CN108509613A - A method of promoting encrypted file system performance using NVM - Google Patents
A method of promoting encrypted file system performance using NVM Download PDFInfo
- Publication number
- CN108509613A CN108509613A CN201810296629.3A CN201810296629A CN108509613A CN 108509613 A CN108509613 A CN 108509613A CN 201810296629 A CN201810296629 A CN 201810296629A CN 108509613 A CN108509613 A CN 108509613A
- Authority
- CN
- China
- Prior art keywords
- nvm
- data
- write
- ciphertext
- file system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of methods promoting encrypted file system performance using NVM, Dynamic Programming is carried out according to the data block characteristics of file write request, the suitable soft calculation of selection or hard method of calculating execute cryptographic operation, then it by ciphertext write-in NVM cachings, is finally concentrated by background thread and the ciphertext data in NVM is write back into disk layer in a manner of asynchronous IO.Wherein NVM memory headrooms are distributed and are managed by the NVM memory management schemes;According to the storage location of the NVM memory management schemes quick search requested data, read-out ciphertext will be selected suitable soft calculation or hard method of calculating to execute decryption oprerations, will finally be returned to upper layer application in plain text by the dynamic programming method.Time delay is caused to compare with needing repeatedly calling hardware engine when traditional eCryptfs enciphering/decipherings data and grade pending datas being needed to write back disk, the pattern context handover overhead of hardware can effectively be reduced and due to the unmatched time delay of IO speed, the application of hardware cryptographic engine is improved, the overall performance of encrypted file system is also improved.
Description
Technical field
The present invention relates to field of information security technology more particularly to a kind of promoting encrypted file system performance using NVM
Method.
Background technology
In recent years, how to protect sensitive data not to be leaked and have become hot issue of people's attention.Invader in addition to
Physical storage device directly is stolen, file data can also be usurped by network attack;Moreover, because shared demand, quick
Sense data can be accessed by more people, and this also increases the possibilities of leakage.Data or file are encrypted and have become a kind of public affairs
The method for relatively successfully protecting data recognized, ensures that content is encrypted be stored among physical equipment, improves file data
Storage security.
ECryptfs is a kind of stack encrypted file system (Stackable as enterprise-level encrypted file system
Cryptographic File System), this encrypted file system can regard the conversion layer of an encryption/decryption as, and simultaneously
A true global function file system, must framework on other generic file system, to its underlying file system
The file of system is encrypted.Stack encrypted file system does not have corresponding magnetic disk, does not realize data in physical medium yet
The function of upper access.
File system application program reaches VFS, VFS is given to the write request of encryption file through system call layer
The processing of eCryptfs file system components after being disposed, then is given to lower layer's physical file system write-in bottom disk;Read request
Flow is then on the contrary, file system application program is issued to VFS, VFS calls bottom to the read request of encryption file from upper layer application
File system reads the ciphertext data in disk, is transmitted to eCryptfs decryption, returns again to after decryption and read to upper layer request
The application program taken.
It is divided into currently based on the file enciphering/deciphering system design of eCryptfs:User application layer, Virtual File System
(VFS) layer, eCryptfs layers, file system layer, hardware accelerator layer and disk layer.As shown in Figure 1, for write operation, use
Write request is presented a paper to the VFS layers of kernel spacing in family, and data to be written block passes to VFS simultaneously, and VFS passes through interface
Call eCryptfs encrypted data chunks, eCryptfs that the CryptoAPI of kernel, CryptoAPI is called to pass through hardware drive program
The hardware accelerator for starting lower layer accelerates the data block of encryption write-in, and after the completion of encryption, eCryptfs transmits ciphertext block data
To next layer of file system, disk layer is written in ciphertext data by file system, waits for return after the completion of write operation;For reading
Operation, user present a paper read requests to the Virtual File System of kernel spacing, and Virtual File System issues read requests
To after eCryptfs, eCryptfs reads ciphertext data from the file system of lower layer, then calls the CryptoAPI of kernel,
CryptoAPI starts the data block that the hardware accelerator of lower layer accelerates decryption to read by hardware drive program, after the completion of decryption,
Clear data after decryption is returned to the application program that upper layer request reads file by eCryptfs by Virtual File System.
The eCryptfs layers of read/write file request that response upper-level virtual file system is submitted upwards, pass downwardly through and file
System interaction, the enciphering/deciphering for calling CryptoAPI to complete data are asked, and enciphering/deciphering request is submitted to hardware by CryptoAPI
Accelerator carries out corresponding enciphering/deciphering operation, completes digital independent or write-in.The size of eCryptfs processing data is generally
Page, i.e. 4KB are carried out when then calling Accelerator every time by the eCryptfs CryptoAPI called as unit of Page
Enciphering/deciphering operates, and can all have context handover overhead (Context per 4KB data using hardware accelerator enciphering/deciphering
Switch), expense includes:
A) it after kernel submits the enciphering/deciphering of a Page to ask, waits for the enciphering/deciphering of hardware accelerator to operate and completes
Afterwards, the enciphering/deciphering process operation of another Page of kernel dispatching, generates a Context Switch;
B) hardware accelerator executes enciphering/deciphering request, and execution generates primary interruption after completing, interrupt processing will produce one
Secondary Context Switch.
After eCryptfs layers are completed cryptographic operation, in order to guarantee data security, disk is arrived in storage, can wait until all data
(Direct IO) could be returned to after writing back to disk, then each write operation also needs to wait for disk after completing cryptographic operation
IO completions could return, and carry out next operation.There are following defects for traditional technical solution:
A) eCryptfs layers of read-write operation is handed down to since needs repeatedly call Accelerator to complete decimal in upper layer
It is operated according to the enciphering/deciphering of block (Page) so that produce a large amount of Context Switch during enciphering/deciphering, cannot play
The advantage of hardware accelerator causes the utilization rate of hardware accelerator to decline;
B) it after the encryption for completing data, needs to return again to after waiting pending datas to write back disk, increases the time delay of write operation, use
File system performance seen in family is poor.
Invention content
In view of this, the present invention provides a kind of method improving file system enciphering/deciphering performance using NVM, solve
In eCryptfs ciphering process due to repeatedly calling hardware accelerator caused by a large amount of context handover overhead and because waiting for number
The problem of time delay being caused according to disk is write back.
The present invention provides following schemes:
A method of promoting encrypted file system write performance using NVM, it is characterised in that:According to file write request
Data block characteristics carry out Dynamic Programming, and the suitable soft calculation of selection or hard method of calculating execute cryptographic operation, then ciphertext are written
NVM is cached, and is finally concentrated by background thread the ciphertext data in NVM writing back to disk layer in a manner of asynchronous IO.Wherein NVM
Memory headroom is distributed and is managed by the NVM memory management schemes.
A method of promoting encrypted file system reading performance using NVM, it is characterised in that:According to the NVM memories pipe
The storage location of the tactful quick search requested data of reason, read-out ciphertext will be by the dynamic programming methods, and it is suitable to select
Soft calculation or hard method of calculating execute decryption oprerations, will finally return to upper layer application in plain text.
Further, the Dynamic Programming includes following operation:
A) each write request sent out to topmost paper system application pre-processes, and is determined by being continuously written into request
The pattern of file access;
B) data recombination is carried out to the be-encrypted data block of sequence read-write mode, it is big that setting hardware accelerator handles data block
Small upper limit ThAnd lower limit Tl, the data block after recombination meet as possible hardware accelerator bound requirement;
C) eCryptfs configuration files are changed so that the data block length that eCryptfs can handle maximum enciphering/deciphering is Th;
D) use data structure perdurable data be written when offset and length, ensure digital independent when to be written when
Identical size is read, and realizes correct decryption;
E) different size of to be added/block of unencrypted data is dispatched, the data block length after recombination is between TlAnd ThBetween using hard
Part accelerator enciphering/deciphering is encrypted if being unsatisfactory for bound and requiring without using hardware accelerator.
Further, the NVM memory management schemes include following operation:
A) spaces chained list management NVM of fixed page size (for example, 4KB) are used;
B) when ciphertext data write-in NVM, free page is matched in linked list head part, and ciphertext data write back to disk freeing of page
Afterwards, the recycling page realizes quick distribution/recycling of the NVM pages to chained list tail portion;
C) it is that the file opened establishes radix tree, the offset of file is keyword, and leaf node is directed toward each NVM pages;
D) after read requests issue, whether it already is resident in NVM first with the data of the quick Location Request of radix tree,
If, by the quick returned datas of NVM, otherwise continuing the location data in disk if.
Further, the asynchronous IO includes following operation:
A) eCryptfs configuration files are changed, data base and IO stacks are separated, ciphertext data write direct NVM;
B) after all NVM is written in ciphertext data, system returns immediately;
C) eCryptfs initializes asynchronous IO queues, will be submitted to the queue in the ciphertext data set that NVM is written;
D) system creation background thread, background thread write back to the data in asynchronous IO queues in disk.
It can be seen that the present invention provides a kind of method promoting encrypted file system performance using NVM.By using dynamic
The enciphering/deciphering operation that planning request upper-layer user's program application issues, to the data block that is encrypted at eCryptf layers into line number
According to recombination, the context switch latency for reducing and hardware accelerator being called to generate is realized, the hardware resource of encrypted file system is improved
Utilization rate;The present invention realizes the quickly distribution NVM pages and quick search positioning number by using NVM memory management schemes
According to block;By using asynchronous I/O mechanism, solve the problems, such as that IO speed mismatches caused I/O latency length;Final realize carries
The encryption performance of eCryptfs encrypted file systems is risen, and then improves the overall performance of encrypted file system.
Description of the drawings
File enciphering/deciphering system framework figures of the Fig. 1 based on eCryptfs
Fig. 2 is Dynamic Programming streams of the EXT4 of the embodiment of the present invention to the upper layer File System file read-write requests applied
Journey
Fig. 3 is schematic diagram of the present invention to request sequence data recombination
Fig. 4 is the structure of NVM Memory Managements
Fig. 5 is the function call flow that asynchronous IO is realized when upper layer of the present invention sends out write request
Specific implementation method
It is clearer to make those skilled in the art understand the object, technical solutions and advantages of the present invention, below will
Embodiment of the present invention is further described in conjunction with the accompanying drawings and embodiments, which is not constituted to the embodiment of the present invention
It limits.
Embodiment:
The present invention provides a kind of methods promoting encrypted file system readwrite performance using NVM.This method has general
Property, it can build on different file system, while also supporting the software cryptography library of current main-stream.
Below on EXT4 file system, to be using AES encryption algorithm and QAT hardware accelerator encrypted file datas
Example is described in further detail the enciphering/deciphering performance that file system is improved using NVM of the present invention.
Hereinafter, by taking the write operation and read operation of EXT4 encrypted file systems as an example, how analysis NVM, which promotes EXT4, adds
The readwrite performance of close file system.
First, Dynamic Programming is carried out to the write request that upper layer application issues.As shown in Fig. 2, upper layer application is under VFS layers
The write request of hair is pre-processed, and according to request identification access module is continuously written into, it is sequential write mould to tell the request
Formula or random WriteMode, the data block of random write are directly issued to request scheduling program and are handled, when recognizing under upper layer
When the sequence write request of hair, according to the data block length threshold value of setting, data are recombinated, all data after recombination
Block length is both less than upper limit Th;Data block after recombination is issued to the processing of request scheduling program, and request scheduling program receives upper layer
The different size of data block issued is less than lower limit T according to data block lengthlThe AES-NI that consigns to be encrypted, data block
Length is between TlWith ThBetween consign to the encrypted principles of QAT, classification encryption is carried out to data block.Below to data recombination
Process is described in detail:
Such as Fig. 3, the I/O Request sequence of publication is (1,1) R1, R2 (2,1), R3 (3,1), R4 (4,1), R5 (5,1), R6 (6,
1), (10,1) R7, R8 (15,1), R9 (20,11), the data of the digital representation write-in in bracket there are in NVM position and should
The size of data block.Wherein R1-R6 is sequence WriteMode, and R7-R9 is random WriteMode;In this example, encrypted data chunk
The upper limit is arranged to 4 data blocks, therefore the polymerizable encryption unit EU1 of R1-R4;And R7-R9 is due to being random WriteMode,
Data aggregate is cannot be used for, therefore the request R5-R6 of sequence WriteMode can only polymerize as another encryption unit EU2;R7 and R8
Due to that cannot polymerize, the two encryption units of EU3 and EU4 are respectively enterd;11 data blocks are written in R9 altogether, are split into three
Contain 4 data blocks in encryption unit EU5, EU6 and EU7, EU5 and EU6, contains 3 data blocks in EU7.
As shown in figure 4, after Dynamic Programming write request and recombination data, it is following that write operation will continue to triggering
Behavior:
A) NVM distributes free page p from idle chained list;
B) page p is written in ciphertext, and p is inserted into the NVM cachings of inode;
C) it after the content in p is asynchronously write back disk in background thread, discharges p and is placed back into NVM free time chained lists
Chained list tail portion.
Wherein NVM distribution free page is realized by NVM management strategies, by using fixed page size (for example, 4KB)
The pointer for being directed toward next page is stored in current page by chained list to manage NVM memory headrooms, and to realize, quickly distribution is empty
The not busy page and freeing of page.
Wherein the specific implementation that underlying file systems are write back in ciphertext data set is included by the asynchronous IO of background thread:
As shown in figure 5, upper layer application by function call VFS layers of write () _ vfs_write () function is each to obtain
The write functions file- of a file system>f_op->Write (), by calling in eCryptfs in file system
Ecryptfs_new_write () function realizes the cryptographic operation of file;Meanwhile ecryptfs_init_async_ctx () letter
Number can initialize an ecryptfs_async_ctx structure, utilize ctx->Ecryptfs_async_wq=create_
Singlethread_workqueue () function initializes an asynchronous IO queue;In ecryptfs_new_write () function
Ecryptfs_submit_async_io () realize submit data to asynchronous IO queues in, ecryptfs_async_io_
Routine () function enters the normal procedure of asynchronous IO, and ecryptfs_write_lower () is realized will be under the write-in of ciphertext data
The operation of layer file system, is finally reached background thread by the asynchronous purpose for writing back to disk of ciphertext data.
Secondly, the encryption file read request for quickly returning to upper layer and issuing, method are realized using NVM memory management schemes
It is to establish the index that radix tree caches as NVM for the file of each opening, the keyword of node is set as the offset of this document,
Whether each leaf node is directed toward the page of NVM, can be with the page that quick search is asked in NVM, if quick by NVM
Ground returns to the data of request, if not existing, reading ciphertext data return to upper layer application immediately in disk;It is correct in order to realize
Decryption, the ciphertext data of request after Dynamic Programming, with write-in when data block size it is identical;Finally by request scheduling journey
Sequence is less than lower limit T according to data block lengthlThe AES-NI that consigns to be encrypted, data block length is between TlWith ThBetween friendship
The encrypted principles of QAT are paid, suitable algorithm is selected to carry out classification decryption to data block, the plaintext after decryption returns to upper layer and asks
Ask the application of data.
The present invention has significant performance boost under four kinds of different read-write modes:
A) 23.76 times of sequence read operation improving performance;
B) random 6.17 times of read operation improving performance;
C) 18.55 times of sequence write operation improving performance;
D) 4.87 times of random writing operations improving performance.
Based on described above, the present invention is asked by using Dynamic Programming, realizes reduction and hardware accelerator is called to generate
Context switch latency, improve the hardware resource utilization of encrypted file system;The present invention is by using NVM memory management plans
Slightly, quickly the distribution NVM pages and quick search location data block are realized;By using asynchronous I/O mechanism, solves IO speed
The problem of I/O latency length caused by degree mismatches;It is final to realize the encryption performance for promoting eCryptfs encrypted file systems,
And then improve the overall performance of encrypted file system.
Embodiment described above is not intended to limit the invention, all any modifications within the principle of the present invention, made,
Equivalent replacement, improvement etc., should be included in the scope of protection of the invention.
Claims (5)
1. a kind of method promoting encrypted file system write performance using NVM, which is characterized in that according to the number of file write request
Dynamic Programming is carried out according to block feature, the suitable soft calculation of selection or hard method of calculating execute cryptographic operation, NVM then are written in ciphertext
Caching is finally concentrated by background thread the ciphertext data in NVM writing back to disk layer in a manner of asynchronous IO.In wherein NVM
Space is deposited to be distributed and managed by the NVM memory management schemes.
2. a kind of method promoting encrypted file system reading performance using NVM, which is characterized in that according to the NVM memory managements
The storage location of tactful quick search requested data, read-out ciphertext will be by the dynamic programming methods, and it is suitable to select
Soft calculation or hard method of calculating execute decryption oprerations, will finally return to upper layer application in plain text.
3. a kind of method for implementing the Dynamic Programming described in claim 1,2, characterized in that including following operation:
A) each write request sent out to topmost paper system application pre-processes, and file is determined by being continuously written into request
The pattern of access;
B) data recombination is carried out to the be-encrypted data block of sequence read-write mode, setting hardware accelerator is handled on data block size
Limit ThAnd lower limit Tl, the data block after recombination meet as possible hardware accelerator bound requirement;
C) eCryptfs configuration files are changed so that the data block length that eCryptfs can handle maximum enciphering/deciphering is Th;
D) use data structure perdurable data be written when offset and length, ensure digital independent when to be written when it is identical
Size read, realize correct decryption;
E) different size of to be added/block of unencrypted data is dispatched, the data block length after recombination is between TlAnd ThBetween added using hardware
Fast device enciphering/deciphering is encrypted if being unsatisfactory for bound and requiring without using hardware accelerator.
4. a kind of method for implementing the NVM memory management schemes described in claim 1,2, characterized in that including following operation:
A) spaces chained list management NVM of fixed page size (for example, 4KB) are used;
B) when ciphertext data write-in NVM, free page is matched in linked list head part, after ciphertext data write back to disk freeing of page, returns
The page is received to chained list tail portion, realizes quick distribution/recycling of the NVM pages;
C) it is that the file opened establishes radix tree, the offset of file is keyword, and leaf node is directed toward each NVM pages;
D) after read requests issue, whether it already is resident in NVM first with the data of the quick Location Request of radix tree, if
Then by the quick returned datas of NVM, otherwise continue the location data in disk.
5. a kind of method for implementing asynchronous IO described in claim 1, characterized in that including following operation:
A) eCryptfs configuration files are changed, data base and IO stacks are separated, ciphertext data write direct NVM;
B) after all NVM is written in ciphertext data, system returns immediately;
C) eCryptfs initializes asynchronous IO queues, will be submitted to the queue in the ciphertext data set that NVM is written;
D) system creation background thread, background thread write back to the data in asynchronous IO queues in disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810296629.3A CN108509613A (en) | 2018-04-03 | 2018-04-03 | A method of promoting encrypted file system performance using NVM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810296629.3A CN108509613A (en) | 2018-04-03 | 2018-04-03 | A method of promoting encrypted file system performance using NVM |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108509613A true CN108509613A (en) | 2018-09-07 |
Family
ID=63380322
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810296629.3A Pending CN108509613A (en) | 2018-04-03 | 2018-04-03 | A method of promoting encrypted file system performance using NVM |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108509613A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918317A (en) * | 2019-03-01 | 2019-06-21 | 重庆大学 | It is a kind of based on abrasion perception NVM item between abrasion equilibrium method |
CN111400306A (en) * | 2020-02-20 | 2020-07-10 | 上海交通大学 | RDMA (remote direct memory Access) -and non-volatile memory-based radix tree access system |
CN113934697A (en) * | 2021-10-21 | 2022-01-14 | 中孚安全技术有限公司 | Method and system for improving IO performance based on kernel file filtering driver |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960372A (en) * | 2006-11-09 | 2007-05-09 | 华中科技大学 | Encrypting read / write method in use for NAS storage system |
CN101803327A (en) * | 2007-07-27 | 2010-08-11 | 国际商业机器公司 | Transparent aware data transformation at file system level |
CN102722449A (en) * | 2012-05-24 | 2012-10-10 | 中国科学院计算技术研究所 | Key-Value local storage method and system based on solid state disk (SSD) |
US20130073870A1 (en) * | 2011-09-15 | 2013-03-21 | Apple Inc. | Secure relocation of encrypted files |
CN103412794A (en) * | 2013-08-08 | 2013-11-27 | 南京邮电大学 | Dynamic dispatching distribution method for stream computing |
US20160350017A1 (en) * | 2010-03-25 | 2016-12-01 | International Business Machines Corporation | File index, metadata storage, and file system management for magnetic tape |
CN106201349A (en) * | 2015-12-31 | 2016-12-07 | 华为技术有限公司 | A kind of method and apparatus processing read/write requests in physical host |
US20170279797A1 (en) * | 2016-03-22 | 2017-09-28 | International Business Machines Corporation | Container Independent Secure File System for Security Application Containers |
KR20180010482A (en) * | 2016-07-21 | 2018-01-31 | 경희대학교 산학협력단 | Method and apparatus for security of internet of things devices |
-
2018
- 2018-04-03 CN CN201810296629.3A patent/CN108509613A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960372A (en) * | 2006-11-09 | 2007-05-09 | 华中科技大学 | Encrypting read / write method in use for NAS storage system |
CN101803327A (en) * | 2007-07-27 | 2010-08-11 | 国际商业机器公司 | Transparent aware data transformation at file system level |
US20160350017A1 (en) * | 2010-03-25 | 2016-12-01 | International Business Machines Corporation | File index, metadata storage, and file system management for magnetic tape |
US20130073870A1 (en) * | 2011-09-15 | 2013-03-21 | Apple Inc. | Secure relocation of encrypted files |
CN102722449A (en) * | 2012-05-24 | 2012-10-10 | 中国科学院计算技术研究所 | Key-Value local storage method and system based on solid state disk (SSD) |
CN103412794A (en) * | 2013-08-08 | 2013-11-27 | 南京邮电大学 | Dynamic dispatching distribution method for stream computing |
CN106201349A (en) * | 2015-12-31 | 2016-12-07 | 华为技术有限公司 | A kind of method and apparatus processing read/write requests in physical host |
US20170279797A1 (en) * | 2016-03-22 | 2017-09-28 | International Business Machines Corporation | Container Independent Secure File System for Security Application Containers |
KR20180010482A (en) * | 2016-07-21 | 2018-01-31 | 경희대학교 산학협력단 | Method and apparatus for security of internet of things devices |
Non-Patent Citations (1)
Title |
---|
ZONG-PU JIA等: "《A Novel Security Private Cloud Solution Based on ECryptfs》", 《 2013 6TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918317A (en) * | 2019-03-01 | 2019-06-21 | 重庆大学 | It is a kind of based on abrasion perception NVM item between abrasion equilibrium method |
CN111400306A (en) * | 2020-02-20 | 2020-07-10 | 上海交通大学 | RDMA (remote direct memory Access) -and non-volatile memory-based radix tree access system |
CN111400306B (en) * | 2020-02-20 | 2023-03-28 | 上海交通大学 | RDMA (remote direct memory Access) -and non-volatile memory-based radix tree access system |
CN113934697A (en) * | 2021-10-21 | 2022-01-14 | 中孚安全技术有限公司 | Method and system for improving IO performance based on kernel file filtering driver |
CN113934697B (en) * | 2021-10-21 | 2022-04-08 | 中孚安全技术有限公司 | Method and system for improving IO performance based on kernel file filtering driver |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107967124B (en) | Distributed persistent memory storage system and method | |
CN104915151B (en) | A kind of memory excess distribution method that active is shared in multi-dummy machine system | |
CN105960645B (en) | Security system and method in the security system | |
CN103635900B (en) | Time-based data partitioning | |
CN103493024B (en) | For the method and system of cache hierarchy | |
CN110245001A (en) | Data isolation method and device, electronic equipment | |
CN107395665A (en) | A kind of block chain service handling and business common recognition method and device | |
CN108509613A (en) | A method of promoting encrypted file system performance using NVM | |
TWI309005B (en) | Stack caching systems and methods | |
TW200521869A (en) | Semiconductor memory card, semiconductor memory control apparatus and semiconductor memory control method | |
CN109753231A (en) | Method key assignments storage equipment and operate it | |
CN101375241A (en) | Efficient data management in a cluster file system | |
CN105408875B (en) | Distributed process on memory interface executes and file system | |
CN101739301A (en) | Method of interprocess mass data transmission under Unix environment | |
CN103095788A (en) | Cloud resource scheduling policy based on network topology | |
CN105793835B (en) | System and method for supporting the I/O in computing environment to virtualize | |
CN106815528A (en) | A kind of file management method and device, storage device | |
CN110007877A (en) | Host and dual control storage equipment room data transmission method, device, equipment and medium | |
CN108431815A (en) | The duplicate removal complex data of distributed data in processor grid | |
CN106201918B (en) | A kind of method and system based on big data quantity and extensive caching quick release | |
CN109791510A (en) | Data flow is managed in Heterogeneous Computing | |
US8132025B2 (en) | Management method for archive system security | |
CN110175318A (en) | A kind of settlement of insurance claim attachment generation method and device | |
WO2023185639A1 (en) | Data interaction system and method based on nvme hard disk | |
EP3293625B1 (en) | Method and device for accessing file, and storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20210312 |