the computer resource is a hardware device in a cloud-based hardware resource center.
 17. The computer program product of claim 15, wherein the computer resource is a cloud-based electronic database, and wherein applying the geolocation based resource policy deletes at least a portion of data in the cloud-based electronic database.
 18. A computer system comprising one or more processors, one or more computer readable memories, and one or more computer readable storage mediums, and program instructions stored on at least one of the one or more storage mediums for execution by at least one of the one or more processors via at least one of the one or more memories, the stored program instructions comprising: program instructions to receive a message that a computer resource has moved from a first geolocation to a new geolocation; program instructions to receive an identifier of the new geolocation for the computer resource; program instructions to, in response to receiving the identifier of the new geolocation for the computer resource, apply a data remanence policy on data that was stored on the computer resource while at the first geolocation, wherein applying the data remanence policy causes the data on the computer resource to be encrypted while at the new geolocation in order to create encrypted data on the computer resource; program instructions to apply decryption information to the encrypted data from the new geolocation, wherein the decryption information is specifically for decrypting encrypted data from the new geolocation; program instructions to, in response to the decryption information failing to decrypt the encrypted data from the new geolocation, determine that the identifier of the new geolocation is false; and program instructions to, in response to determining that the identifier of the new geolocation is false, apply a geolocation based resource policy to alter the computer resource at the new geolocation.
 19. The computer system of claim 18, wherein the computer resource is an electronic database in a cloud server, and wherein applying the geolocation based resource policy causes the cloud server to: delete an unauthorized portion of the electronic database, wherein the unauthorized portion has been predetermined to be unauthorized to be stored at the new geolocation; and retain an authorized portion of the electronic database, wherein the authorized portion has been predetermined to be authorized to be stored at the new geolocation.
 20. The computer system of claim 18, wherein the computer resource is a hardware device in a cloud-based hardware resource center. 