Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed filesystem access

A technology of distributed files and file systems, applied in transmission systems, electrical components, instruments, etc., can solve problems such as system complexity

Active Publication Date: 2015-04-22
INT BUSINESS MASCH CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These systems can be very complex and require extensive training for administrators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed filesystem access
  • Distributed filesystem access
  • Distributed filesystem access

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0057] Example 1: Extended access permission 300 for file system object confidential.txt

[0058] The extended access rights 300 of Example 1 indicate that the owner on the trusted client has full rights (111), users in the upper group on the trusted client have read and execute rights (101), and other users have no rights (000). Further, extended access rights 300 indicate that the file was created on a trusted client (T bit 308 enabled) and the owner can access the file from an untrusted client 118 (L bit 310 enabled). The user requesting access to the file system object confidential.txt can be the object's owner, a member of the owner's group, or any other user. When a user attempts to access the object from a trusted client 116, the access will be based on the user type. For example, when the user is the owner 402, access will be based on the owner mode bit 302 and the owner 402 will be allowed full access to the file. When the user is in group 404, the group mode bit 30...

example 2

[0063] Example 2: Extended access permission 300 for file system object salary.txt

[0064] figure 2 The extended access rights 300 shown in will indicate that the owner 402 created the file on the untrusted client 118 (because the T bit 308 is disabled (0)). In this case, all users will be considered to be on trusted clients 116, even if they are on untrusted clients 118, and access will be based on the top 9 access rights. However, if the owner 402 overwrites / replaces the file from the trusted client 116 , the T bit 308 is automatically set to 1 (enabled), and the file is considered created on the trusted client 116 .

[0065] exemplary method

[0066] Figure 5 show reference Figures 1 to 4 Exemplary method 500 for providing access in DFS 100 . Method 500 includes the step of authorizing access to the requested file system object in DFS 100 . Further, the method 500 includes the steps of retrieving the user ID and client ID, determining whether the client is a trust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for providing access in a distributed filesystem. The disclosure describes systems and methods for providing access to filesystem objects in a distributed filesystem (DFS). In one implementation, access to filesystem objects in the DFS can be restricted to only authenticated users and client devices. To this end, the client devices of the DFS can be divided into trusted and non-trusted clients, and further access can be denied to non-trusted clients. Concepts of trusted computing can be utilized to obtain trusted clients. New clients added to the system can be added as non-trusted clients. Further, access can be restricted by extending the file access permissions to include additional bits that can control access to non-trusted clients. In certain situations, the owner of the object can be allowed access to the object from a non-trusted client.

Description

Background technique [0001] A file system is generally a database for storing, hierarchically organizing, manipulating, navigating, accessing, and retrieving data. Distributed File System (DFS), one version of a file system, has grown in popularity in recent decades. DFS, as its name implies, is a network file system in which a single file system can be distributed across multiple physical computing devices, and said computing devices can directly access parts of the entire file system. DFS generally includes transparent replication and fault tolerance. That is, when a limited number of nodes in the file system go offline, the system can continue to work without any data loss. As a result, DFS has become a very popular choice for local area networks (LANs) in organizations, companies, and more. [0002] In a typical computer operating system, files are stored with associated access rights, and only users with sufficient access rights are allowed to access files. Traditiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6218H04L63/102H04L63/126
Inventor U·兰耶瓦尔V·尤伊里A·肖拉西亚
Owner INT BUSINESS MASCH CORP