Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Mimic Anti-theft Method for Distributed File System

A distributed file and anti-theft technology, applied in the computer field, can solve the problem of reducing the possibility of simultaneous hijacking of components, and achieve the effect of improving overall security, reducing the risk of information leakage, and reducing the risk of information leakage

Inactive Publication Date: 2018-01-16
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the components in the distributed file system use heterogeneous hardware platforms, operating systems, and file systems, the possibility of simultaneous hijacking of more than two components will be greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Mimic Anti-theft Method for Distributed File System
  • A Mimic Anti-theft Method for Distributed File System
  • A Mimic Anti-theft Method for Distributed File System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1, combining Figure 1-Figure 6 A mimetic anti-theft method of a distributed file system includes a hardware environment, the hardware environment includes: data nodes, metadata servers, location servers and clients. The steps for realizing the mimetic anti-theft method described in the client are: Distribution, distributes the management functions of the distributed file system to different components, the metadata server manages the metadata of the file system and its organizational relationship, and the client is responsible for the segmentation and assembly of file data, the generation and operation of file objects, The content of the file object is managed by the data node, and the storage location of the file object is managed by the location server; step 2, transform, transform the format, content and storage location of the information, the client transforms the path name and identification information of the file, and the metadata server presses the t...

Embodiment 2

[0041] Example 2: Combining image 3 , establish a first-level directory for each type of client on the data node, and pre-establish several second-level directories under this directory, such as AG0,...,AGm, BG0,...,BGn, etc. The second-level directories should be Scattered across different disks of the data nodes. The client's file objects are all stored in its own directory, and a client's directory is only allowed to be accessed by itself.

[0042] An OSD process is provided for each client in a data node. All file objects of a client in a data node are managed by an OSD process. An OSD process only serves one client, and an OSD process is in a data node. Construct a logical file object storage space for a client.

[0043] Further, using the Linux container mechanism, each OSD process is packaged in a container, so that each OSD process has different network configurations and different name spaces, such as node name, machine name, operating system version, processing d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mimic steal-preventing method of a DFS (Distributed File System). The file data and management information in a file system are distributed, converted and customized so that a metadata server only manages the directory structure of the system but not know the meanings of a name, a data node only manages file fragments but not know the meanings of the contents, and a position server only manages a mapping relationship between the logic positions and the physical positions of the file fragments but cannot visit the file; the metadata server, the position server and the data node are used for customizing the name space, storage space and position space of the exclusive file system, so that each client can only see a directory structure and storage equipment customized for the system, and can only visit the file. Even if single part in the DFS is hijacked, a hijacker can only obtain parts of information of the system and cannot grasp complete pictures, therefore the information leakage information of the DFS can be effectively reduced.

Description

technical field [0001] The invention relates to the field of computers, in particular to a mimetic anti-theft method for a distributed file system. Background technique [0002] A distributed file system usually consists of three to four types of components, such as figure 1 shown. The client is the user of the distributed file system, stores its own files in the distributed file system, and reads them out when needed. Client files consist of metadata and file data. File metadata, such as file control block (FCB) and its organizational relationship (directory tree of the file system), etc., are saved and managed by the metadata server; file data, that is, file content, is divided into one or more Nodes are stored and managed. The physical storage location of each file object is managed by the location server. [0003] In the existing distributed file system, the division of functions of the above-mentioned components is relatively fixed, and the storage format of data o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/62H04L29/06H04L29/08
Inventor 郭玉东王立新董卫宇林键周少皇王炜戚旭衍何红旗
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products