CN109214211A - A kind of the protection archive data method and system of distributed file storage system - Google Patents
A kind of the protection archive data method and system of distributed file storage system Download PDFInfo
- Publication number
- CN109214211A CN109214211A CN201811080703.4A CN201811080703A CN109214211A CN 109214211 A CN109214211 A CN 109214211A CN 201811080703 A CN201811080703 A CN 201811080703A CN 109214211 A CN109214211 A CN 109214211A
- Authority
- CN
- China
- Prior art keywords
- file
- state
- protection
- storage system
- delete
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to a kind of protections of distributed file storage system to achieve data method and system, which comprises the following steps: S1: when timer, timer realizes the conversion to file status by timing;S2: file enters file tolerance state, and the file permission in the state is, readable, writeable, can delete;S3: file enters file protection period state, at this time file permission be it is readable, not writeable, can not delete, S4: file enters file protection expired state, and the file permission in file protection expired state is, readable, writeable, can delete.
Description
Technical field
The invention belongs to distributed file system design fields, and in particular to a kind of distributed file storage system
Protection achieves data method and system.
Background technique
With the fast development of distributed file storage system, memory capacity has reached PB rank, and storing data is increasingly
More, the scope of application is more and more extensive, and it is total that distributed file storage system mainly passes through the various protocols such as cifs/nfs/ftp/http
File is enjoyed to user.
However in the prior art, it can not need to achieve data to some and protect;The number being unable to ensure in protection file
According to being not modified or delete.This is in place of the deficiencies in the prior art.
Therefore, in view of the above-mentioned drawbacks in the prior art, provide and design the protection of distributed file storage system a kind of and deposit
File data method and system;To solve drawbacks described above in the prior art, it is necessary.
Summary of the invention
It is an object of the present invention to be deposited in view of the above-mentioned drawbacks of the prior art, providing and designing a kind of distributed document
The protection of storage system achieves data method and system, to solve the above technical problems.
To achieve the above object, the present invention provides following technical scheme:
A kind of protection archive data method of distributed file storage system, which comprises the following steps:
S1: when timer, timer realizes the conversion to file status by timing;
S2: file enters file tolerance state, and the file permission in the state is, readable, writeable, can delete;
S3: file enters file protection period state, at this time file permission be it is readable, not writeable, can not delete (except administrator),
S4: file enters file protection expired state, and the file permission in file protection expired state is, readable, writeable, can
It deletes.
Preferably, in the step S3:
The empty file of protection period state can modify, and modified file is directly entered grace period state.
Preferably, in the step S4:
If the file modification in file protection expired state is again introduced into file tolerance state after modifying file.
Preferably, in the step S4:
File is in unprotected state after file protection expired state, does not make an amendment, will not reenter the file grace period, can
To modify, read to file, delete operation.
The protection that the present invention gives a kind of distributed file storage system achieves data system characterized by comprising
Timer, timer realize the conversion to file status by timing;
File extends the deadline state, and the file permission in the state is, readable, writeable, can delete;
File protection period state, at this time file permission be it is readable, not writeable, can not delete (except administrator),
File protects expired state, and the file permission in file protection expired state is, readable, writeable, can delete;
File initially enters file tolerance state, and when timer to after the predetermined time, file enters file protection period shape
State, when timer to after the predetermined time, file enters file protection expired state.
Preferably, the empty file of protection period state can modify, modified file is directly entered grace period state.
Preferably, if the file modification in file protection expired state, is again introduced into file after modifying file
Tolerance state.
Preferably, file is in unprotected state after file protection expired state, does not make an amendment, will not reenter
The file grace period can modify to file, read, delete operation.
The beneficial effects of the present invention are be suitable for a variety of distributed documents and store scene, facilitate guest operation, availability
By force, understand meeting customer need for more efficiency, can satisfy the diversification of product
In addition, design principle of the present invention is reliable, structure is simple, has very extensive application prospect.
It can be seen that compared with prior art, the present invention have substantive distinguishing features outstanding and it is significant ground it is progressive, implementation
Beneficial effect be also obvious.
Detailed description of the invention
Fig. 1 is that a kind of protection of distributed file storage system provided by the invention achieves the flow chart of data method.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawing and by specific embodiment, and following embodiment is to the present invention
Explanation, and the invention is not limited to following implementation.
Embodiment 1:
As shown in Figure 1, a kind of protection of distributed file storage system provided in this embodiment achieves data method, feature exists
In, comprising the following steps:
S1: when timer, timer realizes the conversion to file status by timing;
S2: file enters file tolerance state, and the file permission in the state is, readable, writeable, can delete;
S3: file enters file protection period state, at this time file permission be it is readable, not writeable, can not delete (except administrator),
S4: file enters file protection expired state, and the file permission in file protection expired state is, readable, writeable, can
It deletes.
In the present embodiment, in the step S3:
The empty file of protection period state can modify, and modified file is directly entered grace period state.
In the present embodiment, in the step S4:
If the file modification in file protection expired state is again introduced into file tolerance state after modifying file.
In the present embodiment, in the step S4:
File is in unprotected state after file protection expired state, does not make an amendment, will not reenter the file grace period, can
To modify, read to file, delete operation.
In the present embodiment, the time that specific file enters the protection period is the creation time by file, the ineffective law, rule, etc. in the protection period
The modification time of part and the modification time decision expired in protection, but be at this time when group system into the time of protection period
Between it is consistent, when the group system time break down or by people accidentally modify after, can not be correctly in the period of customer satisfaction to text
Part is protected, such as file1 enters the protection period in 2018.7.30, and 2019.7.30 expires after 1 year, but in 2018.7.30
The group system time is modified to 2020.1.1, and file is just protected expired at this time, so that it may modify to history file and
It deletes, in order to solve problems, group system is that file increases timer, by taking one-year age as an example, when timer reaches
When 365*24*60=525600 time, file protection is expired.
Embodiment 2:
The present embodiment provides a kind of protections of distributed file storage system to achieve data system characterized by comprising
Timer, timer realize the conversion to file status by timing;
File extends the deadline state, and the file permission in the state is, readable, writeable, can delete;
File protection period state, at this time file permission be it is readable, not writeable, can not delete (except administrator),
File protects expired state, and the file permission in file protection expired state is, readable, writeable, can delete;
File initially enters file tolerance state, and when timer to after the predetermined time, file enters file protection period shape
State, when timer to after the predetermined time, file enters file protection expired state.
In the present embodiment, the empty file of protection period state can modify, and modified file is directly entered grace period shape
State.
In the present embodiment, if the file modification in file protection expired state, is again introduced into text after modifying file
Part extends the deadline state.
In the present embodiment, file protection expired state after file be in unprotected state, do not make an amendment then will not again into
Enter the file grace period, can modify, read to file, delete operation.
Disclosed above is only the preferred embodiment of the present invention, but the present invention is not limited to this, any this field
What technical staff can think does not have creative variation, and without departing from the principles of the present invention made by several improvement and
Retouching, should all be within the scope of the present invention.
Claims (8)
1. a kind of protection of distributed file storage system achieves data method, which comprises the following steps:
S1: when timer, timer realizes the conversion to file status by timing;
S2: file enters file tolerance state, and the file permission in the state is, readable, writeable, can delete;
S3: file enters file protection period state, at this time file permission be it is readable, not writeable, can not delete,
S4: file enters file protection expired state, and the file permission in file protection expired state is, readable, writeable, can
It deletes.
2. a kind of protection of distributed file storage system according to claim 1 achieves data method, which is characterized in that
In the step S3:
The empty file of protection period state can modify, and modified file is directly entered grace period state.
3. a kind of protection of distributed file storage system according to claim 2 achieves data method, which is characterized in that
In the step S4:
If the file modification in file protection expired state is again introduced into file tolerance state after modifying file.
4. a kind of protection of distributed file storage system according to claim 3 achieves data method, which is characterized in that
In the step S4:
File is in unprotected state after file protection expired state, does not make an amendment, will not reenter the file grace period, can
To modify, read to file, delete operation.
5. a kind of protection of distributed file storage system achieves data system characterized by comprising
Timer, timer realize the conversion to file status by timing;
File extends the deadline state, and the file permission in the state is, readable, writeable, can delete;
File protection period state, at this time file permission be it is readable, not writeable, can not delete,
File protects expired state, and the file permission in file protection expired state is, readable, writeable, can delete.
6. a kind of protection of distributed file storage system according to claim 5 achieves data system, which is characterized in that
The empty file of protection period state can modify, and modified file is directly entered grace period state.
7. a kind of protection of distributed file storage system according to claim 6 achieves data system, which is characterized in that
If the file modification in file protection expired state is again introduced into file tolerance state after modifying file.
8. a kind of protection of distributed file storage system according to claim 7 achieves data system, which is characterized in that
File is in unprotected state after file protection expired state, does not make an amendment, will not reenter the file grace period, can be right
File modifies, reads, delete operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811080703.4A CN109214211A (en) | 2018-09-17 | 2018-09-17 | A kind of the protection archive data method and system of distributed file storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811080703.4A CN109214211A (en) | 2018-09-17 | 2018-09-17 | A kind of the protection archive data method and system of distributed file storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109214211A true CN109214211A (en) | 2019-01-15 |
Family
ID=64984098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811080703.4A Pending CN109214211A (en) | 2018-09-17 | 2018-09-17 | A kind of the protection archive data method and system of distributed file storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109214211A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1458595A (en) * | 2003-05-26 | 2003-11-26 | 邵军利 | Application soft ware copy right protection and operation authority management system and method |
CN103188242A (en) * | 2011-12-30 | 2013-07-03 | 中国移动通信集团广东有限公司 | Data protecting method, data protecting server and system |
CN105069090A (en) * | 2015-08-05 | 2015-11-18 | 浪潮电子信息产业股份有限公司 | Method and device for realizing write once read many of files |
-
2018
- 2018-09-17 CN CN201811080703.4A patent/CN109214211A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1458595A (en) * | 2003-05-26 | 2003-11-26 | 邵军利 | Application soft ware copy right protection and operation authority management system and method |
CN103188242A (en) * | 2011-12-30 | 2013-07-03 | 中国移动通信集团广东有限公司 | Data protecting method, data protecting server and system |
CN105069090A (en) * | 2015-08-05 | 2015-11-18 | 浪潮电子信息产业股份有限公司 | Method and device for realizing write once read many of files |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106447246A (en) | Inventory data account checking method and inventory data account checking device | |
Gardiner et al. | Applying cognitive psychology to user-interface design | |
Palacios et al. | Another look at the degree‐Kirchhoff index | |
CN107004016A (en) | Effective data manipulation is supported | |
Erraissi et al. | Meta-modeling of data sources and ingestion big data layers | |
JP2003316774A5 (en) | ||
CN109214211A (en) | A kind of the protection archive data method and system of distributed file storage system | |
CN104036039A (en) | Parallel processing method and system of data | |
CN104331460A (en) | Hbase-based data read-write operation method and system | |
CN106230880B (en) | A kind of storage method and application server of data | |
St. Clair et al. | Attribute weighting: a method of applying domain knowledge in the decision tree process | |
CN103634324B (en) | A kind of method of real-time monitoring certificate | |
Ramesh Naphade et al. | Factor graph framework for semantic video indexing | |
Choi | Trees and beyond: Exploiting and improving tree-structured graphical models | |
Hess | Dynamically adaptive multigrid on parallel computers for a semi-implicit discretization of the shallow water equations | |
Carnielli et al. | The many sides of logic | |
CN105787021A (en) | Capacity management method and system of intelligent watch | |
Dubois | Computing Anticipatory Systems: CASYS'07-Eighth International Conference | |
Borowik et al. | Immune and Defensive Corporate Systems | |
Downey | A Parallel Workload Model and its Implications for Processor | |
Tachi | 3D Origami teapot | |
CN104580331A (en) | Cloud storage system | |
Wei et al. | The preservation practice of EBooks in the national library of China | |
Liu | Physics with ETA mesons | |
Kesten et al. | OBDD''s LTL MC Model Checking of Linear TL, Using OBDD''s |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190115 |