A Mimic Anti-tampering Method for Centralized File Service System
A technology of file service and file server, which is applied in the mimetic anti-tampering field of the centralized file service system, which can solve problems such as system hijacking, and achieve the effects of improved anti-tampering ability, easy rollback, and simple arbitration method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] Example 1: Combining Figure 1-Figure 4 , a mimetic anti-tampering method of a centralized file service system, the hardware includes a client, a file server, a block device manager, a file operation transceiver, and an arbitrator, respectively running in different computers, and the computers are independent computers The system may be a virtual machine, and the steps for mimic tampering are as follows:
[0028] Step 1: Introduce multiple variants of the same file server software, let different file servers run different software variants, and change the single file server in the file service system into multiple file servers. File server software variants are different implementations of the same file server software, different implementation versions for different processors and different operating systems; the normal behavior of all file server software variants should be the same; the number of file server variants should be Not less than 3, in order to arbitrate ...
Embodiment 2
[0033] Example 2, combined with Figure 1-Figure 4 In the mimetic anti-tampering method of the centralized file service system, the client FSClient, the file server FS Server, the block device manager, the file operation transceiver and the arbitrator are respectively run in different computers. The computer mentioned here may be an independent computer system or a virtual machine.
[0034] In the mimetic anti-tampering method, the block device manager is responsible for managing and driving storage devices in the system, such as disks and disk arrays. The block device manager abstracts the block devices in the system into an array of logical blocks, and provides a unified block operation interface to the file server.
[0035] In the mimetic anti-tampering method, RDisk is a physical block device actually configured in the system, which may be a disk partition, an independent disk, or a disk array. The RDisk has been formatted and a physical file system such as EXT, XFS, NTF...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


