Font Size: a A A

Research And Implementation Of Backup Server And Security Mechanisms Of A Disaster Recovery System

Posted on:2012-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:S L ZhengFull Text:PDF
GTID:2218330362456467Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of internet technology, the importance of data is increasingly prominent for state, enterprises and individuals. Therefore, disaster recovery system generated for protecting data attracts more and more people's attention. Meanwhile, disaster recovery system is confronted with various challenges, such as virus, hacker, poor management, confidential matters and so on. The security of disaster recovery system must be paid more attention, too.HUSTBackup backup service system adopts a triple part architecture constituted of backup server, storage server and backup agent. It implements the separation between data stream and commander stream. This architecture makes the system have clear division of work, and every part of the system executes its duty by itself. Further more, it achieves the parallel of storage server and enhances the performance of the system.Backup server plays the role of center of management and schedule. It's due to manage all component element of the system and monitor the status of system. Backup server implements an object based management strategy to manage users, storage servers and jobs. This strategy makes the system more reliable and scalable. Meanwhile, Backup server implements a load balancing strategy based the processing ability of storage servers. It achieves to manage and director the storage resource in real-time, and balance effectively the load of storage servers. In order to increase to security of the backup system, it designs and implements a multi-level and configurable security mechanism. It uses the CRAM-MD5 to implement the authentication of the components, uses distributed database MySQL Cluster to enhance the reliability of metadata, uses AES and Blowfish encryption algorithms to ensure the security of data in storage and transmission, and makes use of TLS protocol to ensure the security of data when it is transported.According to the test result, backup server achieves its management function and balances the load by using these techniques. It achieves the system's security by the security mechanism in the case of consumption of certain performance.
Keywords/Search Tags:disaster recovery, object-based management, load balancing, security
PDF Full Text Request
Related items