In Proceedings of the 2004 ACM SIGMOD international conference on Management of data (pp.563-574) (“Agrawal”) Adya, A., Bolosky, W. J., Castro, M., Cermak, G., Chaiken, R., Douceur, J. R., Howell, J., Lorch, J. R., Theimer, M., and Wattenhofer, R. P. 2002.
Cidon disclosed creating namespaces because it described generating unique identifiers for file segments (chunks) based on their contents using SHA-2 signature computation.
Moreover, PO’s concerns (POR at 51)6 about the unreliability of a remote server in the encryption process, viewing it as untrusted, overlooks that in the Auradkar-Chambers combination, the gateway is controlled by the data-protecting entity, rendering PO’s alleged “peeked/leaked” risks moot.
Specifically, Chiueh did not criticize, discredit, or otherwise discourage the use of its searchable encryption mechanism in a system with a gateway device owned by the same entity seeking to protect data like the one in the Auradkar-Chambers combination.
PO’s argument that Inoue alone did not disclose or render obvious “wherein the step of configuring the namespaces comprises storing content of the file as filenames” mischaracterizes Petitioner’s proposed combination.