A distributed file access method, system, server and storage medium
A distributed file and file access technology, applied in the field of distributed file storage, can solve problems such as violation of information security, lack of resource isolation of files and authority control of unauthorized management, and achieve the effect of ensuring information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] figure 1 A flow chart of a distributed file access method provided in Embodiment 1 of the present invention, the method can be executed by the server, and the following describes the Nginx gateway as the execution body of the server, which specifically includes the following steps:
[0039] S101. Acquire a file access request from a client, where the file access request includes attributes, root directories and / or internal and external service tags.
[0040] In this step, optionally, the file access request received by the Nginx gateway may include a token. The token is when the client requests data from the server for the first time, and the server takes time to prevent the server from frequently going to the database to query the username and password and compare them. A string token assigned to the client. When the client does not initiate a file access request for the first time, the request carries a token, which enables the server to determine the client that ini...
Embodiment 2
[0046] like figure 2 As shown, this embodiment adds a method for identifying the first authority on the basis of the above-mentioned embodiment, which specifically includes the following steps:
[0047] S201. Acquire a file access request from a client, where the file access request includes attributes, root directories, and / or internal and external service tags.
[0048] S2021. Determine whether the attribute, root directory and / or internal and external service tags satisfy preset conditions respectively.
[0049] In this step, the preset conditions refer to:
[0050] A. If the attribute is available within a fixed time, the expiration time is required to be greater than 0, and the number of available times is greater than 0. If the attribute is a one-time token, the token will be deleted after the judgment is completed.
[0051] B. The root directory is not empty.
[0052] C. The internal and external service labels are not empty.
[0053] Among them, the root director...
Embodiment 3
[0059] like image 3 As shown, this embodiment adds the step of uploading file data to the file storage system by the client on the basis of the above-mentioned embodiment. In order to protect the privacy of the file, the present invention provides two file uploading methods, public and private, which specifically include the following steps:
[0060] S301. Obtain a file access request from a client, where the file access request includes attributes, root directories, and / or internal and external service tags.
[0061] S302. Perform first permission identification on the file access request.
[0062] S303. If the identification is passed, send the file access request to the file storage system.
[0063] S304. Acquire the uploaded file of the client.
[0064] S305. Perform information hiding on the uploaded file.
[0065] In this step, the information hiding process is: storing the uploaded file in a corresponding file storage directory. The file name of the uploaded file i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


