Data center and access method thereof
A data center and access method technology, applied in the field of network storage, can solve the problem of low security of the data center and achieve high system performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] At present, the core idea of the architecture design of the data center is to enable the storage data to be directly transmitted between the user and the storage device without going through the server. This asymmetric storage structure bypassing the server can greatly improve system performance, but since the storage devices are exposed to the user network, it is not as secure as a "centralized" storage system.
[0032] In view of the above problems, the inventor of the present application considers that the security mechanism of IP itself, such as IPSec, SSL, etc., can be used to encrypt and transmit the stored data to ensure data security. For example, in terms of access authorization, the storage device first performs identity authentication (for example, using account / password or CHAP) to ensure that the host is an authorized user, and then uses a security mechanism similar to object-based storage devices to determine whether the operation is authorized.
[0033]...
Embodiment 2
[0042] This embodiment provides a data center, including at least one management server and multiple network storage devices.
[0043] Among them, the management server performs identity authentication on the user host that initiates the access request;
[0044]The network storage device judges whether the access request is an authorized operation when the user host that initiates the access request to the network storage device passes identity authentication, and performs corresponding processing when the access request is an authorized operation.
[0045] Specifically, the above-mentioned network storage device further includes: a file access authority processing unit, which judges whether the user host has operation authority according to the file access authority of the authenticated user host;
[0046] The user ladder processing unit, when the user host has operation authority, determines the user ladder to which the user host belongs according to the user identification ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 