Method for controlling file security of block distributed file system

A technology of distributed file and security control, applied in the field of file security control of block-type distributed file system, can solve problems such as failure, and achieve the effect of storage security

Active Publication Date: 2014-12-17
ZHEJIANG UNIV
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above two security mechanisms have a common shortcoming, they require the server to b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling file security of block distributed file system
  • Method for controlling file security of block distributed file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0028] like figure 1 As shown, a file security control method of a block distributed file system is as follows:

[0029] Step 1, the distributed storage system is logically divided into multiple storage file systems, each file system contains a super user (ie administrator), user list files, logical file systems are independent of each other, and provide storage for different types of users Serve;

[0030] The block distributed file system is logically divided into multiple logical file systems, and each logical system is controlled by a pair of asymmetric keys. There is a root key in the distributed file system for generating keys of the logical file system. Public keys in the logical file system are shared among users.

[0031] Step 2. Each logical ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for controlling the file security of a block distributed file system. The method includes that a distributed storage system is logically divided into a plurality of subsystems, each subsystem comprises a super user and user list files, the subsystems adopt public secret key encryption algorithms, private keys of the super users are stored in an offline manner, and private keys of users are only stored on clients after being generated; the subsystems record logs for all operation and abstract the logs by the aid of Hash trees, hash values of root nodes of the most recently operated Hash trees are reserved on the clients, whether the file system is illegally modified or not is judged by means of comparing the Hash values on the clients to hash values on servers, and the consistency of the file system which is operated by the multiple users is checked by the aid of a version-vector algorithm. The method has the advantages that the storage security is provided for the distributed file system, trust management is carried out on the distributed file system, and whether files are reliable and correct or not still can be detected even under the condition that the servers are unreliable.

Description

technical field [0001] The invention belongs to the technical field of distributed system security, and in particular relates to a file security control method of a block type distributed file system. Background technique [0002] With the development of network technology, the demand for data storage and sharing in today's society is gradually increasing, and distributed and networked technologies are also being used more and more widely. However, as the data is separated from the user at the physical level, the chances of the data being leaked and tampered in the network storage increase. Therefore, how to let the user share the data with confidence and at the same time ensure the confidentiality and integrity of the data appears to be an issue. more and more important. [0003] The security of data storage mainly includes the confidentiality and integrity of storage. The integrity of data storage refers to a method of integrity protection for users during the process of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 郑国轴林久对陈华钧吴朝晖
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products