Safety distributed file system architecture based on FT-1500A processor
A FT-1500A, distributed file technology, applied in the input/output process of data processing, transmission system, electrical digital data processing, etc., can solve problems such as hidden safety hazards, and achieve the effect of high security and low energy consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The technical solution of the present invention is implemented in the following manner. The entire distributed file system logically consists of four parts: storage service, storage management service, system management service, and client. These four parts can run on the same node, or According to the needs of the environment, it runs on different nodes. When it is composed of multiple different nodes, its structure is as follows: figure 2 As shown, the front-end network is mainly responsible for receiving the data of the client, which is processed by the node where the storage service is located; the metadata processing request of the client is processed by the storage management service; the monitoring data pushed by the node where the storage service is located, and the node where the storage management service is located For offline information, the back-end network is mainly responsible for data replication between storage service nodes. When using the replica fau...
Embodiment 2
[0037] As described above, in the above embodiment, a secure distributed file system architecture based on the FT-1500A processor, all clients that need this distributed file system must install the client program of the corresponding platform. When the client data is written, use Such as image 3 shown in the manner.
[0038] When the client starts to write data, it first caches all the data to be written in the local hard disk, obtains a set of available storage service nodes from the storage management server, then slices and encrypts the data, and publishes it to the storage server through the front-end network One of the nodes where it is located judges whether to use the copy method to provide fault tolerance. If it is used, the master copy will be saved to the storage server node, and then the copy will be transmitted to another storage server node through the back-end network. If it is not used, it will be based on the established erasure correction algorithm. Calculate...
Embodiment 3
[0040] As described above, in the embodiment of a secure distributed file system architecture based on the FT-1500A processor, the data is sliced into a specified size, and if the written data is smaller than the specified size, special content is used to fill the slice size. At the same time, fill the sliced content with random content at the specified position, such as Figure 4 After shown, the slice is encrypted, using part of the metadata information of the file as the key; at the same time, a set of available node information of the storage server is obtained from the storage management server, and whether the slice uses a fault-tolerant method of copy or erasure; according to Copy or erasure requires slices to be saved to different nodes; valid content and invalid content are alternately set; when reading data, the file metadata information saved in the storage management server, the node information of the slice, and the fault-tolerant mode information adopted by the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


