Unlock instant, AI-driven research and patent intelligence for your innovation.

Data storage location encryption method of distributed key-value storage system

A storage system and data storage technology, applied in the field of information security, can solve problems such as low system performance and difficulty in big data analysis, and achieve the effects of ensuring stability and efficiency, ensuring data security, and reducing the amount of encryption operations.

Active Publication Date: 2018-04-13
DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Various data of personal and business users are stored in the cloud storage system, including account data, private data, confidential data, etc. Therefore, the data security of the storage system needs to be well resolved to ensure the security and reliability of the user's private data ;The traditional distributed key-value storage system either does not encrypt the data, so that the system administrator can use its high authority to view user data arbitrarily, or even cause the leakage of user data, or directly encrypt the data file, causing the system Low performance also brings great difficulties to big data analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage location encryption method of distributed key-value storage system
  • Data storage location encryption method of distributed key-value storage system
  • Data storage location encryption method of distributed key-value storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0042] Such as figure 1 As shown, the data storage location encryption method of the distributed key-value storage system disclosed in the present invention is implemented based on a distributed key-value storage system. The system includes a primary storage node (hereinafter referred to as the master node) and a replica storage node (hereinafter referred to as Replica node), each of the n storage nodes can be either a master node or a replica node. The user data of the client is stored in the master node, and the backup user data is stored in the replica node. The number of replica nodes can be determined according to Need to be set, the client and the distributed key-value storage system realize data interaction through the network.

[0043] The data file storage path of the file system on the master node and the replica node is D (file directory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed key-value storage system data storage position encryption method. The system comprises multiple storage nodes. The method comprises the steps that a user key is arranged; a data object storage position is generated according to the storage data, wherein the data object storage position comprises a data object key value; a data file storage path is generated by utilizing the user key according to the data object storage position so that a ciphertext data object key value is generated; the specific storage node is determined according to the ciphertext data object key value; and the storage data are stored in the specific storage node. The data storage path is encrypted and the data file is not encrypted so that an administrator is enabled not to arbitrarily view the user data, the data security can be increased and stable and efficient system performance can also be guaranteed.

Description

Technical field [0001] The invention discloses a data storage location encryption method of a distributed key-value storage system, which belongs to the technical field of information security. Background technique [0002] With the rapid growth of personal and corporate users’ demand for data storage services, cloud storage system technology has developed rapidly, and distributed key-value storage systems have achieved great development due to their good scalability, reliability, efficiency and cost advantages. , A variety of cloud applications can be built on top of it, including online cloud disks, the underlying storage of cloud hosts, etc., and effective use of data based on big data technology also has extremely high data value. [0003] The cloud storage system stores various data of individuals and corporate users, including account data, private data, confidential data, etc. Therefore, the data security of the storage system needs to be solved well to ensure the safety and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F21/62G06F21/78
CPCG06F21/6218G06F21/78H04L67/1097
Inventor 郑驰梁思谦
Owner DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD