Method, device and system for accessing file system

An access request and distributed file technology, applied in the field of network communication, can solve problems such as malicious modification, user privacy data leakage, data leakage, etc., and achieve the effect of avoiding malicious modification

Active Publication Date: 2021-02-05
ALIBABA GRP HLDG LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the distributed file system allows user programs to access the network, and the user program's access to the distributed file system is only controlled by the control node according to the user program's access request, the user program can actually directly access the distributed file system. Therefore, the distributed file system will actually still be threatened by malicious code in the user program, which will easily cause the user's private data to leak
For example, a user program containing malicious code may not send an access request to the control node, but directly perform data operations on the data files in the storage node without access restrictions, thereby causing other users' data to be leaked maliciously or maliciously Revise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for accessing file system
  • Method, device and system for accessing file system
  • Method, device and system for accessing file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0067] The application can be used in numerous general purpose or special purpose computing system environments or configurations. Examples: personal computers, server computers, handheld or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method for accessing a file system. The method includes: in a restricted environment, in response to a user program generating an access request to the file system, verifying whether the access request complies with the network access rights provided by the restricted environment, the user program running on the In a restricted environment; in response to the access request not meeting the network access rights, refusing to send the access request to a network environment outside of the restricted environment; in response to the access request meeting the network access rights , sending the access request to the file system; receiving a response result returned by the file system for the access request, and returning the response result to the user program. In addition, the embodiment of the present application also discloses a device and system for accessing a file system.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a method, device and system for accessing a file system. Background technique [0002] At present, the emergence of distributed file system makes it possible to realize and popularize big data technology. In a distributed file system, by coordinating the storage resources of multiple physical machines, a large amount of data can be stored and accessed, so that massive data can be processed and analyzed. Specifically, the user program can initiate an access request to the distributed file system, and the distributed file system performs operations such as reading and writing data files according to the access request of the user program, so that the user program can realize data storage through the distributed file system. Take and analyze. [0003] Since the user program can be modified by the user, the user program may contain malicious code. In the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218H04L63/10
Inventor 田力
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products