WO2021223431A1 - 工控系统数据安全的拟态存储系统及方法 - Google Patents

工控系统数据安全的拟态存储系统及方法 Download PDF

Info

Publication number
WO2021223431A1
WO2021223431A1 PCT/CN2020/134488 CN2020134488W WO2021223431A1 WO 2021223431 A1 WO2021223431 A1 WO 2021223431A1 CN 2020134488 W CN2020134488 W CN 2020134488W WO 2021223431 A1 WO2021223431 A1 WO 2021223431A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
data
industrial control
control system
mimic
Prior art date
Application number
PCT/CN2020/134488
Other languages
English (en)
French (fr)
Inventor
张�林
成轶波
孙辉
李挥
翟长春
翟岗
叶育林
张金华
康立福
马化军
Original Assignee
中广核工程有限公司
北京大学深圳研究生院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中广核工程有限公司, 北京大学深圳研究生院 filed Critical 中广核工程有限公司
Priority to EP20934446.4A priority Critical patent/EP4231168A1/en
Publication of WO2021223431A1 publication Critical patent/WO2021223431A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1076Parity data used in redundant arrays of independent storages, e.g. in RAID systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0658Controller construction arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0664Virtualisation aspects at device level, e.g. emulation of a storage device or system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/373Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35 with erasure correction and erasure determination, e.g. for packet loss recovery or setting of erasures for the decoding of Reed-Solomon codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • the invention relates to the technical field of industrial control systems, in particular to a mimic storage system and method for data security of the industrial control system.
  • the industrial control system (referred to as the industrial control system) is also continuously evolving.
  • the storage system node of the industrial control system of nuclear power plant as the information storage basic equipment of the industrial control system of nuclear power plant, its safety and reliability are very important to the whole system.
  • Storage systems are currently facing a severe network security situation, and it is becoming more and more important to study corresponding network security defense technologies in response to the emerging attack methods.
  • Traditional defense technologies mainly include firewall, authentication technology, access control, virus prevention, intrusion detection, vulnerability scanning, information encryption technology and disaster recovery and so on.
  • Traditional defense technologies have some inherent shortcomings. The main disadvantages are: the defense capability is passive and static, and its defense capability depends on the system configuration before accessing the system, and can only defend against network security attacks involved in the system configuration.
  • network security defense should be a process of dynamic change. New security vulnerabilities are constantly appearing, and hackers’ attack methods are constantly being renovated.
  • Traditional defense technologies are difficult to detect, identify, and deal with newly generated network attack methods. They can only passively accept network attacks. Each intrusion attack cannot fundamentally solve the network security problem. Therefore, traditional security defense technology is difficult to solve the industrial control system security problem.
  • Distributed File System means that the physical storage resources managed by the file system are not necessarily directly connected to the local node, but are connected to the node (which can be simply understood as a computer) through a computer network.
  • the design of the distributed file system is based on the client/server model.
  • a typical network may include multiple servers for multiple users to access.
  • the distributed file system is built on the basis of client/server technology.
  • One or more file servers operate in cooperation with the client file system, so that the client can access the files managed by the server.
  • MDFS Mimic Distributed File System
  • This architecture design uses the standard protocol interface as the object of mimicry, which can shield the implementation details of various heterogeneous systems to form a mimicking distributed file system, and present standard file interaction interfaces to the outside.
  • MDFS achieves dynamic, heterogeneous and redundancy.
  • MDFS does not solve the security problem caused by data reliability.
  • MDFS only solves the problem of active defense of the storage system.
  • the data reliability of the system is guaranteed by the mechanism of each heterogeneous file system that makes up the MDFS. Because the data reliability of different file systems is different, the data reliability of all nodes cannot be guaranteed. Therefore, the data reliability of the entire system cannot be obtained. guarantee. In addition, because MDFS is isomerized at the level of the entire system, the performance of different storage systems that make up MDFS is different, which increases the response time of the system, and brings performance loss compared with a storage system with a single structure. At the same time, multiple copies are redundant. The remaining mechanism leads to the high storage cost of the system.
  • the purpose of the present invention is to provide a mimic storage system and method for data security of an industrial control system, which realizes the storage system that integrates mimic defense characteristics into the industrial control system, has an active defense capability, and improves the security of the system.
  • the present invention provides a mimic storage system for data security in an industrial control system, which includes a dynamic heterogeneous module and an object storage module connected by communication;
  • the dynamic heterogeneous module includes a heterogeneous functional module connected by communication
  • a dynamic management module the heterogeneous function module is used to construct a variety of erasure coding encoding methods for the data files of the industrial control system
  • the dynamic management module is used to pseudo-randomly rotate the encoding methods
  • the object storage The module is used to encode and store the data file with erasure code according to the encoding method.
  • the object storage module includes an interface server module, an object storage device module, and a metadata server module; the interface server module is used to perform erasure code encoding on the data file according to the encoding method, Form n (n is an integer) data blocks; the object storage device module is in communication connection with the interface server module, the object storage device module is used to store the data block; the interface server module is also used to separate all the data blocks The file metadata in the data file, and the metadata server module is used to maintain the file metadata.
  • the object storage module further includes a load balancing module communicatively connected with the interface server module, and the load balancing module is used to forward file operations of the client to the interface server module.
  • the object storage module further includes a message queue module, the message queue module is communicatively connected between the interface server module and the object storage device module, and the message queue module is used for Realize the service function between the interface server module and the object storage device module.
  • the service function includes a heartbeat service module and a location service module.
  • the interface server module is used to divide the data file into k (k is an integer, k ⁇ n) parts, and encode each part of the data file according to a different encoding method. , Generate n data blocks.
  • the dynamic heterogeneous module further includes a redundancy voter module communicatively connected with the heterogeneous functional module.
  • the present invention also provides a mimic storage method for industrial control system data security, which includes the following steps: constructing multiple erasure coding encoding methods for data files of the industrial control system; performing pseudo-random rotation on the encoding methods; The data file is coded and stored with erasure code according to the coding method.
  • the step of encoding and storing the data file by erasure correction code according to the encoding method further includes the following step: performing erasure code encoding on the data file according to the encoding method, Form n (n is an integer) data blocks, and separate the file metadata in the data file; store the data blocks; maintain the file metadata.
  • the step of performing erasure correction coding on the data file according to the encoding method to form n (n is an integer) data blocks further includes the step of: dividing the data file into k (k is an integer, k ⁇ n) part; each part of the data file is coded according to different encoding methods to generate n data blocks.
  • the heterogeneous functional module can construct a variety of erasure coding encoding methods for the data files of the industrial control system.
  • the object storage module is used to store all data files in the industrial control system.
  • the data file is coded and stored with erasure codes according to the coding method, and the dynamic management module will pseudo-randomly rotate the erasure code coding method of the data file, so that the attacker cannot determine the state of the system at a certain time, and realizes mimic defense.
  • the dynamic characteristics of the same data file in the encoding process will use different erasure code encoding methods, to achieve the heterogeneous characteristics of mimic defense; data files are encoded by different erasure code encoding methods into multiple copies for storage , To achieve the redundant characteristics of mimic defense. That is, the storage system that integrates mimic defense features into the industrial control system is realized, has the ability of active defense, and improves the security of the system.
  • Fig. 1 is a schematic block diagram of a mimic storage system for data security of an industrial control system provided by the present invention
  • FIG. 2 is a schematic block diagram of the object storage module of the mimic storage system for industrial control system data security provided by the present invention
  • Figure 3 is a flowchart of a mimic storage method for industrial control system data security provided by the present invention.
  • FIG. 4 is a flow chart of sub-steps of step S30 of the mimic storage method for industrial control system data security provided by the present invention.
  • the present invention provides a mimic storage system 100 for data security of an industrial control system, which includes a dynamic heterogeneous module 10 and an object storage module 20 connected in communication.
  • the dynamic heterogeneous module 10 includes a communication-connected heterogeneous functional module 11 and a dynamic management module 12.
  • the heterogeneous functional module 11 is used to construct a variety of erasure coding encoding methods for data files of an industrial control system.
  • the management module 12 is configured to perform pseudo-random rotation on the encoding method, and the object storage module 20 is configured to perform erasure-correction code encoding and storage of the data file according to the encoding method.
  • the heterogeneous function module 11 can construct multiple erasure code encoding methods for the data files of the industrial control system, and the object storage module 20 is used to store the data files according to the Erasure code encoding and storage are performed on the encoding method, and the dynamic management module 12 will pseudo-randomly rotate the erasure code encoding method of the data file, so that the attacker cannot determine the state of the system at a certain moment, and realizes the dynamic characteristics of mimic defense;
  • the same data file uses different erasure code encoding methods in the encoding process to realize the heterogeneous characteristics of mimic defense; data files are encoded by different erasure code encoding methods into multiple copies for storage, which realizes mimic defense
  • the redundancy feature That is, the storage system that integrates mimic defense features into the industrial control system is realized, has the ability of active defense, and improves the security of the system.
  • the heterogeneous function module 11 includes a plurality of mimic and heterogeneous executive bodies, which are functional bodies that have the same function and run in parallel.
  • the heterogeneity of the mimic storage system 100 Use a variety of different erasure code encoding methods to achieve, embed a variety of different erasure codes in the system, such as BRS, CRS, MBR, MSR, etc., to achieve the heterogeneous characteristics of mimic defense, and the data file is Different erasure code encoding methods are encoded as multiple copies for storage, which realizes the redundancy feature of mimic defense.
  • the dynamic management module 12 is responsible for the dynamic management configuration of the mimic storage system 100, including the use of pseudo-random to rotate the erasure code encoding method, etc., so that the attacker cannot determine the accurate state of the system, and realizes the dynamic characteristics of mimic defense.
  • the dynamic heterogeneous module 10 further includes a redundant voter module 13 that is communicatively connected with the heterogeneous function module 11. It can be understood that the redundancy voter module 13 is responsible for judging the output. When the system is attacked and the decoding output results of different erasure codes are inconsistent, it can judge the correct output result, which further improves the safety and reliability of the system.
  • the object storage module 20 includes an interface server module 21, an object storage device module 22, and a metadata server module 23; the interface server (Interface Server, IS) module 21 is used for The data file is coded with erasure codes according to the coding method to form n (n is an integer) data blocks; the Object Storage Device (OSD) module 22 is in communication with the interface server module 21, so The object storage device module 22 is used to store the data block.
  • n data blocks are stored in different object storage device modules 22.
  • the object storage device module 22 is responsible for storing the data block in the persistent storage hardware and using the content. Addressing allows each data block to be identified by its unique content identifier.
  • the interface server module 21 is also used to separate the file metadata in the data file
  • the metadata server (Metadata Server, MDS) module 23 is used to maintain the file metadata, specifically, the metadata server module 23 At the same time, it has the functions of file name space management and object relational mapping management, which are used to maintain the metadata of data files, including file name, file size, and data block identifier.
  • the interface server module 21 is used to divide the data file into k (k is an integer, k ⁇ n) parts, and encode the data file of each part according to the different encoding methods. Generate n data blocks, that is, (k, n) erasure codes, and any k'(k' ⁇ k) data blocks can be used to restore the original data file. Since the parameters of each encoding method are different, the data blocks obtained from the same part of the data file are different in size and quantity. Therefore, the more encoding methods, the lower the probability of successful attack.
  • the mimic storage system 100 uses erasure codes as a fault-tolerant redundancy technology.
  • the object storage module 20 further includes a load balancing module 24 communicatively connected with the interface server module 10, and the load balancing module 24 is used to forward a large number of concurrent file operations of the client 101 to the interface server Module 21, thus avoiding a single point of failure, greatly improving the concurrent access performance of the system.
  • the object storage module 20 also includes a message queue (MQ) module 25, and the message queue module 25 is communicatively connected between the interface server module 21 and the object storage device module 22.
  • the message queue module 25 is used to implement the service function between the interface server module 21 and the object storage device module 23. It can be understood that the message queue module is an application-to-application communication method.
  • the service function described by the message queue module 25 includes a heartbeat service module 251 and a location service module 252.
  • the message queue module 25 can select RabbitMQ (a communication method) for communication.
  • the object storage device module 22 needs to notify all interface server modules 21 of its existence through the message queue module 25. This information is heartbeat information, and all ISs are starting In the future, a message queue will be created to bind the heartbeat service, and any message sent to this service will be forwarded to all message queues bound to it, that is, every IS will receive heartbeat messages from any OSD.
  • the interface server module 21 needs to create a location service in advance. All IS nodes bind to this service and receive messages from the interface server module 21.
  • the OSD that owns the object uses a single message to notify the interface server Node of module 21.
  • the mimic storage system 100 also provides a REST-based interface (such as the Amazon S3 interface) to allow applications to perform operations including creation, reading, updating, and deletion.
  • a REST-based interface such as the Amazon S3 interface
  • the interfaces and functions provided by the system are as shown in 1:
  • the client 101 when the client 101 uploads a data file: first, the client 101 sends a file upload request to the IS, and provides the file name and content; then, the IS receives the request Then, use erasure codes to encode to obtain n data blocks; secondly, randomly select n OSDs, store the data blocks in them, and store the metadata of the files in the MDS; finally, if the data blocks and metadata If the upload is successful, IS returns the success identifier to the client.
  • the client 101 When the client 101 downloads a data file: first, the client 101 initiates a download request with a file name to the IS; then, after receiving the request from the client 101, the IS queries the MDS for the corresponding data block through the file name Identifier, while sending a location message to the location exchange service to obtain the location of the OSD; secondly, IS requests the OSD to download the data block, and restores the data file through the erasure code decoding stage. Finally, the IS returns the data file to the client 101.
  • the mimic storage system 100 for industrial control system data security establishes a dynamic heterogeneous redundant system structure, and realizes the transformation of the storage system of the nuclear power plant industrial control system from similarity and static to heterogeneous and dynamic. , Forming an endogenous security effect that effectively resists unknown threats such as vulnerabilities, backdoors, etc., so that the industrial control system of nuclear power plants has the endogenous security capability of generalized robust control without relying on attack prior knowledge or behavior characteristics.
  • the heterogeneity of the system is realized by a variety of erasure correction coding methods. Because the coding methods and parameters of different erasure correction codes are different, the coding blocks obtained from the same data block are different in size and quantity, so the coding method is different.
  • the mimic storage system 100 can not only be used to improve the storage security of the industrial control system of nuclear power plants, but at the same time, any distributed storage application scenario can use the present invention to improve the defense capabilities of the system, and improve the security of the storage system and the reliability of data. sex.
  • the present invention also provides a mimic storage method for industrial control system data security, including the following steps:
  • Step S10 construct multiple erasure coding encoding methods for the data files of the industrial control system
  • Step S20 Perform pseudo-random rotation on the encoding method
  • Step S30 Encode and store the data file with erasure code according to the encoding method.
  • step S30 also includes the following sub-steps:
  • Step S301 Encode the data file with erasure codes according to the encoding method to form n (n is an integer) data blocks, and separate the file metadata in the data file;
  • Step S302 Store the data block
  • Step S303 Maintain the file metadata.
  • step S301 also includes the following sub-steps:
  • Each part of the data file is encoded according to the different encoding methods to generate n data blocks.
  • the mimic storage system 100 and method for industrial control system data security introduces the concept of mimic defense, mimics the storage system of the industrial control system of nuclear power plants, builds a mimic storage system, and realizes mimic defense
  • the characteristics of dynamic, heterogeneous, and redundancy have changed the defense mode of the industrial control system of nuclear power plants from the traditional passive defense mode to the active defense mode, which greatly improves the security of the system.
  • the object storage module of the system is constructed, which manages data as objects and separates the file metadata in the data. At the same time, it provides external object storage services, allowing applications to create, read, update, and delete operations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Probability & Statistics with Applications (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种工控系统数据安全的拟态存储系统(100),包括通讯连接的动态异构模块(10)及对象存储模块(20);所述动态异构模块(10)包括通讯连接的异构功能模块(11)及动态管理模块(12),所述异构功能模块(11)用于为工控系统的数据文件构建多种纠删码的编码方式,所述动态管理模块(12)用于对所述编码方式进行伪随机轮换,所述对象存储模块(20)用于将所述数据文件按照所述编码方式进行纠删码编码并存储。还提供一种工控系统数据安全的拟态存储方法,所述拟态存储系统(100)及方法实现了将拟态防御特性融入工控系统的存储系统,具有主动防御能力,提高了系统的安全性。

Description

工控系统数据安全的拟态存储系统及方法 【技术领域】
本发明涉及工控系统技术领域,尤其涉及一种工控系统数据安全的拟态存储系统及方法。
【背景技术】
目前,随着工业互联网的发展,工业控制系统(简称工控系统)也在持续演化。核电站工业控制系统的存储系统节点,作为核电站工业控制系统的信息存储基础设备,其安全性和可靠性对于整个系统而言至关重要。存储系统目前面临着严峻的网络安全形势,针对不断出现的攻击手段,研究相应的网络安全防御技术显得越来越重要。
传统防御技术主要包括防火墙、认证技术、访问控制、病毒防范、入侵检测、漏洞扫描、信息加密技术和灾备恢复等。传统防御技术有一些固有的缺陷。其缺陷主要为:防御能力是被动且是静态的,其防御能力依赖于在接入系统之前的系统配置,只能防御系统配置中涉及的网络安全攻击。然而,网络安全防御应该是一个动态变化的过程,新的安全漏洞不断出现,黑客的攻击手法不断翻新,传统防御技术难以检测、识别和处理新产生的网络攻击手段,只能被动的接受来自网络的每一次入侵攻击,不能从根本上解决网络安全问题,因此,传统安全防御技术难以解决工控系统安全问题。
分布式文件系统(Distributed File System,DFS)是指文件系统管理的物理存储资源不一定直接连接在本地节点上,而是通过计算机网络与节点(可简单的 理解为一台计算机)相连。分布式文件系统的设计基于客户机/服务器模式,一个典型的网络可能包括多个供多用户访问的服务器。分布式文件系统是建立在客户机/服务器技术基础之上的,一个或多个文件服务器与客户机文件系统协同操作,这样客户机就能够访问由服务器管理的文件了。由于控制功能分散于客户机和服务器之间,一些在集中式系统中的文件系统很容易处理的事情在分布式文件系统中变得相当复杂,比如共享、数据安全性、透明性等,相应需要发展一些重要技术,诸如远程过程调用、大容量缓存、进程存根(stub)、线程(thread)和虚拟文件系统(VFS)等等。在“已知风险”的前提下,这些技术要求一定数量的清晰可靠的先验知识的支持,例如来源,特征和攻击的行为,因此,DFS现有的安全机制由于它们的被动性和滞后性,几乎无法应对未知风险。
拟态分布式文件系统(MDFS),以文件交互接口划定拟态界,对整个存储系统进行了异构和冗余化,通过比较多个系统对访问请求的数据文件响应,实现威胁感知和数据结果的修正。这种架构设计以标准协议接口作为拟态化对象,能够屏蔽各个异构系统的实现细节,构成拟态化的分布式文件系统,而对外呈现标准文件交互接口,MDFS实现了动态性,异构性和冗余。然而,MDFS没有解决数据可靠性带来的安全性问题,MDFS仅仅解决了存储系统的主动防御问题,但对于节点可能发生的数据丢失的情况,没有相应的机制保证系统能还原原始数据。系统的数据可靠性由组成MDFS的每个异构文件系统本身的机制来保证,由于不同文件系统的数据可靠性不同,不能保证所有节点的数据可靠性,因此,整个系统的数据可靠性无法得到保证。另外,由于MDFS在整个系统的层面上进行了异构化,组成MDFS的不同存储系统性能不同,扩大了系统的响应时间,相比单一结构的存储系统带来了性能损失,同时,多副本冗余机 制导致系统的存储成本过高。
鉴于此,实有必要提供一种新型的工控系统数据安全的拟态存储系统及方法以克服上述缺陷。
【发明内容】
本发明的目的是提供一种工控系统数据安全的拟态存储系统及方法,实现了将拟态防御特性融入工控系统的存储系统,具有主动防御能力,提高了系统的安全性。
为了实现上述目的,第一方面,本发明提供一种工控系统数据安全的拟态存储系统,包括通讯连接的动态异构模块及对象存储模块;所述动态异构模块包括通讯连接的异构功能模块及动态管理模块,所述异构功能模块用于为工控系统的数据文件构建多种纠删码的编码方式,所述动态管理模块用于对所述编码方式进行伪随机轮换,所述对象存储模块用于将所述数据文件按照所述编码方式进行纠删码编码并存储。
在一个优选实施方式中,所述对象存储模块包括接口服务器模块、对象存储设备模块及元数据服务器模块;所述接口服务器模块用于对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块;所述对象存储设备模块与所述接口服务器模块通讯连接,所述对象存储设备模块用于存储所述数据块;所述接口服务器模块还用于分离所述数据文件中的文件元数据,所述元数据服务器模块用于维护所述文件元数据。
在一个优选实施方式中,所述对象存储模块还包括与所述接口服务器模块通讯连接的负载均衡模块,所述负载均衡模块用于将客户端的文件操作转发至所述接口服务器模块。
在一个优选实施方式中,所述对象存储模块还包括消息队列模块,所述消息队列模块通讯连接于所述接口服务器模块与所述对象存储设备模块之间,所述所述消息队列模块用于实现所述接口服务器模块与所述对象存储设备模块之间的服务功能。
在一个优选实施方式中,所述服务功能包括心跳服务模块及位置服务模块。
在一个优选实施方式中,所述接口服务器模块用于将所述数据文件分割为k(k为整数,k<n)部分,并对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块。
在一个优选实施方式中,所述动态异构模块还包括与所述异构功能模块通讯连接的多余度表决器模块。
第二方面,本发明还提供一种工控系统数据安全的拟态存储方法,包括如下步骤:为工控系统的数据文件构建多种纠删码的编码方式;对所述编码方式进行伪随机轮换;将所述数据文件按照所述编码方式进行纠删码编码并存储。
在一个优选实施方式中,所述将所述数据文件按照所述编码方式进行纠删码编码并存储的步骤,还包括如下步骤:对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块,并分离所述数据文件中的文件元数据;存储所述数据块;维护所述文件元数据。
在一个优选实施方式中,所述对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块的步骤,还包括如下步骤:将所述数据文件分割为k(k为整数,k<n)部分;对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块。
相比于现有技术,本发明提供的工控系统数据安全的拟态存储系统及方法, 异构功能模块能够为工控系统的数据文件构建多种纠删码的编码方式,对象存储模块用于将所述数据文件按照所述编码方式进行纠删码编码并存储,动态管理模块会对数据文件的纠删码编码方式进行伪随机轮换,使攻击者无法确定某一时刻系统的状态,实现了拟态防御的动态性特征;同一份数据文件在编码过程中会采用不同的纠删码编码方式,实现了拟态防御的异构性特征;数据文件被不同的纠删码编码方式编码为多个副本进行存储,实现了拟态防御的冗余性特征。即实现了将拟态防御特性融入工控系统的存储系统,具有主动防御能力,提高了系统的安全性。
为使发明的上述目的、特征和优点能更明显易懂,下文特举本发明较佳实施例,并配合所附附图,作详细说明如下。
【附图说明】
为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。
图1为本发明提供的工控系统数据安全的拟态存储系统的原理框图;
图2为本发明提供的工控系统数据安全的拟态存储系统的对象存储模块的原理框图;
图3为本发明提供的工控系统数据安全的拟态存储方法的流程图;
图4为本发明提供的工控系统数据安全的拟态存储方法的步骤S30的子步骤流程图。
【具体实施方式】
下面将结合本发明实施例中附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本发明实施例的组件可以以各种不同的配置来布置和设计。因此,以下对在附图中提供的本发明的实施例的详细描述并非旨在限制要求保护的本发明的范围,而是仅仅表示本发明的选定实施例。基于本发明的实施例,本领域技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。
请参阅图1,本发明提供一种工控系统数据安全的拟态存储系统100,包括通讯连接的动态异构模块10及对象存储模块20。
所述动态异构模块10包括通讯连接的异构功能模块11及动态管理模块12,所述异构功能模块11用于为工控系统的数据文件构建多种纠删码的编码方式,所述动态管理模块12用于对所述编码方式进行伪随机轮换,所述对象存储模块20用于将所述数据文件按照所述编码方式进行纠删码编码并存储。
本发明提供的工控系统数据安全的拟态存储系统100,异构功能模块11能够为工控系统的数据文件构建多种纠删码的编码方式,对象存储模块20用于将所述数据文件按照所述编码方式进行纠删码编码并存储,动态管理模块12会对数据文件的纠删码编码方式进行伪随机轮换,使攻击者无法确定某一时刻系统的状态,实现了拟态防御的动态性特征;同一份数据文件在编码过程中会采用不同的纠删码编码方式,实现了拟态防御的异构性特征;数据文件被不同的纠删码编码方式编码为多个副本进行存储,实现了拟态防御的冗余性特征。即实现了将拟态防御特性融入工控系统的存储系统,具有主动防御能力,提高了系统的安全性。
具体的,异构功能模块11包括多个拟态异构执行体,异构执行体是具有相同功能、且并行运行的功能体,本实施方式中,拟态存储系统100的异构性通过对数据文件使用多种不同的纠删码编码方式实现,在系统中嵌入了多种不同的纠删码,例如BRS、CRS、MBR、MSR等,实现了拟态防御的异构性特征,并且,数据文件被不同的纠删码编码方式编码为多个副本进行存储,实现了拟态防御的冗余性特征。
动态管理模块12负责拟态存储系统100的动态管理配置,包括使用伪随机方式轮换纠删码的编码方式等,使攻击者无法判定系统内部的准确状态,实现了拟态防御的动态性特征。
本实施方式中,所述动态异构模块10还包括与所述异构功能模块11通讯连接的多余度表决器模块13。可以理解,多余度表决器模块13负责判定输出,当系统受到攻击,导致不同纠删码解码输出结果不一致时,裁定正确的输出结果,进一步提高了系统的安全性及可靠性。
进一步地,请一并参阅图2,所述对象存储模块20包括接口服务器模块21、对象存储设备模块22及元数据服务器模块23;所述接口服务器(Interface Server,IS)模块21用于对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块;所述对象存储设备(Object Storage Device,OSD)模块22与所述接口服务器模块21通讯连接,所述对象存储设备模块22用于存储所述数据块,n个数据块分别存储到不同的对象存储设备模块22中,对象存储设备模块22负责将数据块保存在持久性存储硬件中,并使用内容寻址使得每个数据块都通过其唯一内容标识符来标识。所述接口服务器模块21还用于分离所述数据文件中的文件元数据,所述元数据服务器(Metadata Server,MDS)模块23 用于维护所述文件元数据,具体的,元数据服务器模块23同时拥有文件名称空间管理以及对象关系映射管理的功能,用于维护数据文件的元数据,包括文件名、文件大小以及数据块标识符等。
本实施方式中,所述接口服务器模块21用于将所述数据文件分割为k(k为整数,k<n)部分,并对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块,也即(k,n)纠删码,可以使用任何k’(k’≥k)个数据块来恢复原始数据文件。由于每种编码方式参数不同,因此,由相同部分的数据文件得到的数据块在大小和数量上是不同的,因此,编码方式越多,攻击成功的概率越小。拟态存储系统100将纠删码用作容错冗余技术,相比单纯的多副本冗余方式,消耗更少存储空间,可以大大减少存储成本,容错能力强,并且,系统对数据文件进行纠删码编码,由于纠删码的特性,即使部分数据丢失,系统仍然能正确还原原始数据。
具体的,所述对象存储模块20还包括与所述接口服务器模块10通讯连接的负载均衡模块24,所述负载均衡模块24用于将客户端101的大量并发的文件操作转发至所述接口服务器模块21,从而避免了单点故障,大大提高了系统并发访问性能。
进一步地,所述对象存储模块20还包括消息队列(Message Queue,MQ)模块25,所述消息队列模块25通讯连接于所述接口服务器模块21与所述对象存储设备模块22之间,所述所述消息队列模块25用于实现所述接口服务器模块21与所述对象存储设备模块23之间的服务功能。可以理解,消息队列模块即一种应用程序对应用程序的通信方法。
具体的,消息队列模块25所述服务功能包括心跳服务模块251及位置服务 模块252。消息队列模块25可以选择RabbitMQ(一种通信方式)进行通信,对象存储设备模块22需要通过消息队列模块25来向所有接口服务器模块21通知自身的存在,这些信息为心跳信息,所有的IS在启动以后都会创建一个消息队列来绑定心跳服务,任何发往这个服务的消息都会被转发给绑定它的所有消息队列,也就是每一个IS都会收到任意一台OSD的心跳消息。为了获取指定数据块的位置信息,接口服务器模块21需要预先创建定位服务,所有IS节点绑定这个服务并接收来自接口服务器模块21的消息,拥有该对象的OSD则使用消息单发通知该接口服务器模块21的节点。
进一步地,拟态存储系统100还提供了基于REST的接口(如Amazon S3接口),以允许应用程序进行包括创建、读取、更新和删除的操作,系统提供的接口及功能如1所示:
表1:
Figure PCTCN2020134488-appb-000001
本发明提供的工控系统数据安全的拟态存储系统100,当客户端101进行数据文件上传时:首先,客户端101将上传文件的请求发送到IS,并提供文件名和内容;然后,IS收到请求后,使用纠删码进行编码以获得n个数据块;其次, 随机选择n个OSD,并将数据块存储到其中,同时将文件的元数据存储到MDS中;最后,如果数据块和元数据上传成功,IS将成功标识符返回给客户端。当客户端101进行数据文件下载时:首先,客户端101发起一个带有文件名的下载请求到IS;然后,IS收到客户端101的请求后,通过文件名向MDS查询对应的数据块的标识符,同时向位置交换服务发送位置消息以获取OSD的位置;其次,IS请求OSD下载数据块,通过纠删码的解码阶段还原数据文件。最后,IS将数据文件返回给客户端101。
因此,本发明提供的工控系统数据安全的拟态存储系统100,建立了动态异构冗余的系统构造,实现了核电站工业控制系统的存储系统从相似性、静态性向异构性、动态性的转变,形成了有效抵御漏洞后门等未知威胁的内生安全效应,从而在不依赖攻击先验知识或行为特征的前提下,使核电站工业控制系统具备了广义鲁棒控制的内生安全能力。以多种纠删码编码方式实现系统的异构性,由于不同纠删码的编码方式及参数不同,因此由相同的数据块得到的编码块在大小和数量上是不同的,所以编码方式越多,攻击成功的概率越小。可以理解,拟态存储系统100不仅能用于提高核电站工业控制系统的存储安全性,同时,任何分布式存储的应用场景,都能利用本发明提高系统的防御能力,提升存储系统安全性及数据可靠性。
请一并参阅图3,本发明还提供一种工控系统数据安全的拟态存储方法,包括如下步骤:
步骤S10:为工控系统的数据文件构建多种纠删码的编码方式;
步骤S20:对所述编码方式进行伪随机轮换;
步骤S30:将所述数据文件按照所述编码方式进行纠删码编码并存储。
进一步地,请一并参阅图4,步骤S30还包括如下子步骤:
步骤S301:对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块,并分离所述数据文件中的文件元数据;
步骤S302:存储所述数据块;
步骤S303:维护所述文件元数据。
进一步地,步骤S301还包括如下子步骤:
将所述数据文件分割为k(k为整数,k<n)部分;
对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块。
需要说明的是,本发明提供的工控系统数据安全的拟态存储系统100的所有实施例均适用于本发明提供工控系统数据安全的拟态存储方法,且均能够达到相同或相似的有益效果。
综上,本发明提供的工控系统数据安全的拟态存储系统100及方法,引入了拟态防御的概念,将核电站工业控制系统的存储系统进行了拟态化改造,构建了拟态存储系统,实现了拟态防御动态、异构、冗余的特性,使核电站工业控制系统防御方式由传统的被动防御方式转变为主动防御,极大提高了系统的安全性。引入多种纠删码作为异构执行体,纠删码的存储利用率高,容错能力强,由于相同的数据块得到的编码块在大小和数量上是不同的,所以编码方式越多,攻击成功的概率越小。构建了系统的对象存储模块,将数据作为对象进行管理并分离数据中的文件元数据,同时对外提供对象存储服务,允许应用程序进行创建,读取,更新和删除等操作。
以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是 利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (10)

  1. 一种工控系统数据安全的拟态存储系统,其特征在于,包括通讯连接的动态异构模块及对象存储模块;所述动态异构模块包括通讯连接的异构功能模块及动态管理模块,所述异构功能模块用于为工控系统的数据文件构建多种纠删码的编码方式,所述动态管理模块用于对所述编码方式进行伪随机轮换,所述对象存储模块用于将所述数据文件按照所述编码方式进行纠删码编码并存储。
  2. 如权利要求1所述的工控系统数据安全的拟态存储系统,其特征在于,所述对象存储模块包括接口服务器模块、对象存储设备模块及元数据服务器模块;所述接口服务器模块用于对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块;所述对象存储设备模块与所述接口服务器模块通讯连接,所述对象存储设备模块用于存储所述数据块;所述接口服务器模块还用于分离所述数据文件中的文件元数据,所述元数据服务器模块用于维护所述文件元数据。
  3. 如权利要求2所述的工控系统数据安全的拟态存储系统,其特征在于,所述对象存储模块还包括与所述接口服务器模块通讯连接的负载均衡模块,所述负载均衡模块用于将客户端的文件操作转发至所述接口服务器模块。
  4. 如权利要求2所述的工控系统数据安全的拟态存储系统,其特征在于,所述对象存储模块还包括消息队列模块,所述消息队列模块通讯连接于所述接口服务器模块与所述对象存储设备模块之间,所述所述消息队列模块用于实现所述接口服务器模块与所述对象存储设备模块之间的服务功能。
  5. 如权利要求4所述的工控系统数据安全的拟态存储系统,其特征在于,所述服务功能包括心跳服务模块及位置服务模块。
  6. 如权利要求2所述的工控系统数据安全的拟态存储系统,其特征在于,所述接口服务器模块用于将所述数据文件分割为k(k为整数,k<n)部分,并对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块。
  7. 如权利要求1所述的工控系统数据安全的拟态存储系统,其特征在于,所述动态异构模块还包括与所述异构功能模块通讯连接的多余度表决器模块。
  8. 一种工控系统数据安全的拟态存储方法,其特征在于,包括如下步骤:
    为工控系统的数据文件构建多种纠删码的编码方式;
    对所述编码方式进行伪随机轮换;
    将所述数据文件按照所述编码方式进行纠删码编码并存储。
  9. 如权利要求8所述的工控系统数据安全的拟态存储方法,其特征在于,所述将所述数据文件按照所述编码方式进行纠删码编码并存储的步骤,还包括如下步骤:
    对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块,并分离所述数据文件中的文件元数据;
    存储所述数据块;
    维护所述文件元数据。
  10. 如权利要求9所述的工控系统数据安全的拟态存储方法,其特征在于,所述对所述数据文件按照所述编码方式进行纠删码编码,形成n(n为整数)个数据块的步骤,还包括如下步骤:
    将所述数据文件分割为k(k为整数,k<n)部分;
    对每个部分的数据文件按照不同的所述编码方式进行编码,生成n个数据块。
PCT/CN2020/134488 2020-09-24 2020-12-08 工控系统数据安全的拟态存储系统及方法 WO2021223431A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP20934446.4A EP4231168A1 (en) 2020-09-24 2020-12-08 Mimic storage system and method for data security of industrial control system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011014273.3 2020-09-24
CN202011014273.3A CN112162967A (zh) 2020-09-24 2020-09-24 工控系统数据安全的拟态存储系统及方法

Publications (1)

Publication Number Publication Date
WO2021223431A1 true WO2021223431A1 (zh) 2021-11-11

Family

ID=73864413

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/134488 WO2021223431A1 (zh) 2020-09-24 2020-12-08 工控系统数据安全的拟态存储系统及方法

Country Status (3)

Country Link
EP (1) EP4231168A1 (zh)
CN (1) CN112162967A (zh)
WO (1) WO2021223431A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941559A (zh) * 2023-03-14 2023-04-07 之江实验室 一种基于fpga动态管理拟态执行体的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170228282A1 (en) * 2016-02-04 2017-08-10 International Business Machines Corporation Distributed cache system utilizing multiple erasure codes
CN108614749A (zh) * 2018-04-23 2018-10-02 北京搜狐新媒体信息技术有限公司 一种数据处理方法及装置
CN109271360A (zh) * 2018-08-03 2019-01-25 北京城市网邻信息技术有限公司 分布式对象存储数据冗余方法、装置、设备及存储介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9595979B2 (en) * 2015-01-20 2017-03-14 International Business Machines Corporation Multiple erasure codes for distributed storage
CN111031096B (zh) * 2019-11-15 2022-05-31 华东计算技术研究所(中国电子科技集团公司第三十二研究所) 一种基于拟态防御的分布式存储系统构建方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170228282A1 (en) * 2016-02-04 2017-08-10 International Business Machines Corporation Distributed cache system utilizing multiple erasure codes
CN108614749A (zh) * 2018-04-23 2018-10-02 北京搜狐新媒体信息技术有限公司 一种数据处理方法及装置
CN109271360A (zh) * 2018-08-03 2019-01-25 北京城市网邻信息技术有限公司 分布式对象存储数据冗余方法、装置、设备及存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FENG, XINRUI: "Research on Mimic Enhancement Design for Distributed Storage System", CHINA MASTER’S THESES FULL-TEXT DATABASE, no. 2, 15 February 2020 (2020-02-15), pages 1 - 58, XP009531550, ISSN: 1674-0246 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941559A (zh) * 2023-03-14 2023-04-07 之江实验室 一种基于fpga动态管理拟态执行体的方法及装置

Also Published As

Publication number Publication date
EP4231168A1 (en) 2023-08-23
CN112162967A (zh) 2021-01-01

Similar Documents

Publication Publication Date Title
US11841736B2 (en) Immutable logging of access requests to distributed file systems
US11461485B2 (en) Immutable bootloader and firmware validator
US10366247B2 (en) Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data
US11934550B2 (en) Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data
US10114970B2 (en) Immutable logging of access requests to distributed file systems
EP3485421B1 (en) Fragmenting data for the purposes of persistent storage across multiple immutable data structures
US10075298B2 (en) Generation of hash values within a blockchain
US10121019B2 (en) Storing differentials of files in a distributed blockchain
US8578374B2 (en) System and method for managing virtual machines
US11502828B2 (en) Authenticating chaincode to chaincode invocations of a blockchain
KR102152360B1 (ko) IoT 서비스를 위한 블록체인 기반 데이터 신뢰성 제공 시스템 및 방법
US20200004442A1 (en) Method, apparatus, and system for controlling user access to a data storage system
JP2006268846A (ja) ネットワーキング環境における効率的なデータバックアップのシステムおよび方法
US9275238B2 (en) Method and apparatus for data security reading
US20230052935A1 (en) Asynchronous accounting method and apparatus for blockchain, medium and electronic device
CN104503863A (zh) 用于虚拟容器系统容灾的内核态与用户态数据交换方法
WO2023016414A1 (zh) 凭据的轮转方法、计算设备及存储介质
TWI604320B (zh) 巨量資料存取方法以及使用該方法的系統
WO2021223431A1 (zh) 工控系统数据安全的拟态存储系统及方法
US10678754B1 (en) Per-tenant deduplication for shared storage
Chen et al. [Retracted] A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques
US20220385596A1 (en) Protecting integration between resources of different services using service-generated dependency tags
Yu et al. On distributed object storage architecture based on mimic defense
US20220150241A1 (en) Permissions for backup-related operations
US20200401561A1 (en) Method, device, and computer program product for managing data object

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20934446

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020934446

Country of ref document: EP

Effective date: 20230424