CN107301018A - A kind of WORM technology application processes on cluster-based storage - Google Patents
A kind of WORM technology application processes on cluster-based storage Download PDFInfo
- Publication number
- CN107301018A CN107301018A CN201710452206.1A CN201710452206A CN107301018A CN 107301018 A CN107301018 A CN 107301018A CN 201710452206 A CN201710452206 A CN 201710452206A CN 107301018 A CN107301018 A CN 107301018A
- Authority
- CN
- China
- Prior art keywords
- worm
- file
- protection
- read
- cifs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0634—Configuration or reconfiguration of storage systems by changing the state or mode of one or more devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明属于计算机领域,具体涉及一种在集群存储上的WORM技术应用方法。The invention belongs to the field of computers, and in particular relates to a WORM technology application method on cluster storage.
背景技术Background technique
随着时代的发展,集群存储系统的应用越来越广泛,集群存储是将多台存储设备中的存储空间聚合成一个能够给应用服务器提供统一访问接口和管理界面的存储池,应用可以通过该访问接口透明地访问和利用所有存储设备上的磁盘,可以充分发挥存储设备的性能和磁盘利用率。数据将会按照一定的规则从多台存储设备上存储和读取,以获得更高的并发访问性能,集群存储是主要面向文件级别的存储系统。因此,也常常被称为集群NAS,而在集群存储中基于标准协议的CIFS和NFS应用广泛。With the development of the times, cluster storage systems are more and more widely used. Cluster storage aggregates the storage space in multiple storage devices into a storage pool that can provide a unified access interface and management interface for application servers. Applications can use this The access interface transparently accesses and utilizes the disks on all storage devices, which can give full play to the performance and disk utilization of storage devices. Data will be stored and read from multiple storage devices according to certain rules to obtain higher concurrent access performance. Cluster storage is a file-level storage system. Therefore, it is often called cluster NAS, and CIFS and NFS based on standard protocols are widely used in cluster storage.
Worm (Write Once Read Many)技术是指将数据一次性写入存储介质,能够多次读出,但不允许修改或者删除,为重要的数据提供过了最安全的保证。提供纯粹真实数据管理并适用于文件信息必须100%不更改的应用领域。最初只有光盘符合条件,只读光盘具有天然的worm特性,随着应用的深入,特别近几年来法规遵从的要求,worm技术发展迅速,磁盘,磁带,MO,UDO等可读可写的存储介质也可以通过硬件和软件来控制实现worm。Worm (Write Once Read Many) technology means that data is written into the storage medium once, and can be read out multiple times, but modification or deletion is not allowed, providing the most secure guarantee for important data. Provides pure real data management and is suitable for applications where file information must be 100% unchanged. At first, only optical discs were eligible, and read-only optical discs have natural worm characteristics. With the deepening of applications, especially the requirements of regulatory compliance in recent years, worm technology has developed rapidly. Disks, tapes, MO, UDO and other readable and writable storage media The worm can also be controlled by hardware and software.
目前应用的worm技术包括光盘技术、磁带技术、磁盘技术三种技术,其中针对磁盘技术来说,随着磁盘容量的提高和成本的下降,在磁盘上实现了不可擦除,不可重写的磁盘worm存储也已经有很多应用。通过磁盘阵列柜管理软件,创建worm存储卷,数据一旦存入worm存储卷,在磁盘柜软件的控制之下,在规定的限期内,即使是文件的创建者或者系统管理员都不可以更改,删除甚至改名存档的数据,只有蓄意破坏磁盘才能导致数据的删除或者更改。数据存储使用RAID技术,提供了高性能和高可靠性。目前在磁盘实现worm主要有两种系统,一类是基于文件系统,另一类是内容存储系统。Currently applied worm technologies include optical disc technology, magnetic tape technology, and magnetic disk technology. For magnetic disk technology, with the improvement of disk capacity and the reduction of cost, non-erasable and non-rewritable disks have been realized on disks. Worm storage has also been used in many applications. The worm storage volume is created through the disk array cabinet management software. Once the data is stored in the worm storage volume, under the control of the disk cabinet software, even the creator of the file or the system administrator cannot change it within the specified time limit. Deleting or even renaming archived data, only deliberate destruction of the disk can result in data deletion or alteration. Data storage uses RAID technology, which provides high performance and high reliability. At present, there are two main systems for implementing worms on the disk, one is based on the file system, and the other is the content storage system.
对于信息技术的快速发展,大量的数据文件源源不断的产生,人们对数据文件的安全需求大幅度提高,在很多应用领域对于产生的文件必须是不能修改的,并且要长期保存,现有技术中并未针对集群存储进行Worm设计;无法实现集群存储的Worm设计,限制集群存储的应用空间。此为现有技术的不足之处。With the rapid development of information technology, a large number of data files are continuously produced, and people's security requirements for data files have been greatly increased. In many application fields, the generated files must not be modified and must be stored for a long time. In the prior art The Worm design for cluster storage is not implemented; the Worm design for cluster storage cannot be realized, which limits the application space of cluster storage. This is the weak point of prior art.
因此,针对现有技术中的上述缺陷,提供设计一种在集群存储上的WORM技术应用方法;以解决上述技术问题,是非常有必要的。Therefore, aiming at the above-mentioned defects in the prior art, it is very necessary to provide and design a WORM technology application method on cluster storage to solve the above-mentioned technical problems.
发明内容Contents of the invention
本发明的目的在于,针对上述现有技术存在的缺陷,提供设计一种在集群存储上的WORM技术应用方法,以解决上述技术问题。The object of the present invention is to provide and design a WORM technology application method on cluster storage to solve the above-mentioned technical problems in view of the above-mentioned defects in the prior art.
为实现上述目的,本发明给出以下技术方案:To achieve the above object, the present invention provides the following technical solutions:
一种在集群存储上的WORM技术应用方法,其特征在于,包括以下步骤:A method for applying WORM technology on cluster storage, comprising the following steps:
步骤S1:通过更改集群节点CIFS/NFS配置文件中的参数来实现worm的开启和关闭;Step S1: realize the opening and closing of the worm by changing the parameters in the CIFS/NFS configuration file of the cluster node;
步骤S2:针对共享目录设置WORM宽限期、WORM超时时间;Step S2: Set the WORM grace period and WORM timeout period for the shared directory;
步骤S3:在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;Step S3: Restart the CIFS/NFS service under the file system to make the set grace period and timeout period take effect;
步骤S4:在客户端进行写文件请求,接收客户端的写文件操作请求,识别其要操作的文件,若该文件已处于WORM保护状态,则返回错误;否则,计算本次操作距离上次对该文件写入操作时间的间隔,并进入步骤S5;Step S4: Make a file write request on the client, receive the file write operation request from the client, identify the file to be operated, and return an error if the file is already under WORM protection; otherwise, calculate the distance between this operation and the last time The interval of the file writing operation time, and enter step S5;
步骤S5:如果步骤S4中的间隔小于WORM宽限期,则将该请求转发至文件系统,若该间隔大于或等于宽限期,文件随即进入WORM保护状态,其属性被置为只读,用户写操作被视为越权,向客户端返回错误;Step S5: If the interval in step S4 is less than the WORM grace period, forward the request to the file system, if the interval is greater than or equal to the grace period, the file enters the WORM protection state immediately, its attribute is set to read-only, and the user writes It is regarded as exceeding authority and returns an error to the client;
步骤S6:手动设置提交保护,使文件直接进去保护期,去除文件写权限或设置为只读。Step S6: Manually set the submission protection, so that the file directly enters the protection period, and removes the file write permission or sets it as read-only.
作为优选,步骤S1中,通过在文件系统的CIFS/NFS共享配置文件中增加vfsobjects=worm字段来开启回收站功能;当没有该字段时,worm功能为关闭状态,关闭状态下,文件的权限为一般文件系统权限状态。Preferably, in step S1, the recycle bin function is opened by adding the vfsobjects=worm field in the CIFS/NFS shared configuration file of the file system; when there is no such field, the worm function is closed, and in the closed state, the file authority is General file system permission status.
作为优选,步骤S2中,当开启worm功能后在CIFS/NFS共享配置文件中添加宽限期和超时时间参数来设置共享目录的保护期(即文件只可读不可写)。Preferably, in step S2, after the worm function is enabled, a grace period and a timeout parameter are added to the CIFS/NFS shared configuration file to set the protection period of the shared directory (that is, the file can only be read but not written).
作为优选,步骤S3中,在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;WORM宽限期:从文件最后一次被写入算起,直到宽限期为止,如果再无对该文件的写操作,当文件再次被访问时该文件进入WORM保护状态,即被设置为只读状态;WORM超时时间:文件进入WORM保护状态后,任何用户只能读取其内容,而无权对其进行任何修改或删除操作,等到达超时时间后,WORM保护状态失效,文件只读状态失效,此时允许用户对文件进行修改、删除、读取各种文件操作。As preferably, in step S3, restart the CIFS/NFS service under the file system to make the grace period and the timeout period of the setting take effect; WORM grace period: from the last time the file is written, until the grace period, if there is no such For the write operation of the file, when the file is accessed again, the file enters the WORM protection state, that is, it is set to the read-only state; WORM timeout time: after the file enters the WORM protection state, any user can only read its content, and has no right to It performs any modification or deletion operation. After the timeout period is reached, the WORM protection status becomes invalid, and the file read-only status becomes invalid. At this time, the user is allowed to modify, delete, and read various file operations on the file.
作为优选,所述步骤S4中,当通过客户端向文件写入时,WORM目录下的文件,在设置的自动提交保护时间内没有进行写操作和修改WORM属性等操作,文件将自动进入保护状态。As a preference, in said step S4, when writing to the file through the client, the file under the WORM directory does not perform operations such as writing operations and modifying WORM attributes within the set automatic submission protection time, and the file will automatically enter the protected state .
本技术方案中,除了通过设置宽限期和超时时间文件系统自动提交保护外还可以通过手动提交保护:在linux客户端使用chmod -w filename,去除文件写权限、在Windows客户端:右键单击文件,勾选“只读”;文件会立刻进入保护状态,普通用户则不能够修改这些文件,“保护状态”的文件,可以使用超级管理员帐户进行特权删除。In this technical solution, in addition to automatically submitting the protection by setting the grace period and timeout time, the file system can also submit the protection manually: use chmod -w filename on the Linux client to remove the file write permission, and on the Windows client: right-click the file , check "Read-only"; the files will immediately enter the protected state, and ordinary users cannot modify these files. Files in the "protected state" can be deleted with privileges using the super administrator account.
本发明的有益效果在于,对于一般的文件系统来说,大量的数据文件产生之后,并不能在一定时间内不可修改,使文件进入保护期,超过保护期之后可以对文件进行删除、修改等操作,无法满足医院、银行的一段时间内文件不被修改的业务,集群存储添加worm功能后能够满足这一需求,并且提供了数据的安全性,扩大业务范围提高市场竞争力。The beneficial effect of the present invention is that, for a general file system, after a large number of data files are generated, they cannot be modified within a certain period of time, so that the files enter the protection period, and operations such as deletion and modification can be performed on the files after the protection period exceeds , It cannot meet the business of hospitals and banks that the files will not be modified for a period of time. After adding the worm function to the cluster storage, it can meet this demand, and provide data security, expand the business scope and improve market competitiveness.
由此可见,本发明与现有技术相比,具有突出的实质性特点和显著地进步,其实施的有益效果也是显而易见的。It can be seen that, compared with the prior art, the present invention has outstanding substantive features and remarkable progress, and the beneficial effects of its implementation are also obvious.
具体实施方式detailed description
下面通过具体实施例对本发明进行详细阐述,以下实施例是对本发明的解释,而本发明并不局限于以下实施方式。The present invention is described in detail below through specific examples, and the following examples are explanations of the present invention, but the present invention is not limited to the following embodiments.
本实施例给出的一种在集群存储上的WORM技术应用方法,其特征在于,包括以下步骤:A kind of WORM technology application method on the cluster storage that the present embodiment provides, is characterized in that, comprises the following steps:
步骤S1:通过更改集群节点CIFS/NFS配置文件中的参数来实现worm的开启和关闭;Step S1: realize the opening and closing of the worm by changing the parameters in the CIFS/NFS configuration file of the cluster node;
步骤S2:针对共享目录设置WORM宽限期、WORM超时时间;Step S2: Set the WORM grace period and WORM timeout period for the shared directory;
步骤S3:在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;Step S3: Restart the CIFS/NFS service under the file system to make the set grace period and timeout period take effect;
步骤S4:在客户端进行写文件请求,接收客户端的写文件操作请求,识别其要操作的文件,若该文件已处于WORM保护状态,则返回错误;否则,计算本次操作距离上次对该文件写入操作时间的间隔,并进入步骤S5;Step S4: Make a file write request on the client, receive the file write operation request from the client, identify the file to be operated, and return an error if the file is already under WORM protection; otherwise, calculate the distance between this operation and the last time The interval of the file writing operation time, and enter step S5;
步骤S5:如果步骤S4中的间隔小于WORM宽限期,则将该请求转发至文件系统,若该间隔大于或等于宽限期,文件随即进入WORM保护状态,其属性被置为只读,用户写操作被视为越权,向客户端返回错误;Step S5: If the interval in step S4 is less than the WORM grace period, forward the request to the file system, if the interval is greater than or equal to the grace period, the file enters the WORM protection state immediately, its attribute is set to read-only, and the user writes It is regarded as exceeding authority and returns an error to the client;
步骤S6:手动设置提交保护,使文件直接进去保护期,去除文件写权限或设置为只读。Step S6: Manually set the submission protection, so that the file directly enters the protection period, and removes the file write permission or sets it as read-only.
本实施例中,步骤S1中,通过在文件系统的CIFS/NFS共享配置文件中增加vfsobjects=worm字段来开启回收站功能;当没有该字段时,worm功能为关闭状态,关闭状态下,文件的权限为一般文件系统权限状态。In this embodiment, in step S1, the recycle bin function is enabled by adding the vfsobjects=worm field in the CIFS/NFS shared configuration file of the file system; when there is no such field, the worm function is closed, and in the closed state, the file Permissions are general file system permission status.
步骤S2中,当开启worm功能后在CIFS/NFS共享配置文件中添加宽限期和超时时间参数来设置共享目录的保护期(即文件只可读不可写)。In step S2, after enabling the worm function, add grace period and timeout parameters to the CIFS/NFS shared configuration file to set the protection period of the shared directory (that is, the file can only be read but not written).
步骤S3中,在文件系统下重启CIFS/NFS服务使设置的宽限期和超时时间生效;WORM宽限期:从文件最后一次被写入算起,直到宽限期为止,如果再无对该文件的写操作,当文件再次被访问时该文件进入WORM保护状态,即被设置为只读状态;WORM超时时间:文件进入WORM保护状态后,任何用户只能读取其内容,而无权对其进行任何修改或删除操作,等到达超时时间后,WORM保护状态失效,文件只读状态失效,此时允许用户对文件进行修改、删除、读取各种文件操作。In step S3, restart the CIFS/NFS service under the file system to make the set grace period and timeout time effective; WORM grace period: count from the last time the file is written until the grace period, if there is no more writing to the file Operation, when the file is accessed again, the file enters the WORM protection state, that is, it is set to a read-only state; WORM timeout time: After the file enters the WORM protection state, any user can only read its content, and has no right to do anything to it For modification or deletion operations, after the timeout period is reached, the WORM protection status becomes invalid, and the read-only status of the file becomes invalid. At this time, the user is allowed to modify, delete, and read various file operations on the file.
所述步骤S4中,当通过客户端向文件写入时,WORM目录下的文件,在设置的自动提交保护时间内没有进行写操作和修改WORM属性等操作,文件将自动进入保护状态。In the step S4, when the client writes to the file, the file under the WORM directory will automatically enter the protected state if no write operation or modification of the WORM attribute is performed within the set automatic submission protection time.
以上公开的仅为本发明的优选实施方式,但本发明并非局限于此,任何本领域的技术人员能思之的没有创造性的变化,以及在不脱离本发明原理前提下所作的若干改进和润饰,都应落在本发明的保护范围内。The above disclosure is only a preferred embodiment of the present invention, but the present invention is not limited thereto, any non-creative changes that those skilled in the art can think of, and some improvements and modifications made without departing from the principle of the present invention , should fall within the protection scope of the present invention.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710452206.1A CN107301018A (en) | 2017-06-15 | 2017-06-15 | A kind of WORM technology application processes on cluster-based storage |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710452206.1A CN107301018A (en) | 2017-06-15 | 2017-06-15 | A kind of WORM technology application processes on cluster-based storage |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107301018A true CN107301018A (en) | 2017-10-27 |
Family
ID=60135250
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710452206.1A Pending CN107301018A (en) | 2017-06-15 | 2017-06-15 | A kind of WORM technology application processes on cluster-based storage |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107301018A (en) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109101843A (en) * | 2018-09-03 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of filing secure storage method of data and device |
| CN109117667A (en) * | 2018-07-27 | 2019-01-01 | 郑州云海信息技术有限公司 | A kind of document protection method, system, equipment and computer readable storage medium |
| CN109492425A (en) * | 2018-09-30 | 2019-03-19 | 南京中铁信息工程有限公司 | A kind of worm technical application method on a distributed |
| CN110221768A (en) * | 2018-03-01 | 2019-09-10 | 浙江宇视科技有限公司 | Realize the method and system of storage resource WORM attribute |
| US20210211498A1 (en) * | 2020-05-29 | 2021-07-08 | Beijing Baidu Netcom Science And Technology Co., Ltd. | File resource processing method and apparatus, device and medium |
| CN113407995A (en) * | 2021-06-25 | 2021-09-17 | 济南浪潮数据技术有限公司 | Method, system, equipment and medium for normal error reporting of overwriting and additional writing |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050097260A1 (en) * | 2003-11-03 | 2005-05-05 | Mcgovern William P. | System and method for record retention date in a write once read many storage system |
| CN101286142A (en) * | 2008-05-19 | 2008-10-15 | 华为技术有限公司 | Disk operation protection method and disk controller |
| CN104461380A (en) * | 2014-11-17 | 2015-03-25 | 华为技术有限公司 | Data storage method and device |
-
2017
- 2017-06-15 CN CN201710452206.1A patent/CN107301018A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050097260A1 (en) * | 2003-11-03 | 2005-05-05 | Mcgovern William P. | System and method for record retention date in a write once read many storage system |
| CN101443760A (en) * | 2003-11-03 | 2009-05-27 | 网络装置公司 | System and method for recording retention dates in a write-once-read-many storage system |
| CN101286142A (en) * | 2008-05-19 | 2008-10-15 | 华为技术有限公司 | Disk operation protection method and disk controller |
| CN104461380A (en) * | 2014-11-17 | 2015-03-25 | 华为技术有限公司 | Data storage method and device |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110221768A (en) * | 2018-03-01 | 2019-09-10 | 浙江宇视科技有限公司 | Realize the method and system of storage resource WORM attribute |
| CN109117667A (en) * | 2018-07-27 | 2019-01-01 | 郑州云海信息技术有限公司 | A kind of document protection method, system, equipment and computer readable storage medium |
| CN109101843A (en) * | 2018-09-03 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of filing secure storage method of data and device |
| CN109492425A (en) * | 2018-09-30 | 2019-03-19 | 南京中铁信息工程有限公司 | A kind of worm technical application method on a distributed |
| US20210211498A1 (en) * | 2020-05-29 | 2021-07-08 | Beijing Baidu Netcom Science And Technology Co., Ltd. | File resource processing method and apparatus, device and medium |
| US11451628B2 (en) * | 2020-05-29 | 2022-09-20 | Beijing Baidu Netcom Science And Technology Co., Ltd. | File resource processing method and apparatus, device and medium |
| CN113407995A (en) * | 2021-06-25 | 2021-09-17 | 济南浪潮数据技术有限公司 | Method, system, equipment and medium for normal error reporting of overwriting and additional writing |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107301018A (en) | A kind of WORM technology application processes on cluster-based storage | |
| CN102317922B (en) | System and method for providing write once read many (WORM) storage | |
| US7146388B2 (en) | Method, system, and program for archiving files | |
| US9075851B2 (en) | Method and apparatus for data retention in a storage system | |
| US12450196B2 (en) | Event based retention of read only files | |
| TWI333614B (en) | Method, system, and program for processing a file request | |
| US9817582B2 (en) | Offload read and write offload provider | |
| US8516022B1 (en) | Automatically committing files to be write-once-read-many in a file system | |
| US9449007B1 (en) | Controlling access to XAM metadata | |
| US20060010301A1 (en) | Method and apparatus for file guard and file shredding | |
| US11249672B2 (en) | Low-cost backup and edge caching using unused disk blocks | |
| TW200408980A (en) | System and method for managing file names for file system filter drivers | |
| US20180089033A1 (en) | Performing data backups using snapshots | |
| US7308543B2 (en) | Method and system for shredding data within a data storage subsystem | |
| CN107092685A (en) | A kind of method that file system and RDBMS store transaction data are used in combination | |
| Nagle et al. | The ANSI T10 object-based storage standard and current implementations | |
| JP2005267599A (en) | Data write protection in a mixed storage area network and network attached storage environment | |
| CN101490678A (en) | Management and storage of information and metadata | |
| US11599423B1 (en) | Managing backup copies in a right-to-delete personal data environment | |
| US20060206484A1 (en) | Method for preserving consistency between worm file attributes and information in management servers | |
| CN116010355A (en) | A file processing method and device | |
| US20130297653A1 (en) | Metadata storage management offloading for enterprise applications | |
| CN117113380A (en) | Embedded virtual file system design method based on domestic operating system | |
| US9646012B1 (en) | Caching temporary data in solid state storage devices | |
| US11449468B1 (en) | Enforcing minimum space guarantees in thinly-provisioned file systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171027 |
|
| RJ01 | Rejection of invention patent application after publication |