Mimicry tamper-proof method of distributed file system

A distributed file and file system technology, applied in special data processing applications, instruments, electrical digital data processing, etc., and can solve problems such as data node failures

Inactive Publication Date: 2015-07-08
THE PLA INFORMATION ENG UNIV
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason for tampering may be a data node...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry tamper-proof method of distributed file system
  • Mimicry tamper-proof method of distributed file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Below in conjunction with accompanying drawing and specific implementation mode, the mimetic anti-tampering method of the distributed file system of the present invention is further described: As shown in the figure, the present embodiment contains the following process: 1. For each file object to be written, in different Create multiple copies in the data nodes of the type; 2. Add an arbitrator to evaluate each copy, select the reserved copy according to different purposes, and delete the rest.

[0019] The arbitrator runs in an independent computer system and understands the information of newly written and unarbitrated copies, such as the identification, location and relationship of the copies; the arbiter compares the consistency of each copy, and obtains Select the copy to be deleted; the number of copies to keep depends on the agreement of the system, and at least one copy should be kept; if the contents of the copies of the same file object are completely consiste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mimicry tamper-proof method of a distributed file system and accordingly the problem that files are tampered with in the distributed file system in the prior art is solved. The mimicry tamper-proof method comprises the following steps of step 1, creating a plurality of copies for every file object to be written in different types of data nodes respectively and step 2, adding an arbitrator to evaluate every copy, selecting reserved copies according to different purposes respectively and deleting the other copies. According to the mimicry tamper-proof method of the distributed file system, a hijacker can only obtain file objects in a certain data node even if the data node is hijacked; every file object is only a fragment of an actual file and accordingly the hijacker is difficult to determine a file to which the object belongs and the position of the object in the file and accordingly the hijacker is difficult to accurately tamper with the file; the modification on the file objects by the hijacker does not necessarily adopted by the arbitrator and accordingly the security of the file system is greatly improved.

Description

technical field [0001] The invention relates to a protection method of a file system, in particular to a mimetic tamper-proof method of a distributed file system. Background technique [0002] A distributed file system consists of at least three types of nodes, clients, metadata servers, and data nodes. The client is the user of the distributed file system, stores its own files in the distributed file system, and reads them out when needed. A client's file consists of metadata and file data. File metadata, such as file control block (FCB) and its organizational relationship (directory structure), etc., are stored and managed by the metadata server; file data, that is, file content, is divided into one or more fragments, called file objects, which are created by Data nodes are stored and managed. [0003] The distributed file system has good scalability and high performance, and is a file system widely used at present. Distributed file systems are generally used at the ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F17/30
Inventor 郭玉东董卫宇王立新王炜戚旭衍何红旗林键
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products