Unlock instant, AI-driven research and patent intelligence for your innovation.

File access processing method, and file access method and device of distributed file system

A technology of distributed files and distributed systems, which is applied in the field of file access processing, access methods and devices of distributed file systems, can solve the problems of hidden safety hazards in file access, and achieve the effect of enhancing security

Inactive Publication Date: 2015-11-25
ZTE CORP
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Aiming at technical problems such as the absence of an authentication mechanism in a distributed file system in the related art, which leads to potential safety hazards in file access, the present invention provides a file access processing, access method and device for a distributed file system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access processing method, and file access method and device of distributed file system
  • File access processing method, and file access method and device of distributed file system
  • File access processing method, and file access method and device of distributed file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Two methods of encryption control:

[0070] Encrypt directory or file access (that is, the access process), and a password is required during access, which can be set to require the password to be entered by the keyboard.

[0071] To encrypt the file content, a special key (KEY) is required to be able to use the tool to decrypt it. KEY is set by the user before file encryption.

[0072] For access encryption, there are two implementations:

[0073] 1: Shield other interfaces

[0074] Such as Figure 6 As shown in , only the interfaces that have implemented the encryption method and have been successfully deployed are allowed to access, and other interfaces are deleted or blocked. Figure 6 The command-line interface in is the most commonly used paradigm.

[0075] 2: Changes to the command line interface

[0076] Such as Figure 7 As shown, modify the fs command and modify the method of "hadoopfs-ls" so that it cannot display the files that have been encrypted for...

Embodiment 2

[0092] Such as Figure 12 As shown, the file or directory access encryption process is as follows:

[0093] Involves 3 parts, 6 steps.

[0094] Part 1: Composition of operation commands that need to be input under linux

[0095] Command header + parameters, such as: hadoopfs–e Here, a parameter -e is designed to indicate the encrypted signal parameter;

[0096] The full path of the file or directory, such as: / aaa / bbb / ccc where ccc is the file or directory;

[0097] Password: a string of strings, such as: abcd;

[0098] Part 2: Modified HDFS access class (hadoopfs);

[0099] Part 3: Storage of HDFS files or directories;

[0100] Stored in HDFSNamenode;

[0101] Step 1: Combine this command and enter it completely under the linux user who can use HDFS (the detailed explanation of the user is provided with a note at the end of the document);

[0102] Command header + parameter + full path A + password;

[0103] Among them, the full path A model: / aaa / bbb / ccc;

[0104] I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a file access processing method, file access method, and device for a distributed file system. The access processing method comprises: obtaining the information of a file to be encrypted among the internal files of the distributed file system; encrypting at least one access process corresponding to the file indicated by the file information and the directory to which the file belongs, and / or encrypting the file indicated by the file information. The technical solution of the present invention solves the technical problem in the prior art of potential security risks in file accessing due to the lack of authentication mechanisms in distributed file systems, thereby enhancing the security of file accessing in distributed file systems.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a file access processing, access method and device of a distributed file system. Background technique [0002] At present, there is no authentication mechanism for reading and writing files in the distributed file system within the cluster, and the distributed file system will face concurrent access by a large number of users in the future. As a result, access control for directories and files is imperative. The following uses Hadoop Distributed File System (Hadoop Distributed File System, HDFS for short) as an example for illustration. [0003] HDFS provides the underlying support for distributed computing storage. First introduce some main features of HDFS: [0004] Scalable: It can reliably store and process gigabytes (PB) of data. [0005] Low cost (Economical): The data can be distributed and processed through a server farm composed of ordinary machines. These server far...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/00
Inventor 刘勇陆小慧
Owner ZTE CORP