Font Size: a A A

Application Research On File-Slice Model For Data Security Storage System

Posted on:2012-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2218330362456543Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, the demands of effective storage of large amounts of data dramatically increased, and security of file data draws lots of attention. In this context, carry on analysis and research on data storage and data security technology, hence design and implement security file-slice storage system is of social significance.Security file-slice storage system use file-slice storage and file-slice encryption techniques. File data stores in slice strategy, stores in different nodes of file system in order to enhance data transmission efficiency and data security. Slice storage strategy based on patch availability model, and concrete storage strategy was designed by analysis the effect of three factors of model M, P and R on file availability. The strategy will cut the file data into slices of a reasonable size, which will store on parts of data storage nodes and make the backup on one node. As the frequent access of metadata, in order to improve the system performance, the system manages metadata and file data separately and organize metadata on metadata sever. With the purpose of ensuring file data security, do the research on data encryption technology combining with the features of file-slice storage, and adopt data-slice encryption scheme. The generation of secret key combines sub-key generation method.By combining the experimental data and the analysis of system key technology, design and implement the security file-slice storage system, and test and analysis system functions through the experimental data and analysis, moreover, point out and interpret the inadequacies of the system.
Keywords/Search Tags:Slice strategy, File-availability ratio, Encryption, Key generation, Storage security
PDF Full Text Request
Related items