Method and device for protecting storage system

A storage system and algorithm technology, applied in transmission systems, computer security devices, internal/peripheral computer component protection, etc., can solve the problems affecting the life of the storage system and the performance of the storage system that is easy to wear, and achieve the effect of prolonging the life and protecting the performance.

Inactive Publication Date: 2012-09-12
HUAWEI TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a storage system protection method, which aims to solve the problem that the existing methods are easy to degrade the performance of the storage system and affect the life of the storage system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting storage system
  • Method and device for protecting storage system
  • Method and device for protecting storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It shows a flow chart provided by Embodiment 1 of a storage system protection method of the present invention. In this embodiment, the purpose of protecting the storage system is achieved by limiting the user's storage actions. The details are as follows:

[0026] Step S11 , detecting and counting the amount of storage operations of the user, which is the amount of storage operations that will affect the life of the storage device when the user accesses the storage system.

[0027] In this embodiment, the user's storage action amount is the amount of storage action that will affect the life of the storage device when the user accesses the storage system. In the trusted and controllable infrastructure of the public cloud, real-time statistics and detection of cloud computing user storage access behavior are performed, and the amount of user storage actions is counted and detected. For example, a user's storage action is detected in a converged network adapter (...

Embodiment 2

[0058] image 3 The structure diagram provided by Embodiment 2 of the storage system protection device of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0059] The storage system protection device can be used for various information processing terminals connected to servers through wired or wireless networks, such as palmtop computers, computers, notebook computers, personal digital assistants (Personal Digital Assistant, PDA), etc., and can be run in these terminals The software unit, hardware unit or a combination of software and hardware can also be integrated into these terminals as an independent pendant or run in the application system of these terminals, wherein:

[0060] The storage system protection device in this embodiment includes a storage operation amount detection unit 31 and a storage operation amount limiting unit 32, wherein:

[0061] The storage operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of computer storage security, and provides a method and a device for protecting a storage system. The method for protecting the storage system includes detecting and calculating storage actuating quantity for a user, and limiting the storage actuating quantity for the user by adopting access actuating quantity preset by a preset traffic shaping algorithm. The storage actuating quantity can influence the service life of a storage device when the user accesses the storage system, and the preset access actuating quantity comprises at least one of storage capacity, data volume within per unit time and access times within per unit time for the user to access. The method and the device for protecting the storage system are capable of protecting the performance of the storage system and prolonging the service life of the storage system.

Description

technical field [0001] The invention belongs to the field of computer storage security, in particular to a storage system protection method and device. Background technique [0002] The storage system is generally a storage system using a hard disk drive (Hard Disk Drive, HDD), or a storage system using a solid state drive (Solid State Drive, SSD). Among them, HDD is a mechanical component, whether it is reading or writing, it will cause the magnetic head to seek and affect the life of HDD; while SSD is an electronic component, although the read operation has little impact on its life, but its write life is very limited. Therefore, when subjected to malicious misuse or intentional attacks (such as deliberately written programs that continuously read or write storage systems), the performance of both HDD storage systems and SSD storage systems will be accelerated and their lifespan will be shortened, thus affecting the use of the same storage system. of all users. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/02H04L29/08G06F21/79
Inventor 成永光刘毓刘金水
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products