US 12,229,321 B1
Hiding big data access patterns
Michael Kounavis, Scarsdale, NY (US)
Assigned to Meta Platforms, Inc., Menlo Park, CA (US)
Filed by META PLATFORMS, INC., Menlo Park, CA (US)
Filed on Jan. 13, 2023, as Appl. No. 18/154,106.
Int. Cl. G06F 21/64 (2013.01); G06F 16/22 (2019.01); G06F 21/60 (2013.01)
CPC G06F 21/64 (2013.01) [G06F 16/2228 (2019.01); G06F 21/604 (2013.01)] 20 Claims
OG exemplary drawing
 
10. A method comprising:
receiving a key of a first data object;
receiving a frequency number associated with an initial data object access within a period;
determining a number of replicas associated with the first data object, based on the frequency number;
obtaining a replica index based on a random number;
appending the replica index to the key to create a replica-key identifier (ID);
creating a bit string based on the replica-key ID; and
generating a schedule of a set of simulated data object accesses based on a first random function associated with the replica-key ID.