Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ceph distributed block storage access authentication method, medium and device

An access authentication and block storage technology, applied in transmission systems, electrical components, etc., to solve problems such as large granularity of authority control, inability to access distributed storage volumes, and inability to release access.

Active Publication Date: 2021-03-12
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Multiple application hosts A, B, xx, etc. can use this set of CephX user 1 / key 1 to perform CephX authentication to access storage volumes. On the distributed storage side, it is impossible to control the denial of an application host’s access to volumes. When CephX is canceled When user 1 / key 1 has access to storage, all application hosts using this user / key cannot access their corresponding distributed storage volumes
Therefore, there is a large granularity of permission control, and the application host that has obtained the user and key can access the storage cluster volume data, and the association between the specified volume and the application host cannot be released on the distributed storage side, and the CephX-authenticated volume cannot be released. Access of application hosts to distributed storage volumes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ceph distributed block storage access authentication method, medium and device
  • Ceph distributed block storage access authentication method, medium and device
  • Ceph distributed block storage access authentication method, medium and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033] The present invention is described below in conjunction with accompanying drawing, wherein, figure 1 is a schematic diagram of the CephX authentication method; figure 2 It is a schematic diagram of the Ceph distributed block storage access authentication method realized by CephX authentication and IP authentication in the embodiment of the present invention; image 3 It is a flow chart of the Ceph distributed block storage access authentication method in the embodiment of the present invention; Figure 4 is a schematic diagram of the architecture of the Ceph distributed block storage access authentication device in the embodiment of the present invention.

[0034] combined reference figure 2 and image 3 As shown, the present invention provides a Ceph distributed block storage access authentication method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Ceph distributed block storage access authentication method, which is applied to a storage end of a distributed storage service and an application host connected to the storage end, and comprises the following steps: setting a fixed application host IP for each application host connected to the storage end; the storage end verifies whether the application host has a firstpermission or not through a CepX authentication module; the application host with the first permission verifies whether the application host has the second permission or not through an IP authentication module; and if the application host has the first permission and the second permission, allowing the application host to access the corresponding storage volume in the storage end. CephX authentication is realized between the application host and the storage end through the CephX authentication module so as to ensure the safety of communication between the application host and the storage endand avoid man-in-the-middle attack; on the other hand, the IP authentication of the application host is carried out between the application host and the storage volume through the IP authentication module to realize refined authority management granularity, so that the application host with the specified IP can access the specific storage volume.

Description

technical field [0001] The invention relates to the field of distributed storage access authentication, in particular to a Ceph distributed block storage access authentication method, medium and device. Background technique [0002] Ceph is a reliable, automatic rebalancing, and automatic recovery open source distributed storage system that can provide object storage, block devices, and file system services at the same time. [0003] In the existing technology, in order to prevent data from being completely changed during network transmission and achieve a higher level of security, the CephX encryption authentication protocol is added to identify identities, encrypt and verify data in transmission. In the public network, application hosts whose business front-end ports of the Ceph storage system are on the same network can access the Ceph storage system and perform read and write operations on it. To ensure the security of the Ceph storage system, you can configure CephX se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/083H04L63/10H04L67/1097
Inventor 陈东河
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products