Distributed storage system construction method based on mimicry defense

A distributed storage and construction method technology, applied in the field of distributed storage system construction based on mimic defense, can solve problems such as isomorphic node paralysis, prevent data from being tampered with and damaged, improve system security, and system data is stable and reliable Effect

Active Publication Date: 2020-04-17
EAST CHINA INST OF COMPUTING TECH
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing distributed storage systems are all isomorphic management or data nodes. When security is breached, most of the isomorphic nodes will be paralyzed. Although the distributed storage system can provide highly reliable data storage, it must ensure large Some machine nodes survive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed storage system construction method based on mimicry defense
  • Distributed storage system construction method based on mimicry defense
  • Distributed storage system construction method based on mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0061] A method for constructing a distributed storage system based on mimic defense provided by the present invention, comprising:

[0062] Source code porting steps: carry out the source code porting of the distributed storage system;

[0063] Storage system building steps: build a distributed storage system based on mimic defense;

[0064] System write operation steps: perform write operation of distributed storage system based on mimic defense;

[0065] System read operation steps: perform read op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mimicry defense-based distributed storage system construction method. The mimicry defense-based distributed storage system construction method comprises the steps of source code transplantation: carrying out source code transplantation on a distributed storage system; storage system building: building a distributed storage system based on mimicry defense; system write operation: performing distributed storage system write operation based on mimicry defense; system reading operation: performing distributed storage system reading operation based on mimicry defense; andconsistency guaranteeing: guaranteeing the data consistency of the distributed storage system based on mimicry defense. According to the invention, heterogeneous redundancy design is carried out on aclient process, a monitor, metadata service and object storage service, so that the data are prevented from being tampered and damaged, and the system security is improved.

Description

technical field [0001] The invention relates to the technical field of cyberspace security, in particular to a method for constructing a distributed storage system based on mimic defense. Background technique [0002] Ceph is an open source project that provides a software-defined, unified storage solution. Ceph is a massively scalable, high-performance distributed storage system with no single point of failure. Objects are the foundation of Ceph and its basic storage unit. Data in any format, whether it is a block, object or file, is stored in the placement group PG of the Ceph cluster in the form of objects. This kind of object storage can meet the current and future needs for unstructured data storage. With object storage, you can be platform and hardware independent. Ceph can only process objects, and can create cross-cluster replicas for each object to improve its reliability. [0003] The characteristics of Ceph provide software support for improving the data reli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/1097H04L63/1483H04L67/10H04L67/30Y02D10/00
Inventor 王梦童雷旸黄亚男冒睿瑞张浩博
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products