WO2015176461A1 - 分布式文件系统的文件访问处理、访问方法及装置 - Google Patents

分布式文件系统的文件访问处理、访问方法及装置 Download PDF

Info

Publication number
WO2015176461A1
WO2015176461A1 PCT/CN2014/087619 CN2014087619W WO2015176461A1 WO 2015176461 A1 WO2015176461 A1 WO 2015176461A1 CN 2014087619 W CN2014087619 W CN 2014087619W WO 2015176461 A1 WO2015176461 A1 WO 2015176461A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
access
directory
distributed
encrypted
Prior art date
Application number
PCT/CN2014/087619
Other languages
English (en)
French (fr)
Inventor
刘勇
陆小慧
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015176461A1 publication Critical patent/WO2015176461A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Definitions

  • the present invention relates to the field of computer networks, and in particular, to a file access processing, access method and apparatus for a distributed file system.
  • HDFS Hadoop Distributed File System
  • HDFS provides low-level support for distributed computing storage.
  • PB gigabyte
  • HDFS By distributing data and using distributed computing frameworks (such as map reduction MapReduce), HDFS can process data in parallel on the node where the data resides, which makes processing very fast.
  • distributed computing frameworks such as map reduction MapReduce
  • HDFS automatically maintains multiple copies of data and automatically redeploys compute tasks after a task fails.
  • Figure 1 shows the structure of HDFS, as shown in Figure 1:
  • HDFS uses the master/slave architecture.
  • An HDFS cluster consists of a NameNode and a number of DataNodes.
  • the NameNode is a central server that manages the file system's namespace and client access to files.
  • the NameNode performs file system namespace operations such as opening, closing, renaming files or directories. It is also responsible for determining the mapping of data blocks to specific DataNodes.
  • the DataNode in the cluster is responsible for managing the storage on the node it is on.
  • HDFS exposes the file system's namespace, where users can store data in the form of files. From the inside, one The files are divided into one or more data blocks, which are stored on a set of DataNodes.
  • the DataNode is responsible for handling read and write requests from file system clients. Create, delete, and copy data blocks under the unified scheduling of the NameNode.
  • Client Accesses the entire file system on behalf of the user by interacting with the NameNode and DataNode.
  • Command line interface An interface in the client that interfaces with the Linux architecture (shell).
  • the present invention provides a file access processing, access method and device for the distributed file system.
  • a file access processing method for a distributed file system including: acquiring file information to be encrypted in an internal file of a distributed file system; The access procedure corresponding to at least one of the indicated file and the directory to which the file belongs is encrypted, and/or the file itself indicated by the file information is encrypted.
  • the access procedure corresponding to at least one of the file indicated by the file information and the directory to which the file belongs is encrypted, including at least one of the following: only an interface for accessing the encrypted file or directory Open access rights; modify the specified class parameters of the command line interface of the distributed system for encryption.
  • modifying the specified class parameter of the command line interface of the distributed system to perform encryption comprises: modifying the specified parameter class, wherein the modified specified parameter class is used to prohibit displaying the encrypted file or directory; Modifying the specified parameter class, wherein the modified specified parameter class is used to restrict access rights of the specified user to the file or directory.
  • the distributed file system internal file includes: a file input by the client, and an existing file in the distributed system; and encrypting the file itself indicated by the file information, including at least one of the following: Inputting the file, calculating the encrypted local file according to the key input on the command line interface, and generating the encrypted file; uploading the encrypted file to the distributed system; And generating a mapping reduction MapReduce task on the command line interface, wherein the MapReduce task is used to encrypt the file or directory indicated by the file information in the data node and replace the original file or directory; and execute the MapReduce task.
  • executing the MapReduce task comprises: reading an original file indicated by the file information in the distributed file system according to a parameter input at the command line interface; according to a key input on the command line interface The read file is encrypted and replaced with the original file.
  • a file access method for a distributed file system including: receiving an access request from a client to a specified file or a directory to which the specified file belongs, wherein The specified file is a file that is encrypted in an access system and/or a file itself in a distributed system, where the directory is a directory encrypted by an access process of the directory; and the access corresponding to the access request is The process and/or the requested file is decrypted.
  • the decrypting the file requested by the access request comprises: generating a mapping reduction MapReduce task on the command line interface, wherein the MapReduce task is used to read the file requested by the access request in the distributed system, Decrypting the file requested by the access request.
  • a file access processing apparatus for a distributed file system including: an obtaining module configured to acquire file information to be encrypted in an internal file of a distributed file system. And an encryption module configured to encrypt an access procedure corresponding to at least one of the file indicated by the file information and the directory to which the file belongs, and/or to encrypt the file itself indicated by the file information.
  • the encryption module is configured to encrypt the access procedure by at least one of: opening access rights only to an interface for accessing the encrypted file or directory; modifying the distributed system The specified class parameters of the command line interface are encrypted.
  • An access request wherein the specified file is a file encrypted in an access system and/or a file itself in a distributed system, where the directory is a directory encrypted by an access process of the directory; a decryption module, setting Decrypting the access process and/or the requested file corresponding to the access request.
  • the access method of the file or directory of the distributed file system and the technical means for encrypting the file itself are used to solve the related art, and the authentication mechanism does not exist in the distributed file system, which causes the file access to have security risks.
  • Such technical issues enhance the security of file access in distributed file systems.
  • FIG. 1 is a schematic structural diagram of an HDFS according to the related art
  • FIG. 2 is a flowchart of a file access processing method of a distributed file system according to an embodiment of the present invention
  • FIG. 3 is a structural block diagram of a file access processing apparatus of a distributed file system according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a file access method of a distributed file system according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram of a file access apparatus of a distributed file system according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing the principle of encrypting an access process by using a mask interface manner according to a preferred embodiment of the present invention
  • FIG. 7 is a schematic diagram showing the principle of encrypting an access procedure by using a specified parameter of a modified command line interface according to a preferred embodiment of the present invention
  • FIG. 8 is a schematic diagram showing the principle of encrypting a file according to a preferred embodiment of the present invention.
  • FIG. 9 is a schematic diagram showing the principle of encrypting a write file according to a preferred embodiment of the present invention.
  • FIG. 10 is a schematic diagram showing the principle of encrypting an HDFS file according to a preferred embodiment of the present invention.
  • FIG. 11 is a schematic diagram showing the principle of decrypting an encrypted HDFS file according to a preferred embodiment of the present invention.
  • FIG. 12 is a schematic diagram showing the principle of a file or directory access encryption process according to a preferred embodiment of the present invention.
  • FIG. 13 is a schematic diagram showing the principle of a file or directory access decryption process according to a preferred embodiment of the present invention.
  • FIG. 14 is a schematic diagram showing the principle of an encrypted file or directory access operation process according to a preferred embodiment of the present invention.
  • the distributed file system in the related art does not have an authentication mechanism for file access, and has certain security risks and the like.
  • the following embodiments provide a technical means for encrypting and decrypting the internal file of the distributed file system and encrypting and decrypting the file itself. The details are as follows.
  • FIG. 2 is a flow chart of a file access processing method of a distributed file system according to an embodiment of the present invention. As shown in FIG. 2, the method includes steps S202-S204:
  • Step S202 acquiring file information to be encrypted in an internal file of the distributed file system
  • Step S204 encrypting the file indicated by the file information or the access process corresponding to at least one of the directories to which the file belongs, and/or encrypting the file itself indicated by the file information.
  • the meaning of "at least one of the corresponding access procedures" is as follows: the access process corresponding to the directory to which the file or file belongs, the file and the directory to which the file belongs are simultaneously accessed.
  • the file information to be encrypted may include file information of some or all of the files in the distributed file system.
  • the "access process” may be expressed as an access action to a file (for example, sending an access request or the like, not limited thereto), a node authority involved in the access (for example, a command line interface authority, etc., but is not limited thereto).
  • "File itself” includes but is not limited to file content.
  • step S204 encrypting the access process corresponding to at least one of the file indicated by the file information or the directory to which the file belongs may be implemented by at least one of the following methods:
  • Modify the specified class parameters of the command line interface of the above distributed system for encryption Modifying the above specified parameter class, wherein the modified specified parameter class is used to prohibit displaying the encrypted file or directory; modifying the specified parameter class, wherein the modified specified parameter class is used to restrict the specified user to the above file or Access to the directory.
  • the meaning of "restriction” here includes: prohibiting all or part of the access rights to the above files or directories, for example, all access actions to the above files or directories may be prohibited, or only modification, deletion, etc. of the files may be prohibited.
  • the distributed file system internal file includes, but is not limited to, a file input by the client, and an existing file in the distributed system; correspondingly, the file itself indicated by the file information is encrypted in step S204, including At least one of the following implementations:
  • the local file of the client is calculated according to the key input on the command line interface, and the encrypted file is generated; and the encrypted file is uploaded to the distributed file system;
  • MapReduce task (2) generating a MapReduce task on the command line interface for the existing file in the distributed system, wherein the MapReduce task is used to encrypt the file or directory indicated by the file information in the data node and replace the original file or directory;
  • MapReduce task The execution of the above MapReduce task may be expressed as follows but not limited to the following forms:
  • the original file indicated by the above file information in the distributed file system is read according to the parameter input on the above command line interface; the read file is encrypted according to the key input on the command line interface and the original file is replaced.
  • a file access processing device of a distributed file system is further provided. As shown in FIG. 3, the device includes:
  • the obtaining module 30 is configured to obtain file information to be encrypted in an internal file of the distributed file system
  • the encryption module 32 is connected to the obtaining module 30, and is configured to encrypt the file indicated by the file information or the access process corresponding to at least one of the files belonging to the file, and/or encrypt the file itself indicated by the file information.
  • the encryption module 32 is further configured to encrypt the access process by using at least one of the following: opening access rights only to an interface for accessing the encrypted file or directory; Modifying the specified class parameters of the command line interface of the distributed system for encryption.
  • each of the foregoing modules may be implemented by using a hardware, for example, the obtaining module 30 is located in the first processor, the encryption module 32 is located in the second processor, and the obtaining module 30 and the encryption module 32 are located in the same processor. .
  • a file access method of the distributed file system is also provided. As shown in FIG. 4, the method includes:
  • Step S402 receiving an access request from a client to a specified file or a directory to which the specified file belongs, wherein the specified file is a file that is encrypted in the distributed system and/or the file itself is encrypted.
  • the encrypted directory of the directory access process
  • Step S404 decrypting the access process corresponding to the access request and/or the requested file.
  • the decrypting the file requested by the access request includes, but is not limited to, the following form: generating a MapReduce task on the command line interface, where the MapReduce task is used to read the file requested by the access request in the distributed system, and The file requested by the above access request is decrypted.
  • a file access device of the distributed file system is further provided to implement the foregoing access method. As shown in FIG. 5, the method includes:
  • the receiving module 50 is configured to receive an access request from a client to a specified file or a directory to which the specified file belongs, where the specified file is a file that is encrypted in the distributed system and/or the file itself is encrypted.
  • the directory is a directory encrypted by the access process of the directory;
  • the decryption module 52 is coupled to the receiving module 50 and configured to decrypt the access process and/or the requested file corresponding to the access request.
  • each of the foregoing modules may be implemented by using a hardware, for example, the receiving module 50 is located in the first processor, the decrypting module 52 is located in the second processor, and the receiving module 50 and the decrypting module 52 are located in the same processor. .
  • the following preferred embodiment is described by taking HDFS as an example.
  • the main design idea of the following preferred embodiment is to provide access control of directories or files and encryption of file contents (ie, files themselves) on the basis of HDFS.
  • Encrypting the contents of a file requires a dedicated key (KEY) to be decrypted using the tool.
  • KEY is set by the user before the file encryption is performed.
  • modify the fs command to modify the "hadoop fs–ls" method so that it cannot display the files that have been encrypted for access.
  • Modify the admin class so that general users can access without permission.
  • the encryption method may be a Message-Digest Algorithm 5 (MD5), but is not limited thereto.
  • the ls parameter can list all files and subdirectories in the current directory. If not processed, the encrypted directory and files can be displayed through the "hadoop fs–ls parent directory" command, so that all encryption fails.
  • MD5 encrypted length is fixed to 32 bits, design a rule: the original directory or file name only supports 31 bits and below (here refers to the single section name, not the full path name).
  • the ls parameter only lists 31 and below directories and file names, and 32 bits are hidden. This will modify the ls parameter.
  • the understanding of the admin class is as follows: For the HDFS access, according to the environment variable of the access user, the setting of the JAVA package is different, and the permission of the user to access the HDFS command can be controlled.
  • set up a super user similar to all the operating functions of the original HDFS file management system. Other users can only access the modified HDFS access class. All other classes related to management functions are not added. In this way, the original users are divided into super users and encryption systems to access users to control the rigor of access rights.
  • MD5 is a secure hash algorithm. Inputting two different plaintexts will not get the same output value. According to the output value, the original plaintext cannot be obtained, that is, the process is irreversible; therefore, the decryption of MD5 is not ready.
  • the algorithm can only use the exhaustive method to hash the possible plaintext, and then use the MD5 algorithm to hash the obtained hash value and the original data into a one-to-one mapping table, which is better than cracking the password in the table.
  • the MD5 algorithm hash value is obtained by matching the original plaintext corresponding to the cracked password from the mapping table.
  • MD5 The role of MD5 is to allow large amounts of information to be "compressed" into a secure format before signing the private key with digital signature software. Since the use of the MD5 algorithm does not require any copyright fees, MD5 is also a very good encryption algorithm under normal circumstances, and is widely used by a large number of companies and individuals.
  • an input class such as put is modified, and when the KEY parameter is provided, the HDFS is uploaded after the file is encrypted and converted.
  • MapReduce programs for HDFS internal files to be encrypted and converted by KEY.
  • decryption is a reverse engineering in the case of providing a KEY.
  • it can be expressed as a command line generation task: modify the command line interface to judge by inputting a command. Normal write read, or encrypted write read. Normal reading and writing is performed by the basic fs class.
  • the command line interface is responsible for generating MapReduce tasks, and encrypting and replacing the file data in the DataNode.
  • the NameNode access is the same as normal read and write, and no changes are made.
  • the MapReduce program accepts the parameters and encryption KEY passed in the command line interface, reads the local file (the client local file), and generates an encrypted file after the operation. , write to HDFS.
  • the file is stored in the NameNode in the same way as a normal file.
  • the HDFS file is replaced by the original HDFS file: the MapReduce program accepts the parameters and encryption KEYs passed in the command line interface, reads the HDFS file, and generates an encrypted file after the operation to replace the file in the HDFS.
  • the file name stored in the NameNode is unchanged. For the NameNode, it is actually a process of file reading, file deletion, and file writing.
  • the command line pass command adds parameters to generate a MapReduce task.
  • the task reads the relevant HDFS encrypted file, then performs the decryption work, and submits the result to the command line interface after completion.
  • the file encryption process is to calculate an MD5 encryption result KEY by using the provided KEY, and according to the result KEY, simple binary conversion encryption is performed (if 0000 is to be encrypted, according to the MD5 result KEY, if the binary representation of the KEY is The corresponding bit number of the upper bit does not change the original data. If it is 1, then 0 is written as 1, and 1 is written as 0).
  • Step 1 Normally deploy HDFS and MapReduce.
  • Step 2 Replace the FS class package modified in the foregoing embodiment with the FS class package in the original HDFS.
  • Step 3 Add the MapReduce task package in the above embodiment to the MapReduce task.
  • the file or directory access encryption process is as follows:
  • Part 1 The operation commands that need to be entered under linux
  • Command header + parameters such as: hadoop fs - e here to design a parameter - e, indicating the encryption signal parameters;
  • Password a string of characters, such as: abcd;
  • Part 2 Modified HDFS access class (hadoop fs);
  • Part 3 Storage of HDFS files or directories
  • Step 1 Combine this command with the linux user who can use HDFS.
  • the explanation of the user's details is followed by a note in the document.
  • Step 2 The modified HDFS access class runs the first step to check whether the input full path A exists in component 3;
  • Step 3 Perform MD5 encryption on the last section of Full Path A.
  • paths are separated by the symbol "/”
  • the last section is a non-empty string before the end of the line separated by "/”.
  • ccc the encrypted full path B is: /aaa/bbb/ddd, where ddd is the MD5 encrypted string of ccc;
  • Step 4 Rename /aaa/bbb/ccc in component 3 to /aaa/bbb/ddd;
  • Steps 5, 6 Return the result of the operation after the file name is replaced successfully or incorrectly.
  • the file or directory access decryption process is as follows:
  • Part 1 The operation commands that need to be entered under linux
  • Command header + parameters such as: hadoop fs - d here to design a parameter -d, indicating the parameters of the decryption signal;
  • Password a string of characters, such as: abcd;
  • Part 2 Modified HDFS access class (hadoop fs);
  • Part 3 Storage of HDFS files and directories
  • Step 1 Combine the following commands in linux that can be used with HDFS:
  • Step 2 Perform MD5 encryption on the last section of Full Path A.
  • ccc the encrypted full path B is: /aaa/bbb/ddd where ddd is the MD5 encrypted string of ccc.
  • ddd is the MD5 encrypted string of ccc.
  • Step 3 The modified HDFS access class runs the first step to check whether the input full path B exists in component 3.
  • Step 4 Rename /aaa/bbb/ddd in component 3 to /aaa/bbb/ccc.
  • Steps 5, 6 Return the result of the operation after the file name is replaced successfully or incorrectly.
  • the encrypted file or directory access operation process is as follows: 3 parts, 5 steps.
  • Component 1 The operation command that needs to be input under linux;
  • the command header + parameter such as: hadoop fs–lsd evolved from the original parameter ls, indicating that the ls operation is performed on the encrypted directory. (There are many types of parameters here. All parameters related to file and directory name operations need to be modified; the lsd command cannot display encrypted files or path information as the ls command);
  • ccc can be a file or a directory
  • Password a string of characters, such as: abcd;
  • Part 2 Modified HDFS access class (hadoop fs);
  • Part 3 Storage of HDFS files and directories
  • Step 1 Combine the following commands in linux that can be used with HDFS:
  • Step 2 Perform MD5 encryption on the last section of Full Path A.
  • ccc the encrypted full path B is: /aaa/bbb/dddd ddd is the MD5 encrypted string of ccc.
  • Step 3 Use the modified function with the original function of HDFS (such as ls, mkdir, etc.), plus the path A and password before encryption.
  • This command is assembled in step 2 as the original HDFS system.
  • the command plus the encrypted path is manipulated here. (The essence here is to find the encrypted path name and then use the original features of HDFS).
  • the internal execution command is: hadoop fs–ls/aaa/bbb/dddd ddd is the MD5 encryption string of ccc;
  • Steps 4, 5 Return the result of the operation after the file name is replaced successfully or incorrectly.
  • a storage medium is further provided, wherein the software includes the above-mentioned software, including but not limited to: an optical disk, a floppy disk, a hard disk, an erasable memory, and the like.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above technical solution provided by the embodiment of the present invention uses a technical means for encrypting a file or directory of a distributed file system and encrypting the file itself, and solves the related art, and the authentication mechanism does not exist in the distributed file system.
  • the file access has technical problems such as security risks, which enhances the security of file access in the distributed file system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供了一种分布式文件系统的文件访问处理、访问方法及装置,其中,该访问处理方法包括:获取对分布式文件系统内部文件中待加密的文件信息;对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,和/或对所述文件信息指示的文件本身进行加密,采用本发明提供的上述技术方案,解决了相关技术中,分布式文件系统中并不存在鉴权机制,导致文件访问存在安全隐患等技术问题,从而增强了分布式文件系统中文件访问的安全性。

Description

分布式文件系统的文件访问处理、访问方法及装置 技术领域
本发明涉及计算机网络领域,尤其是涉及一种分布式文件系统的文件访问处理、访问方法及装置。
背景技术
目前分布式文件系统内部对文件的读写在集群内部没有鉴权机制,而分布式文件系统未来将面向大量用户并发访问,这样一来,对于目录和文件的访问控制势在必行。以下以Hadoop分布式文件系统(Hadoop Distributed File System,简称为HDFS)为例进行说明。
HDFS为分布式计算存储提供了底层支持。首先介绍HDFS的一些主要特点:
扩容能力(Scalable):能可靠地(Reliably)存储和处理千兆字节(PB)数据。
成本低(Economical):可以通过普通机器组成的服务器群来分发以及处理数据。这些服务器群总计可达数千个节点。
高效率(Efficient):通过分发数据,借助分布式计算框架(例如映射归约MapReduce),HDFS可以在数据所在的节点上并行地处理数据,这使得处理非常的快速。
可靠性(Reliable):HDFS能自动地维护数据的多份复制,并且在任务失败后能自动地重新部署计算任务。
图1示出了HDFS的结构,如图1所示:
名称节点(NameNode):HDFS采用主/从(master/slave)架构。一个HDFS集群是由一个NameNode和一定数目的数据节点(DataNode)组成。NameNode是一个中心服务器,负责管理文件系统的名称空间(namespace)以及客户端对文件的访问。NameNode执行文件系统的名字空间操作,比如打开、关闭、重命名文件或目录。它也负责确定数据块到具体DataNode的映射。
数据节点(DataNode):集群中的DataNode负责管理它所在节点上的存储。HDFS暴露了文件系统的名称空间,用户能够以文件的形式在上面存储数据。从内部看,一 个文件被分成一个或多个数据块,这些块存储在一组DataNode上。DataNode负责处理文件系统客户端的读写请求。在NameNode的统一调度下进行数据块的创建、删除和复制。
客户端:代表用户通过与NameNode和DataNode交互来访问整个文件系统。
命令行接口:客户端中与Linux架构(shell)连接的一种接口。
发明内容
针对相关技术中,分布式文件系统中并不存在鉴权机制,导致文件访问存在安全隐患等技术问题,本发明提供了一种分布式文件系统的文件访问处理、访问方法及装置。
为了达到上述目的,根据本发明的一个实施例,还提供了一种分布式文件系统的文件访问处理方法,包括:获取对分布式文件系统内部文件中待加密的文件信息;对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,和/或对所述文件信息指示的文件本身进行加密。
优选地,对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,包括以下至少之一:仅对用于访问已加密的所述文件或目录的接口开放访问权限;修改所述分布式系统的命令行接口的指定类参数进行加密。
优选地,修改所述分布式系统的命令行接口的指定类参数进行加密,包括:修改所述指定参数类,其中,修改后的所述指定参数类用于禁止显示已加密的文件或目录;修改所述指定参数类,其中,修改后的所述指定参数类用于限制指定用户对所述文件或目录的访问权限。
优选地,所述分布式文件系统内部文件包括:客户端输入的文件,和所述分布式系统内部已有文件;对所述文件信息指示的文件本身进行加密,包括以下至少之一:对客户端输入的文件,根据在命令行接口输入的密钥对客户端的本地文件进行运算,生成加密后的加密文件;向所述分布式系统上传所述加密文件;对所述分布式系统内部已有文件,在命令行接口生成映射归约MapReduce任务,其中,该MapReduce任务用于对数据节点中所述文件信息指示的文件或目录进行加密并替换原文件或目录;执行所述MapReduce任务。
优选地,执行所述MapReduce任务,包括:根据在所述命令行接口输入的参数读取所述分布式文件系统中所述文件信息指示的原文件;根据在所述命令行接口输入的密钥对读取的文件进行加密并替换所述原文件。
为了达到上述目的,根据本发明的再一个实施例,还提供了一种分布式文件系统的文件访问方法,包括:接收来自客户端对指定文件或所述指定文件所属目录的访问请求,其中,所述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;对所述访问请求所对应的访问过程和/或所请求的文件进行解密。
优选地,对所述访问请求所请求的文件进行解密,包括:在命令行接口生成映射归约MapReduce任务,其中,该MapReduce任务用于读取分布式系统中所述访问请求所请求的文件,并对所述访问请求所请求的文件进行解密。
为了达到上述目的,根据本发明的再一个实施例,还提供了一种分布式文件系统的文件访问处理装置,包括:获取模块,设置为获取对分布式文件系统内部文件中待加密的文件信息;加密模块,设置为对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,和/或对所述文件信息指示的文件本身进行加密。
优选地,所述加密模块,设置为通过以下至少之一方式对所述访问过程进行加密:仅对用于访问已加密的所述文件或目录的接口开放访问权限;修改所述分布式系统的命令行接口的指定类参数进行加密。
为了达到上述目的,根据本发明的再一个实施例,还提供了一种分布式文件系统的文件访问装置,包括:接收模块,设置为接收来自客户端对指定文件或所述指定文件所属目录的访问请求,其中,所述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;解密模块,设置为对所述访问请求所对应的访问过程和/或所请求的文件进行解密。
通过本发明,采用对分布式文件系统的文件或目录的访问过程以及文件本身进行加密的技术手段,解决了相关技术中,分布式文件系统中并不存在鉴权机制,导致文件访问存在安全隐患等技术问题,从而增强了分布式文件系统中文件访问的安全性。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为根据相关技术的HDFS的结构示意图;
图2为根据本发明实施例的分布式文件系统的文件访问处理方法的流程图;
图3为根据本发明实施例的分布式文件系统的文件访问处理装置的结构框图;
图4为根据本发明实施例的分布式文件系统的文件访问方法的流程图;
图5为根据本发明实施例的分布式文件系统的文件访问装置的结构框图;
图6为根据本发明优选实施例的采用屏蔽接口方式对访问过程加密的原理示意图;
图7为根据本发明优选实施例的采用修改命令行接口的指定参数对访问过程进行加密的原理示意图;
图8为根据本发明优选实施例的对文件加密的原理示意图;
图9为根据本发明优选实施例的对写入文件进行加密的原理示意图;
图10为根据本发明优选实施例的对HDFS文件进行加密的原理示意图;
图11为根据本发明优选实施例的对已加密HDFS文件进行解密的原理示意图;
图12为根据本发明优选实施例的文件或目录访问加密过程的原理示意图;
图13为根据本发明优选实施例的文件或目录访问解密过程的原理示意图;
图14为根据本发明优选实施例的加密后的文件或目录访问操作过程的原理示意图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
相关技术中的分布式文件系统对文件访问不存在鉴权机制,存在一定的安全隐患等问题,以下实施例提供了对分布式文件系统内部文件的访问过程及文件本身进行加密解密的技术手段,以下详细说明。
图2为根据本发明实施例的分布式文件系统的文件访问处理方法的流程图。如图2所示,该方法包括步骤S202-S204:
步骤S202,获取对分布式文件系统内部文件中待加密的文件信息;
步骤S204,对上述文件信息指示的文件或和该文件所属目录中至少之一所对应的访问过程进行加密,和/或对上述文件信息指示的文件本身进行加密。此处“至少之一所对应的访问过程”的含义为:文件或文件所属目录所对应的访问过程、文件和文件所属目录同时所对应的访问过程。
采用上述处理步骤,由于对分布式文件系统的内部文件及访问过程进行了加密处理,因此,可以提高分布式文件系统中文件访问的安全性。
在本实施例中,待加密的文件信息可以包括分布式文件系统中部分或全部文件的文件信息。“访问过程”可以表现为对文件的访问动作(例如发送访问请求等,不限于此)、进行访问所涉及的节点权限(例如命令行接口权限等,但不限于此)。“文件本身”包括但不限于文件内容。
步骤S204中,对上述文件信息指示的文件或文件所属目录至少之一所对应的访问过程进行加密可以通过以下至少之一方式实现:
(1)仅对用于访问已加密的上述文件或目录的接口开放访问权限;
(2)修改上述分布式系统的命令行接口的指定类参数进行加密。修改上述指定参数类,其中,修改后的上述指定参数类用于禁止显示已加密的文件或目录;修改上述指定参数类,其中,修改后的上述指定参数类用于限制指定用户对上述文件或目录的访问权限。此处“限制”的含义包括:禁止对上述文件或目录的全部或部分访问权限,例如,可以禁止对上述文件或目录的全部访问动作,或者仅禁止对文件的修改、删除等。
在本实施例中,分布式文件系统内部文件包括但不限于:客户端输入的文件,和分布式系统内部已有文件;相应地,步骤S204中对上述文件信息指示的文件本身进行加密,包括以下至少之一实现方式:
(1)对客户端输入的文件,根据在命令行接口输入的密钥对客户端的本地文件进行运算,生成加密后的加密文件;向分布式文件系统上传上述加密文件;
(2)对上述分布式系统内部已有文件,在命令行接口生成MapReduce任务,其中,该MapReduce任务用于对数据节点中上述文件信息指示的文件或目录进行加密并替换原文件或目录;执行上述MapReduce任务。其中,执行上述MapReduce任务,可以表现为但不限于以下形式:
根据在上述命令行接口输入的参数读取上述分布式文件系统中上述文件信息指示的原文件;根据在上述命令行接口输入的密钥对读取的文件进行加密并替换上述原文件。
在本实施例中,还提供了一种分布式文件系统的文件访问处理装置,如图3所示,该装置包括:
获取模块30,设置为获取对分布式文件系统内部文件中待加密的文件信息;
加密模块32,连接至获取模块30,设置为对上述文件信息指示的文件或和文件所属目录中至少之一所对应的访问过程进行加密,和/或对上述文件信息指示的文件本身进行加密。
在本实施例的一个优选实施例中,加密模块32,还用于通过以下至少之一方式对上述访问过程进行加密:仅对用于访问已加密的所述文件或目录的接口开放访问权限;修改所述分布式系统的命令行接口的指定类参数进行加密。
需要说明的是,上述各个模块是可以通过硬件来实现的,例如:获取模块30位于第一处理器中,加密模块32位于第二处理器中;获取模块30和加密模块32位于同一处理器中。
与图2所示的分布式文件系统的文件访问处理方法相对应,在本实施例中,还提供了一种分布式文件系统的文件访问方法,如图4所示,该方法包括:
步骤S402,接收来自客户端对指定文件或指定文件所属目录的访问请求,其中,上述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;
步骤S404,对上述访问请求所对应的访问过程和/或所请求的文件进行解密。
其中,对上述访问请求所请求的文件进行解密包括但不限于以下形式:在命令行接口生成MapReduce任务,其中,该MapReduce任务用于读取分布式系统中上述访问请求所请求的文件,并对上述访问请求所请求的文件进行解密。
在本实施例中,还提供一种分布式文件系统的文件访问装置,用于实现上述访问方法,如图5所示,该方法包括:
接收模块50,设置为接收来自客户端对指定文件或该指定文件所属目录的访问请求,其中,上述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;
解密模块52,连接至接收模块50,设置为对上述访问请求所对应的访问过程和/或所请求的文件进行解密。
需要说明的是,上述各个模块是可以通过硬件来实现的,例如:接收模块50位于第一处理器中,解密模块52位于第二处理器中;接收模块50和解密模块52位于同一处理器中。
为了更好地理解上述实施例,以下结合优选实施例详细说明。以下优选实施例以HDFS为例进行说明。以下优选实施例的主要设计思想在于,在HDFS的基础上提供目录或文件的访问控制,及文件内容(即文件本身)加密。
实施例1
加密控制的两个方法:
对目录或文件访问(即访问过程)进行加密,访问时需要提供密码,可以设置为必须由键盘输入密码。
对文件内容进行加密,需要专用的密钥(KEY)才能够使用工具解密。KEY由用户在文件加密进行前设置。
对于访问加密,有两种实现方式:
1:屏蔽其它接口
如图6所示,只对已实现加密方法并部署成功的接口开放访问权限,其他接口删除或屏蔽。图6中的命令行接口是最常用的范例。
2:命令行接口变化
如图7所示,修改fs命令,修改“hadoop fs–ls”的方法使其不能对进行过访问加密的文件进行显示。通过加密方法对文件名称或文件目录进行加密。这样访问时通过文件名称加密码才能够进行访问。修改admin类,使一般用户访问没有权限操作。此时加密方法可以采用信息-摘要算法5(Message-Digest Algorithm 5,简称为MD5),但不限于此。
在该实现方式中,对于1s参数,ls参数能够列出当前目录下所有文件及子目录。如果不进行处理,那么加密后的目录及文件可以通过“hadoop fs–ls父目录”命令全部显示出来,这样加密就全部失败了。MD5加密后的长度固定为32位,设计一个规则:原始目录或文件名称只支持31位及以下(这里指单节名称,不是全路径名称)。而ls参数只列出31位及以下的目录及文件名称,32位的隐藏。这样来实现ls参数的修改。
在该实现方式中,对于admin类的理解如下:对于HDFS访问时根据访问用户的环境变量,JAVA包的设置不同,可以控制用户访问HDFS命令的权限。这里设置一个类似于超级(super)用户,使其拥有原本HDFS文件管理系统的所有操作功能。其他用户只能够访问修改后的HDFS访问类。其他管理功能相关的类全部不添加进去。这样将原来的用户分为super用户和加密系统访问用户来控制访问权限的严密性。
在该实现方式中,MD5是一个安全的散列算法,输入两个不同的明文不会得到相同的输出值,根据输出值,不能得到原始的明文,即其过程不可逆;所以要解密MD5没有现成的算法,只能用穷举法,把可能出现的明文,用MD5算法散列之后,把得到的散列值和原始的数据形成一个一对一的映射表,通过比在表中比破解密码的MD5算法散列值,通过匹配从映射表中找出破解密码所对应的原始明文。
MD5的作用是让大容量信息在用数字签名软件签署私人密钥前被“压缩”成一种保密的格式。由于MD5算法的使用不需要支付任何版权费用的,所以在一般的情况下,MD5也不失为一种非常优秀的加密算法,被大量公司和个人广泛使用。
对于文件加密,主要采用以下实现方式:
如图8所示,对于文件加密,对于外部输入文件,修改put等输入类,在提供KEY参数的情况下进行加密转换文档后在上传HDFS。对HDFS内部文件提供MapReduce程序通过KEY进行加密转换。同理,解密是在提供KEY的情况下的一个逆向工程。对于上述加密过程可以表现为命令行生成任务:修改命令行接口通过输入命令判断是 正常写入读取,还是加密写入读取。正常读写的通过基本fs类进行操作。加密读写的情况下命令行接口负责生成MapReduce任务,对DataNode中的该文件数据进行加密替换。涉及到NameNode访问与正常读写相同,不进行变化。
其中,对于写加密,如图9所示,对于本地加密写入HDFS,MapReduce程序接受命令行接口传入的参数和加密KEY,读取本地文件(客户端本地文件),进行运算后生成加密文件,写入HDFS。文件在NameNode中的存储和正常写入文件相同。
如图10所示,HDFS文件加密替换原有HDFS文件:MapReduce程序接受命令行接口传入的参数和加密KEY,读取HDFS文件,进行运算后生成加密文件,替换HDFS内文件。文件在NameNode中的存储的文件名称不变。对于NameNode来说实际是一个文件读取,文件删除,文件写入的过程。
对于读解密文件,如图11所示:命令行传命令加参数,生成MapReduce任务。该任务读取相关HDFS加密文件,然后进行解密工作,完成后提交结果给命令行接口。
在本实施例中,文件加密过程是通过提供的KEY算出一个MD5加密结果KEY,根据结果KEY只要进行简单二进制转换加密(如要对0000进行加密,根据MD5结果KEY,如果该KEY的二进制表述在对应的位数上位0则不改变原数据,如果是1则0写为1,1写为0)。
本实施例的一个实现流程如下:
步骤1,正常部署HDFS,MapReduce;
步骤2,将上述实施例中修改的FS类包替换原有的HDFS中的FS类包;
步骤3,将上述实施例中的MapReduce任务包加入MapReduce任务。
实施例2
如图12所示,文件或目录访问加密过程如下:
涉及3个部件,6个步骤。
部件1:linux下需要输入的操作命令构成
命令头+参数,如:hadoop fs–e这里设计一个参数-e,表示进行加密信号参数;
文件或目录全路径,如:/aaa/bbb/ccc这里ccc是文件或目录;
密码:一串字符串,如:abcd;
部件2:修改过的HDFS访问类(hadoop fs);
部件3:HDFS文件或目录的存储;
存储于HDFS Namenode当中;
步骤1:将这个命令组合在可以使用HDFS的linux用户下完整输入(该用户详细情况的解释在文档后有备注提示);
命令头+参数+全路径A+密码;
其中全路径A模型:/aaa/bbb/ccc;
输入样例:hadoop fs–e/aaa/bbb/ccc abcd;
步骤2:修改过的HDFS访问类运行时第一步先检查输入的全路径A在部件3中是否存在;
步骤3:对全路径A的最后一节进行MD5加密。关于最后一节的解释:路径都是由符号“/”隔开,最后一节为“/”隔开的行尾前的非空字符串。根据步骤1的模型,这里是ccc,加密后的全路径B为:/aaa/bbb/ddd其中ddd为ccc的MD5加密串;
步骤4:将部件3中的/aaa/bbb/ccc重命名为/aaa/bbb/ddd;
步骤5,6:文件名替换成功或错误后返回操作结果。
如图13所示,文件或目录访问解密过程如下:
同样涉及3个部件,6个步骤。部件和步骤基本类似。
部件1:linux下需要输入的操作命令构成
命令头+参数如:hadoop fs–d这里设计一个参数-d,表示进行解密信号参数;
文件或目录全路径,如:/aaa/bbb/ccc这里ccc是文件或目录;
密码:一串字符串,如:abcd;
部件2:修改过的HDFS访问类(hadoop fs);
部件3:HDFS文件及目录的存储;
存储与HDFS Namenode当中;
步骤1:将以下命令组合在可以使用HDFS的linux下完整输入:
命令头+参数+全路径A+密码;
其中全路径A模型:/aaa/bbb/ccc;
输入样例:hadoop fs–d/aaa/bbb/ccc abcd;
步骤2:对全路径A的最后一节进行MD5加密。根据步骤1的模型,这里是ccc,加密后的全路径B为:/aaa/bbb/ddd其中ddd为ccc的MD5加密串。(这里还是一个加密的过程,本质上是根据用户提供的明文路径和密码,翻译为MD5密文路径。无论整个过程如何变化用户只需要且必须记住原始路径和密码)
步骤3:修改过的HDFS访问类运行第一步先检查输入的全路径B在部件3中是否存在。
步骤4:将部件3中的/aaa/bbb/ddd重命名为/aaa/bbb/ccc。
步骤5,6:文件名替换成功或错误后返回操作结果。
如图14所示,加密后的文件或目录访问操作过程如下:涉及3个部件,5个步骤。
部件1:linux下需要输入的操作命令构成;
命令头+参数,如:hadoop fs–lsd由原参数ls演变而来,表示对加密后的目录进行ls操作。(这里的参数类型很多,对所有涉及文件及目录名称操作的参数都需要修改;该lsd命令同ls命令一样不能显示加密的文件或路径信息);
文件或目录全路径,如:/aaa/bbb/ccc这里ccc可以是文件或是目录;
密码:一串字符串,如:abcd;
部件2:修改过的HDFS访问类(hadoop fs);
部件3:HDFS文件及目录的存储;
存储与HDFS Namenode当中;
步骤1:将以下命令组合在可以使用HDFS的linux下完整输入:
命令头+参数+全路径A+密码
全路径A模型:/aaa/bbb/ccc
步骤2:对全路径A的最后一节进行MD5加密。根据步骤1的模型,这里是ccc,加密后的全路径B为:/aaa/bbb/ddd ddd为ccc的MD5加密串。
步骤3:使用有HDFS原有一些功能(如ls、mkdir等)基础上修改过后的带加密功能的命令,加上加密前的路径A和密码,这个命令在步骤2中拼装为HDFS原系统相关命令加上加密后的路径在这里进行操作。(这里的本质还是找到加密后的路径名称,然后使用HDFS原有的功能)。
hadoop fs–lsd/aaa/bbb/ccc abcd;
操作时内部执行命令为:hadoop fs–ls/aaa/bbb/ddd ddd为ccc的MD5加密串;
步骤4,5:文件名替换成功或错误后返回操作结果。
在另外一个实施例中,还提供了一种软件,该软件用于执行上述实施例及优选实施方式中描述的技术方案。
在另外一个实施例中,还提供了一种存储介质,该存储介质中存储有上述软件,该存储介质包括但不限于:光盘、软盘、硬盘、可擦写存储器等。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
基于本发明实施例提供的上述技术方案,采用对分布式文件系统的文件或目录的访问过程以及文件本身进行加密的技术手段,解决了相关技术中,分布式文件系统中并不存在鉴权机制,导致文件访问存在安全隐患等技术问题,从而增强了分布式文件系统中文件访问的安全性。

Claims (10)

  1. 一种分布式文件系统的文件访问处理方法,包括:
    获取对分布式文件系统内部文件中待加密的文件信息;
    对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,和/或对所述文件信息指示的文件本身进行加密。
  2. 根据权利要求1所述的方法,其中,对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,包括以下至少之一:
    仅对用于访问已加密的所述文件或目录的接口开放访问权限;
    修改所述分布式系统的命令行接口的指定类参数进行加密。
  3. 根据权利要求2所述的方法,其中,修改所述分布式系统的命令行接口的指定类参数进行加密,包括:
    修改所述指定参数类,其中,修改后的所述指定参数类用于禁止显示已加密的文件或目录;
    修改所述指定参数类,其中,修改后的所述指定参数类用于限制指定用户对所述文件或目录的访问权限。
  4. 根据权利要求1所述的方法,其中,所述分布式文件系统内部文件包括:客户端输入的文件,和所述分布式系统内部已有文件;对所述文件信息指示的文件本身进行加密,包括以下至少之一:
    对客户端输入的文件,根据在命令行接口输入的密钥对客户端的本地文件进行运算,生成加密后的加密文件;向所述分布式系统上传所述加密文件;
    对所述分布式系统内部已有文件,在命令行接口生成映射归约MapReduce任务,其中,该MapReduce任务用于对数据节点中所述文件信息指示的文件或目录进行加密并替换原文件或目录;执行所述MapReduce任务。
  5. 根据权利要求4所述的方法,其中,执行所述MapReduce任务,包括:
    根据在所述命令行接口输入的参数读取所述分布式文件系统中所述文件信息指示的原文件;根据在所述命令行接口输入的密钥对读取的文件进行加密并替换所述原文件。
  6. 一种分布式文件系统的文件访问方法,包括:
    接收来自客户端对指定文件或所述指定文件所属目录的访问请求,其中,所述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;
    对所述访问请求所对应的访问过程和/或所请求的文件进行解密。
  7. 根据权利要求6所述的方法,其中,对所述访问请求所请求的文件进行解密,包括:
    在命令行接口生成映射归约MapReduce任务,其中,该MapReduce任务用于读取分布式系统中所述访问请求所请求的文件,并对所述访问请求所请求的文件进行解密。
  8. 一种分布式文件系统的文件访问处理装置,包括:
    获取模块,设置为获取对分布式文件系统内部文件中待加密的文件信息;
    加密模块,设置为对所述文件信息指示的文件和所述文件所属目录中至少之一所对应的访问过程进行加密,和/或对所述文件信息指示的文件本身进行加密。
  9. 根据权利要求8所述的装置,其中,所述加密模块,设置为通过以下至少之一方式对所述访问过程进行加密:
    仅对用于访问已加密的所述文件或目录的接口开放访问权限;
    修改所述分布式系统的命令行接口的指定类参数进行加密。
  10. 一种分布式文件系统的文件访问装置,包括:
    接收模块,设置为接收来自客户端对指定文件或所述指定文件所属目录的访问请求,其中,所述指定文件为分布式系统中对文件的访问过程和/或文件本身进行加密后的文件,所述目录为对所述目录的访问过程加密后的目录;
    解密模块,设置为对所述访问请求所对应的访问过程和/或所请求的文件进行解密。
PCT/CN2014/087619 2014-05-22 2014-09-26 分布式文件系统的文件访问处理、访问方法及装置 WO2015176461A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410218888.6A CN105095785A (zh) 2014-05-22 2014-05-22 分布式文件系统的文件访问处理、访问方法及装置
CN201410218888.6 2014-05-22

Publications (1)

Publication Number Publication Date
WO2015176461A1 true WO2015176461A1 (zh) 2015-11-26

Family

ID=54553340

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087619 WO2015176461A1 (zh) 2014-05-22 2014-09-26 分布式文件系统的文件访问处理、访问方法及装置

Country Status (2)

Country Link
CN (1) CN105095785A (zh)
WO (1) WO2015176461A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055340A (zh) * 2019-12-26 2021-06-29 华为技术有限公司 鉴权方法及设备
CN113190503A (zh) * 2021-05-08 2021-07-30 重庆紫光华山智安科技有限公司 文件系统扩容方法、装置、电子设备及存储介质

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446715A (zh) * 2016-10-11 2017-02-22 武汉斗鱼网络科技有限公司 一种文件加密方法和装置
CN108076034A (zh) * 2016-11-11 2018-05-25 北京嘀嘀无限科技发展有限公司 加解密数据的方法、装置及系统
CN106845253B (zh) * 2016-12-27 2020-07-07 迈普通信技术股份有限公司 历史操作记录加密方法及装置
CN108319634B (zh) * 2017-12-15 2021-08-06 深圳创新科技术有限公司 分布式文件系统的目录访问方法和装置
CN108376227B (zh) * 2017-12-29 2021-07-20 北京智芯微电子科技有限公司 一种安全芯片的文件访问方法及其系统
CN109886692B (zh) * 2019-03-08 2021-05-07 泰康保险集团股份有限公司 基于区块链的数据传输方法、装置、介质及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510370A (zh) * 2006-07-04 2012-06-20 大卫·欧文 对分布式文件系统的存取验证的方法和分布式文件系统
CN103209202A (zh) * 2012-01-16 2013-07-17 联想(北京)有限公司 用于传输数据的方法和设备
CN103370706A (zh) * 2010-12-16 2013-10-23 迈德安全网络有限公司 分布式文件系统
CN103401885A (zh) * 2013-08-19 2013-11-20 北京时代亿信科技有限公司 网络文档权限控制方法、装置及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051673B (zh) * 2012-11-21 2016-09-28 浪潮集团有限公司 一种基于Xen和Hadoop的云存储平台的构建方法
CN103401894B (zh) * 2013-07-11 2016-05-04 华南理工大学 一种b/s架构的流媒体drm云服务系统及实现方法
CN103581196B (zh) * 2013-11-13 2016-05-11 上海众人网络安全技术有限公司 分布式文件透明加密方法及透明解密方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510370A (zh) * 2006-07-04 2012-06-20 大卫·欧文 对分布式文件系统的存取验证的方法和分布式文件系统
CN103370706A (zh) * 2010-12-16 2013-10-23 迈德安全网络有限公司 分布式文件系统
CN103209202A (zh) * 2012-01-16 2013-07-17 联想(北京)有限公司 用于传输数据的方法和设备
CN103401885A (zh) * 2013-08-19 2013-11-20 北京时代亿信科技有限公司 网络文档权限控制方法、装置及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055340A (zh) * 2019-12-26 2021-06-29 华为技术有限公司 鉴权方法及设备
CN113055340B (zh) * 2019-12-26 2023-09-26 华为技术有限公司 鉴权方法及设备
CN113190503A (zh) * 2021-05-08 2021-07-30 重庆紫光华山智安科技有限公司 文件系统扩容方法、装置、电子设备及存储介质
CN113190503B (zh) * 2021-05-08 2022-12-02 重庆紫光华山智安科技有限公司 文件系统扩容方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN105095785A (zh) 2015-11-25

Similar Documents

Publication Publication Date Title
JP7540749B2 (ja) 暗号化されたユーザデータの移動および記憶
WO2015176461A1 (zh) 分布式文件系统的文件访问处理、访问方法及装置
US10270593B2 (en) Managing security in a computing environment
US10574456B2 (en) Encrypted file storage
US8613108B1 (en) Method and apparatus for location-based digital rights management
van Beek et al. Digital forensics as a service: Game on
CN104331408B (zh) 分级内容可寻址存储系统中的块级客户端侧加密
US10581603B2 (en) Method and system for secure delegated access to encrypted data in big data computing clusters
TW202145753A (zh) 加密使用者資料傳輸及儲存(nuts)之彈性階層式物件圖像
EP1680727B1 (en) Distributed document version control
Khatal et al. Fileshare: A blockchain and ipfs framework for secure file sharing and data provenance
US20100185852A1 (en) Encryption and decryption method for shared encrypted file
US20140122866A1 (en) Crypto Proxy for Cloud Storage Services
US20140245025A1 (en) System and method for storing data securely
WO2014113136A1 (en) Seamless secure private collaboration across trust boundaries
EP3356978B1 (en) Applying rights management policies to protected files
US10630722B2 (en) System and method for sharing information in a private ecosystem
WO2021198750A1 (en) System and method to manage information and documents on a native blockchain network system including permissioned blockchain, storage, sharing, organisation, porting and various applications
US11290277B2 (en) Data processing system
Mohammed et al. Securing medical records based on inter-planetary file system and blockchain
US10546142B2 (en) Systems and methods for zero-knowledge enterprise collaboration
WO2015162688A1 (ja) データ処理システム、データ処理方法
JP2018007088A (ja) 持ち出しファイル簡易暗号化システムおよび持ち出しファイル簡易暗号化プログラム
Sánchez Gómez Development of a software infrastructure for the secure distribution of documents using free cloud storage
EA040905B1 (ru) Зашифрованный транзит и хранение пользовательских данных

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14892570

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14892570

Country of ref document: EP

Kind code of ref document: A1