System and method for implementing high-efficiency security memory

A safe storage and high-efficiency technology, applied in the direction of response error generation, redundancy in operation for data error detection, etc. The effect of improving storage efficiency

Active Publication Date: 2009-07-22
BEIJING 21VIANET DATA CENT
View PDF0 Cites 83 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for operators and service providers characterized by storage, the cluster file system will still bring pressure on cost, security, and ease of use. The main disadvantage is that the cluster file system is characterized by multiple copies of data Redundant mechanism, low storage efficiency; cluster file system will occupy more bandwidth, large-capacity and high-density data application environment is more sensitive to bandwidth occupation; cluster file system is generally only suitable for application in the local area network, cross-wide area network application is a real problem; The security of network transmission is difficult to guarantee, and the security management of remote files is also a problem, especially sensitive data
[0008] In the establishment of a redundant coding system, the problems that need to be solved include: (1) the calculation will inevitably bring time overhead, and the time delay will affect the processing capacity of the system to a certain extent; (2) the encoded data cannot be limited Access through the only channel, such as RAID cards and NAS, are highly dependent ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for implementing high-efficiency security memory
  • System and method for implementing high-efficiency security memory
  • System and method for implementing high-efficiency security memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0150] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0151] In order to solve the problems existing in the prior art, the system for realizing efficient and safe storage proposed by the present invention mainly includes the following parts:

[0152] storage server for storing original data and redundant data;

[0153] Metadata server, used to save the basic information of all file data;

[0154] The protocol server, when receiving the write operation request, writes the original data to be written to the storage server, and at the same time instructs the encoding server to encode the original data to be written, and after the writing is completed, writes the The basic information is stored in the metadata server; when a read operation request is received, the metadata server is accessed, the storage location of the original data to be read is obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system for realizing efficient safe storage and a method thereof. The invention comprises the steps as follows: a storage server, a protocol server, a coding server, a decoding server and a metadata server are arranged; during writing operation, the protocol server writes initial data for writing into the storage server and at the same time indicates the coding server to encode the data for writing, the coding server encodes the data to generate redundant data and assigns the redundant data to the appointed storage server, and after writing is finished, basic information of the written file data is stored in the metadata server; during reading operation, the protocol server accesses the metadata server to obtain the storage position of the initial data for reading and obtains the data from the storage position of the data to be combined into the file data; when the initial data can not be read normally, the metadata server is accessed, the storage position of the redundant data is obtained, and the redundant data is read into the decoding server. The invention can effectively improve the efficiency and the reliability of data storage.

Description

technical field [0001] The invention relates to the technical field of safe data storage, in particular to a system and method for realizing efficient and safe storage. Background technique [0002] In the field of data storage, access efficiency, storage efficiency, reliability, security, platform compatibility, scalability, and ease of management are the main directions of storage system design, which are directly related to the user's direct cost, maintenance cost, The upgrade cost and the value preservation of the equipment, etc. [0003] The security and effectiveness of data storage are headaches for large enterprises and Internet service providers, especially when service providers such as online backup, online storage, network hard drives, cloud computing, and cloud storage are surging. [0004] Over the past 30 years, storage methods have gone through the following typical periods: direct-attached storage (DAS) period, redundant array of independent disks (RAID) + ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/14
Inventor 杨耀敏蒋建平
Owner BEIJING 21VIANET DATA CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products