Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection access method and system for realizing object storage

A security protection and object storage technology, applied in the computer field, can solve problems such as system failure increase, metadata server downtime, pressure increase, etc., to achieve the effect of improving reliability, reducing the probability of system failure, and improving security

Active Publication Date: 2016-04-06
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The data and metadata of the object storage system are stored separately. Due to the centralized storage of metadata, although it is easy to manage, when the amount of data increases and the number of access requests increases, in order to meet the capacity and IO bandwidth, as a key part of the system, the pressure will suddenly increase. increase
The existing object storage device access technology has the following defects: (1) With the increase of access requests, the metadata server in the object storage system will go down, and the probability of system failure will increase accordingly; (2) due to the storage Devices with key data are more likely to become the main target of data theft. In general object storage systems, users obtain metadata directly from the metadata server, and the metadata server is directly exposed to the outside, which poses a greater risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection access method and system for realizing object storage
  • Safety protection access method and system for realizing object storage
  • Safety protection access method and system for realizing object storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] specific implementation plan

[0038] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] The technical solution of the present invention is realized in the following manner, and the physical environment and architecture of the system are as follows:

[0040] Choose 3 metadata servers MDS, the running systems are Fedora, Centos, redhat; multiple object storage devices OSD, the system is Fedora; 1 authentication server TA, the system is redhat or Fedora; multiple clients Client, the system is Fedora. The storage system is the OBS object storage system. The traffic monitoring tool is tcpdump. After the environment is set up, mount the thre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety protection access method for realizing object storage. The method comprises the following steps that a client obtains an access certificate from an authentication server and sends the access certificate and an access request to at least three metadata servers together; after the metadata servers check the validity of the access certificate and the access request, the metadata servers process according to the access request type and return corresponding metadata information to the client; and the client requests data from an object storage device after receiving the metadata information, the object storage device verifies the client after receiving the request, and the object storage device sends the data to the client after successful verification. Correspondingly, the invention also provides a safety protection access system for realizing object storage. Through setting the metadata servers of different systems, the system diversity is realized while the system reliability and the safety for data storage access are enhanced, and furthermore, the client is authenticated through a set authentication server, so that the safety performance for data access is enhanced.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and system for realizing security protection access of object storage. Background technique [0002] With the popularization and rapid development of Internet and network applications, the number of users is increasing day by day, the geographical space of data distribution is wider, the amount of data storage is increasing explosively, the requirements for data reliability are getting higher and more types of equipment for accessing data are increasing, The data storage system and data security are tested. [0003] The great development of computer and network technology has promoted the continuous improvement and improvement of the file system. Using distributed storage (such as SAN and NAS) can effectively store the generated big data. In the face of massive data, there are also extremely high requirements for data processing capabilities, and an efficient file system will ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F21/62
CPCG06F3/0617G06F3/062G06F3/067G06F21/6218G06F2221/2141
Inventor 冯丹吴锋胡燏翀王阿孟文可肖仁智张晓阳常栓霞
Owner HUAZHONG UNIV OF SCI & TECH