[go: up one dir, main page]

CN107301018A - A kind of WORM technology application processes on cluster-based storage - Google Patents

A kind of WORM technology application processes on cluster-based storage Download PDF

Info

Publication number
CN107301018A
CN107301018A CN201710452206.1A CN201710452206A CN107301018A CN 107301018 A CN107301018 A CN 107301018A CN 201710452206 A CN201710452206 A CN 201710452206A CN 107301018 A CN107301018 A CN 107301018A
Authority
CN
China
Prior art keywords
worm
file
protection
read
cifs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710452206.1A
Other languages
Chinese (zh)
Inventor
陈贝贝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710452206.1A priority Critical patent/CN107301018A/en
Publication of CN107301018A publication Critical patent/CN107301018A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0634Configuration or reconfiguration of storage systems by changing the state or mode of one or more devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of WORM technology application processes on cluster-based storage, comprise the following steps:Step S1:Worm opening and closing are realized by changing the parameter in clustered node CIFS/NFS configuration files;Step S2:For share directory, WORM grace periods, WORM time-out times are set;Step S3:CIFS/NFS services are restarted under file system makes the grace period of setting and time-out time come into force;Step S4:Written document request is carried out in client, if this document is in WORM guard modes, mistake is returned to;Otherwise, interval of this operating distance last time to this document write operation time is calculated, and enters step S5;Step S5:If interval in step S4 is less than the WORM grace periods, file system is forwarded the request to, otherwise, file enters WORM guard modes, its attribute is set to read-only, and user's write operation is considered as going beyond one's commission, and mistake is returned to client.

Description

一种在集群存储上的WORM技术应用方法A WORM technology application method on cluster storage

技术领域technical field

本发明属于计算机领域,具体涉及一种在集群存储上的WORM技术应用方法。The invention belongs to the field of computers, and in particular relates to a WORM technology application method on cluster storage.

背景技术Background technique

随着时代的发展,集群存储系统的应用越来越广泛,集群存储是将多台存储设备中的存储空间聚合成一个能够给应用服务器提供统一访问接口和管理界面的存储池,应用可以通过该访问接口透明地访问和利用所有存储设备上的磁盘,可以充分发挥存储设备的性能和磁盘利用率。数据将会按照一定的规则从多台存储设备上存储和读取,以获得更高的并发访问性能,集群存储是主要面向文件级别的存储系统。因此,也常常被称为集群NAS,而在集群存储中基于标准协议的CIFS和NFS应用广泛。With the development of the times, cluster storage systems are more and more widely used. Cluster storage aggregates the storage space in multiple storage devices into a storage pool that can provide a unified access interface and management interface for application servers. Applications can use this The access interface transparently accesses and utilizes the disks on all storage devices, which can give full play to the performance and disk utilization of storage devices. Data will be stored and read from multiple storage devices according to certain rules to obtain higher concurrent access performance. Cluster storage is a file-level storage system. Therefore, it is often called cluster NAS, and CIFS and NFS based on standard protocols are widely used in cluster storage.

Worm (Write Once Read Many)技术是指将数据一次性写入存储介质,能够多次读出,但不允许修改或者删除,为重要的数据提供过了最安全的保证。提供纯粹真实数据管理并适用于文件信息必须100%不更改的应用领域。最初只有光盘符合条件,只读光盘具有天然的worm特性,随着应用的深入,特别近几年来法规遵从的要求,worm技术发展迅速,磁盘,磁带,MO,UDO等可读可写的存储介质也可以通过硬件和软件来控制实现worm。Worm (Write Once Read Many) technology means that data is written into the storage medium once, and can be read out multiple times, but modification or deletion is not allowed, providing the most secure guarantee for important data. Provides pure real data management and is suitable for applications where file information must be 100% unchanged. At first, only optical discs were eligible, and read-only optical discs have natural worm characteristics. With the deepening of applications, especially the requirements of regulatory compliance in recent years, worm technology has developed rapidly. Disks, tapes, MO, UDO and other readable and writable storage media The worm can also be controlled by hardware and software.

目前应用的worm技术包括光盘技术、磁带技术、磁盘技术三种技术,其中针对磁盘技术来说,随着磁盘容量的提高和成本的下降,在磁盘上实现了不可擦除,不可重写的磁盘worm存储也已经有很多应用。通过磁盘阵列柜管理软件,创建worm存储卷,数据一旦存入worm存储卷,在磁盘柜软件的控制之下,在规定的限期内,即使是文件的创建者或者系统管理员都不可以更改,删除甚至改名存档的数据,只有蓄意破坏磁盘才能导致数据的删除或者更改。数据存储使用RAID技术,提供了高性能和高可靠性。目前在磁盘实现worm主要有两种系统,一类是基于文件系统,另一类是内容存储系统。Currently applied worm technologies include optical disc technology, magnetic tape technology, and magnetic disk technology. For magnetic disk technology, with the improvement of disk capacity and the reduction of cost, non-erasable and non-rewritable disks have been realized on disks. Worm storage has also been used in many applications. The worm storage volume is created through the disk array cabinet management software. Once the data is stored in the worm storage volume, under the control of the disk cabinet software, even the creator of the file or the system administrator cannot change it within the specified time limit. Deleting or even renaming archived data, only deliberate destruction of the disk can result in data deletion or alteration. Data storage uses RAID technology, which provides high performance and high reliability. At present, there are two main systems for implementing worms on the disk, one is based on the file system, and the other is the content storage system.

对于信息技术的快速发展,大量的数据文件源源不断的产生,人们对数据文件的安全需求大幅度提高,在很多应用领域对于产生的文件必须是不能修改的,并且要长期保存,现有技术中并未针对集群存储进行Worm设计;无法实现集群存储的Worm设计,限制集群存储的应用空间。此为现有技术的不足之处。With the rapid development of information technology, a large number of data files are continuously produced, and people's security requirements for data files have been greatly increased. In many application fields, the generated files must not be modified and must be stored for a long time. In the prior art The Worm design for cluster storage is not implemented; the Worm design for cluster storage cannot be realized, which limits the application space of cluster storage. This is the weak point of prior art.

因此,针对现有技术中的上述缺陷,提供设计一种在集群存储上的WORM技术应用方法;以解决上述技术问题,是非常有必要的。Therefore, aiming at the above-mentioned defects in the prior art, it is very necessary to provide and design a WORM technology application method on cluster storage to solve the above-mentioned technical problems.

发明内容Contents of the invention

本发明的目的在于,针对上述现有技术存在的缺陷,提供设计一种在集群存储上的WORM技术应用方法,以解决上述技术问题。The object of the present invention is to provide and design a WORM technology application method on cluster storage to solve the above-mentioned technical problems in view of the above-mentioned defects in the prior art.

为实现上述目的,本发明给出以下技术方案:To achieve the above object, the present invention provides the following technical solutions:

一种在集群存储上的WORM技术应用方法,其特征在于,包括以下步骤:A method for applying WORM technology on cluster storage, comprising the following steps:

步骤S1:通过更改集群节点CIFS/NFS配置文件中的参数来实现worm的开启和关闭;Step S1: realize the opening and closing of the worm by changing the parameters in the CIFS/NFS configuration file of the cluster node;

步骤S2:针对共享目录设置WORM宽限期、WORM超时时间;Step S2: Set the WORM grace period and WORM timeout period for the shared directory;

步骤S3:在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;Step S3: Restart the CIFS/NFS service under the file system to make the set grace period and timeout period take effect;

步骤S4:在客户端进行写文件请求,接收客户端的写文件操作请求,识别其要操作的文件,若该文件已处于WORM保护状态,则返回错误;否则,计算本次操作距离上次对该文件写入操作时间的间隔,并进入步骤S5;Step S4: Make a file write request on the client, receive the file write operation request from the client, identify the file to be operated, and return an error if the file is already under WORM protection; otherwise, calculate the distance between this operation and the last time The interval of the file writing operation time, and enter step S5;

步骤S5:如果步骤S4中的间隔小于WORM宽限期,则将该请求转发至文件系统,若该间隔大于或等于宽限期,文件随即进入WORM保护状态,其属性被置为只读,用户写操作被视为越权,向客户端返回错误;Step S5: If the interval in step S4 is less than the WORM grace period, forward the request to the file system, if the interval is greater than or equal to the grace period, the file enters the WORM protection state immediately, its attribute is set to read-only, and the user writes It is regarded as exceeding authority and returns an error to the client;

步骤S6:手动设置提交保护,使文件直接进去保护期,去除文件写权限或设置为只读。Step S6: Manually set the submission protection, so that the file directly enters the protection period, and removes the file write permission or sets it as read-only.

作为优选,步骤S1中,通过在文件系统的CIFS/NFS共享配置文件中增加vfsobjects=worm字段来开启回收站功能;当没有该字段时,worm功能为关闭状态,关闭状态下,文件的权限为一般文件系统权限状态。Preferably, in step S1, the recycle bin function is opened by adding the vfsobjects=worm field in the CIFS/NFS shared configuration file of the file system; when there is no such field, the worm function is closed, and in the closed state, the file authority is General file system permission status.

作为优选,步骤S2中,当开启worm功能后在CIFS/NFS共享配置文件中添加宽限期和超时时间参数来设置共享目录的保护期(即文件只可读不可写)。Preferably, in step S2, after the worm function is enabled, a grace period and a timeout parameter are added to the CIFS/NFS shared configuration file to set the protection period of the shared directory (that is, the file can only be read but not written).

作为优选,步骤S3中,在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;WORM宽限期:从文件最后一次被写入算起,直到宽限期为止,如果再无对该文件的写操作,当文件再次被访问时该文件进入WORM保护状态,即被设置为只读状态;WORM超时时间:文件进入WORM保护状态后,任何用户只能读取其内容,而无权对其进行任何修改或删除操作,等到达超时时间后,WORM保护状态失效,文件只读状态失效,此时允许用户对文件进行修改、删除、读取各种文件操作。As preferably, in step S3, restart the CIFS/NFS service under the file system to make the grace period and the timeout period of the setting take effect; WORM grace period: from the last time the file is written, until the grace period, if there is no such For the write operation of the file, when the file is accessed again, the file enters the WORM protection state, that is, it is set to the read-only state; WORM timeout time: after the file enters the WORM protection state, any user can only read its content, and has no right to It performs any modification or deletion operation. After the timeout period is reached, the WORM protection status becomes invalid, and the file read-only status becomes invalid. At this time, the user is allowed to modify, delete, and read various file operations on the file.

作为优选,所述步骤S4中,当通过客户端向文件写入时,WORM目录下的文件,在设置的自动提交保护时间内没有进行写操作和修改WORM属性等操作,文件将自动进入保护状态。As a preference, in said step S4, when writing to the file through the client, the file under the WORM directory does not perform operations such as writing operations and modifying WORM attributes within the set automatic submission protection time, and the file will automatically enter the protected state .

本技术方案中,除了通过设置宽限期和超时时间文件系统自动提交保护外还可以通过手动提交保护:在linux客户端使用chmod -w filename,去除文件写权限、在Windows客户端:右键单击文件,勾选“只读”;文件会立刻进入保护状态,普通用户则不能够修改这些文件,“保护状态”的文件,可以使用超级管理员帐户进行特权删除。In this technical solution, in addition to automatically submitting the protection by setting the grace period and timeout time, the file system can also submit the protection manually: use chmod -w filename on the Linux client to remove the file write permission, and on the Windows client: right-click the file , check "Read-only"; the files will immediately enter the protected state, and ordinary users cannot modify these files. Files in the "protected state" can be deleted with privileges using the super administrator account.

本发明的有益效果在于,对于一般的文件系统来说,大量的数据文件产生之后,并不能在一定时间内不可修改,使文件进入保护期,超过保护期之后可以对文件进行删除、修改等操作,无法满足医院、银行的一段时间内文件不被修改的业务,集群存储添加worm功能后能够满足这一需求,并且提供了数据的安全性,扩大业务范围提高市场竞争力。The beneficial effect of the present invention is that, for a general file system, after a large number of data files are generated, they cannot be modified within a certain period of time, so that the files enter the protection period, and operations such as deletion and modification can be performed on the files after the protection period exceeds , It cannot meet the business of hospitals and banks that the files will not be modified for a period of time. After adding the worm function to the cluster storage, it can meet this demand, and provide data security, expand the business scope and improve market competitiveness.

由此可见,本发明与现有技术相比,具有突出的实质性特点和显著地进步,其实施的有益效果也是显而易见的。It can be seen that, compared with the prior art, the present invention has outstanding substantive features and remarkable progress, and the beneficial effects of its implementation are also obvious.

具体实施方式detailed description

下面通过具体实施例对本发明进行详细阐述,以下实施例是对本发明的解释,而本发明并不局限于以下实施方式。The present invention is described in detail below through specific examples, and the following examples are explanations of the present invention, but the present invention is not limited to the following embodiments.

本实施例给出的一种在集群存储上的WORM技术应用方法,其特征在于,包括以下步骤:A kind of WORM technology application method on the cluster storage that the present embodiment provides, is characterized in that, comprises the following steps:

步骤S1:通过更改集群节点CIFS/NFS配置文件中的参数来实现worm的开启和关闭;Step S1: realize the opening and closing of the worm by changing the parameters in the CIFS/NFS configuration file of the cluster node;

步骤S2:针对共享目录设置WORM宽限期、WORM超时时间;Step S2: Set the WORM grace period and WORM timeout period for the shared directory;

步骤S3:在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;Step S3: Restart the CIFS/NFS service under the file system to make the set grace period and timeout period take effect;

步骤S4:在客户端进行写文件请求,接收客户端的写文件操作请求,识别其要操作的文件,若该文件已处于WORM保护状态,则返回错误;否则,计算本次操作距离上次对该文件写入操作时间的间隔,并进入步骤S5;Step S4: Make a file write request on the client, receive the file write operation request from the client, identify the file to be operated, and return an error if the file is already under WORM protection; otherwise, calculate the distance between this operation and the last time The interval of the file writing operation time, and enter step S5;

步骤S5:如果步骤S4中的间隔小于WORM宽限期,则将该请求转发至文件系统,若该间隔大于或等于宽限期,文件随即进入WORM保护状态,其属性被置为只读,用户写操作被视为越权,向客户端返回错误;Step S5: If the interval in step S4 is less than the WORM grace period, forward the request to the file system, if the interval is greater than or equal to the grace period, the file enters the WORM protection state immediately, its attribute is set to read-only, and the user writes It is regarded as exceeding authority and returns an error to the client;

步骤S6:手动设置提交保护,使文件直接进去保护期,去除文件写权限或设置为只读。Step S6: Manually set the submission protection, so that the file directly enters the protection period, and removes the file write permission or sets it as read-only.

本实施例中,步骤S1中,通过在文件系统的CIFS/NFS共享配置文件中增加vfsobjects=worm字段来开启回收站功能;当没有该字段时,worm功能为关闭状态,关闭状态下,文件的权限为一般文件系统权限状态。In this embodiment, in step S1, the recycle bin function is enabled by adding the vfsobjects=worm field in the CIFS/NFS shared configuration file of the file system; when there is no such field, the worm function is closed, and in the closed state, the file Permissions are general file system permission status.

步骤S2中,当开启worm功能后在CIFS/NFS共享配置文件中添加宽限期和超时时间参数来设置共享目录的保护期(即文件只可读不可写)。In step S2, after enabling the worm function, add grace period and timeout parameters to the CIFS/NFS shared configuration file to set the protection period of the shared directory (that is, the file can only be read but not written).

步骤S3中,在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;WORM宽限期:从文件最后一次被写入算起,直到宽限期为止,如果再无对该文件的写操作,当文件再次被访问时该文件进入WORM保护状态,即被设置为只读状态;WORM超时时间:文件进入WORM保护状态后,任何用户只能读取其内容,而无权对其进行任何修改或删除操作,等到达超时时间后,WORM保护状态失效,文件只读状态失效,此时允许用户对文件进行修改、删除、读取各种文件操作。In step S3, restart the CIFS/NFS service under the file system to make the set grace period and timeout time effective; WORM grace period: count from the last time the file is written until the grace period, if there is no more writing to the file Operation, when the file is accessed again, the file enters the WORM protection state, that is, it is set to a read-only state; WORM timeout time: After the file enters the WORM protection state, any user can only read its content, and has no right to do anything to it For modification or deletion operations, after the timeout period is reached, the WORM protection status becomes invalid, and the read-only status of the file becomes invalid. At this time, the user is allowed to modify, delete, and read various file operations on the file.

所述步骤S4中,当通过客户端向文件写入时,WORM目录下的文件,在设置的自动提交保护时间内没有进行写操作和修改WORM属性等操作,文件将自动进入保护状态。In the step S4, when the client writes to the file, the file under the WORM directory will automatically enter the protected state if no write operation or modification of the WORM attribute is performed within the set automatic submission protection time.

以上公开的仅为本发明的优选实施方式,但本发明并非局限于此,任何本领域的技术人员能思之的没有创造性的变化,以及在不脱离本发明原理前提下所作的若干改进和润饰,都应落在本发明的保护范围内。The above disclosure is only a preferred embodiment of the present invention, but the present invention is not limited thereto, any non-creative changes that those skilled in the art can think of, and some improvements and modifications made without departing from the principle of the present invention , should fall within the protection scope of the present invention.

Claims (5)

1.一种在集群存储上的WORM技术应用方法,其特征在于,包括以下步骤:1. a WORM technology application method on cluster storage, is characterized in that, comprises the following steps: 步骤S1:通过更改集群节点CIFS/NFS配置文件中的参数来实现worm的开启和关闭;Step S1: realize the opening and closing of the worm by changing the parameters in the CIFS/NFS configuration file of the cluster node; 步骤S2:针对共享目录设置WORM宽限期、WORM超时时间;Step S2: Set the WORM grace period and WORM timeout period for the shared directory; 步骤S3:在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;Step S3: Restart the CIFS/NFS service under the file system to make the set grace period and timeout period take effect; 步骤S4:在客户端进行写文件请求,接收客户端的写文件操作请求,识别其要操作的文件,若该文件已处于WORM保护状态,则返回错误;否则,计算本次操作距离上次对该文件写入操作时间的间隔,并进入步骤S5;Step S4: Make a file write request on the client, receive the file write operation request from the client, identify the file to be operated, and return an error if the file is already under WORM protection; otherwise, calculate the distance between this operation and the last time The interval of the file writing operation time, and enter step S5; 步骤S5:如果步骤S4中的间隔小于WORM宽限期,则将该请求转发至文件系统,若该间隔大于或等于宽限期,文件随即进入WORM保护状态,其属性被置为只读,用户写操作被视为越权,向客户端返回错误;Step S5: If the interval in step S4 is less than the WORM grace period, forward the request to the file system, if the interval is greater than or equal to the grace period, the file enters the WORM protection state immediately, its attribute is set to read-only, and the user writes It is regarded as exceeding authority and returns an error to the client; 步骤S6:手动设置提交保护,使文件直接进去保护期,去除文件写权限或设置为只读。Step S6: Manually set the submission protection, so that the file directly enters the protection period, and removes the file write permission or sets it as read-only. 2.根据权利要求1所述的一种在集群存储上的WORM技术应用方法,其特征在于,步骤S1中,通过在文件系统的CIFS/NFS共享配置文件中增加vfs objects=worm字段来开启回收站功能;当没有该字段时,worm功能为关闭状态,关闭状态下,文件的权限为一般文件系统权限状态。2. A method for applying WORM technology on cluster storage according to claim 1, characterized in that, in step S1, recovery is enabled by adding the vfs objects=worm field in the CIFS/NFS shared configuration file of the file system Station function; when there is no such field, the worm function is closed, and in the closed state, the file permission is the general file system permission status. 3.根据权利要求1或2所述的一种在集群存储上的WORM技术应用方法,其特征在于,步骤S2中,当开启worm功能后在CIFS/NFS共享配置文件中添加宽限期和超时时间参数来设置共享目录的保护期。3. A method for applying WORM technology on cluster storage according to claim 1 or 2, characterized in that, in step S2, a grace period and a timeout period are added to the CIFS/NFS shared configuration file after the worm function is enabled parameter to set the protection period of the shared directory. 4.根据权利要求3所述的一种在集群存储上的WORM技术应用方法,其特征在于,步骤S3中,在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;WORM宽限期:从文件最后一次被写入算起,直到宽限期为止,如果再无对该文件的写操作,当文件再次被访问时该文件进入WORM保护状态,即被设置为只读状态;WORM超时时间:文件进入WORM保护状态后,任何用户只能读取其内容,而无权对其进行任何修改或删除操作,等到达超时时间后,WORM保护状态失效,文件只读状态失效,此时允许用户对文件进行修改、删除、读取各种文件操作。4. A kind of WORM technology application method on cluster storage according to claim 3, it is characterized in that, in step S3, restart CIFS/NFS service under file system and make the grace period of setting and overtime take effect; WORM wide Deadline: From the last time the file is written to the grace period, if there is no write operation on the file, when the file is accessed again, the file enters the WORM protection state, that is, it is set to the read-only state; WORM timeout Time: After the file enters the WORM protection state, any user can only read its content, but has no right to modify or delete it. After the timeout expires, the WORM protection state becomes invalid, and the file read-only state becomes invalid. Users modify, delete, and read various file operations on files. 5.根据权利要求4所述的一种在集群存储上的WORM技术应用方法,其特征在于,所述步骤S4中,当通过客户端向文件写入时,WORM目录下的文件,在设置的自动提交保护时间内没有进行写操作和修改WORM属性等操作,文件将自动进入保护状态。5. A kind of WORM technology application method on cluster storage according to claim 4, it is characterized in that, in described step S4, when writing to file by client, the file under WORM directory, in the setting If there is no write operation or modification of WORM attributes within the automatic commit protection time, the file will automatically enter the protected state.
CN201710452206.1A 2017-06-15 2017-06-15 A kind of WORM technology application processes on cluster-based storage Pending CN107301018A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710452206.1A CN107301018A (en) 2017-06-15 2017-06-15 A kind of WORM technology application processes on cluster-based storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710452206.1A CN107301018A (en) 2017-06-15 2017-06-15 A kind of WORM technology application processes on cluster-based storage

Publications (1)

Publication Number Publication Date
CN107301018A true CN107301018A (en) 2017-10-27

Family

ID=60135250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710452206.1A Pending CN107301018A (en) 2017-06-15 2017-06-15 A kind of WORM technology application processes on cluster-based storage

Country Status (1)

Country Link
CN (1) CN107301018A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101843A (en) * 2018-09-03 2018-12-28 郑州云海信息技术有限公司 A kind of filing secure storage method of data and device
CN109117667A (en) * 2018-07-27 2019-01-01 郑州云海信息技术有限公司 A kind of document protection method, system, equipment and computer readable storage medium
CN109492425A (en) * 2018-09-30 2019-03-19 南京中铁信息工程有限公司 A kind of worm technical application method on a distributed
CN110221768A (en) * 2018-03-01 2019-09-10 浙江宇视科技有限公司 Realize the method and system of storage resource WORM attribute
US20210211498A1 (en) * 2020-05-29 2021-07-08 Beijing Baidu Netcom Science And Technology Co., Ltd. File resource processing method and apparatus, device and medium
CN113407995A (en) * 2021-06-25 2021-09-17 济南浪潮数据技术有限公司 Method, system, equipment and medium for normal error reporting of overwriting and additional writing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097260A1 (en) * 2003-11-03 2005-05-05 Mcgovern William P. System and method for record retention date in a write once read many storage system
CN101286142A (en) * 2008-05-19 2008-10-15 华为技术有限公司 Disk operation protection method and disk controller
CN104461380A (en) * 2014-11-17 2015-03-25 华为技术有限公司 Data storage method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097260A1 (en) * 2003-11-03 2005-05-05 Mcgovern William P. System and method for record retention date in a write once read many storage system
CN101443760A (en) * 2003-11-03 2009-05-27 网络装置公司 System and method for recording retention dates in a write-once-read-many storage system
CN101286142A (en) * 2008-05-19 2008-10-15 华为技术有限公司 Disk operation protection method and disk controller
CN104461380A (en) * 2014-11-17 2015-03-25 华为技术有限公司 Data storage method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110221768A (en) * 2018-03-01 2019-09-10 浙江宇视科技有限公司 Realize the method and system of storage resource WORM attribute
CN109117667A (en) * 2018-07-27 2019-01-01 郑州云海信息技术有限公司 A kind of document protection method, system, equipment and computer readable storage medium
CN109101843A (en) * 2018-09-03 2018-12-28 郑州云海信息技术有限公司 A kind of filing secure storage method of data and device
CN109492425A (en) * 2018-09-30 2019-03-19 南京中铁信息工程有限公司 A kind of worm technical application method on a distributed
US20210211498A1 (en) * 2020-05-29 2021-07-08 Beijing Baidu Netcom Science And Technology Co., Ltd. File resource processing method and apparatus, device and medium
US11451628B2 (en) * 2020-05-29 2022-09-20 Beijing Baidu Netcom Science And Technology Co., Ltd. File resource processing method and apparatus, device and medium
CN113407995A (en) * 2021-06-25 2021-09-17 济南浪潮数据技术有限公司 Method, system, equipment and medium for normal error reporting of overwriting and additional writing

Similar Documents

Publication Publication Date Title
CN107301018A (en) A kind of WORM technology application processes on cluster-based storage
CN102317922B (en) System and method for providing write once read many (WORM) storage
US7146388B2 (en) Method, system, and program for archiving files
US9075851B2 (en) Method and apparatus for data retention in a storage system
US12450196B2 (en) Event based retention of read only files
TWI333614B (en) Method, system, and program for processing a file request
US9817582B2 (en) Offload read and write offload provider
US8516022B1 (en) Automatically committing files to be write-once-read-many in a file system
US9449007B1 (en) Controlling access to XAM metadata
US20060010301A1 (en) Method and apparatus for file guard and file shredding
US11249672B2 (en) Low-cost backup and edge caching using unused disk blocks
TW200408980A (en) System and method for managing file names for file system filter drivers
US20180089033A1 (en) Performing data backups using snapshots
US7308543B2 (en) Method and system for shredding data within a data storage subsystem
CN107092685A (en) A kind of method that file system and RDBMS store transaction data are used in combination
Nagle et al. The ANSI T10 object-based storage standard and current implementations
JP2005267599A (en) Data write protection in a mixed storage area network and network attached storage environment
CN101490678A (en) Management and storage of information and metadata
US11599423B1 (en) Managing backup copies in a right-to-delete personal data environment
US20060206484A1 (en) Method for preserving consistency between worm file attributes and information in management servers
CN116010355A (en) A file processing method and device
US20130297653A1 (en) Metadata storage management offloading for enterprise applications
CN117113380A (en) Embedded virtual file system design method based on domestic operating system
US9646012B1 (en) Caching temporary data in solid state storage devices
US11449468B1 (en) Enforcing minimum space guarantees in thinly-provisioned file systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171027

RJ01 Rejection of invention patent application after publication