期刊文献+

基于MPLS VPN网络的云存储技术研究

Research on Cloud Storage Technology Based on MPLS VPN
下载PDF
导出
摘要 在信息时代的数据爆炸性增长趋势下,众多互联网运营商推出自己的云存储系统,但在云端数据存储的安全上还有待进一步研究。研究一种基于MPLS快速数据包交换与路由的云存储技术,利用运营商提供的公共网络创建自己的私有虚拟网络,网络存储节点之间建立私有广域连接,管理分布在不同地域的存储节点,通过MPLS VPN隧道技术实现数据在私有云存储网络的同步透明传输,保证存储节点中数据免于被窃取或篡改。 With the explosive growth of data onto networks in information age, many Internet operators launch their own cloud storage system, but the overall view of its advantages in large capacity, mobile access, but the security of the cloud data storage, compared with the traditional storage technology has not significantly improved. Studies a fast packet switching and routing technology, which is based on the public network to create their own private virtual network, the network storage nodes to establish a private wide area connection, and management the storage nodes through the VPN MPLS tunnel technology to achieve data in the private cloud storage network of the synchronous transparent transmission, to keep the data in cloud storage node from steeling or tampering.
出处 《现代计算机》 2017年第12期41-43,共3页 Modern Computer
基金 广州市属高校科研项目(No.1201630601)
关键词 多协议标记转换 隧道技术 虚拟专用网络 虚拟化 云存储 Multi-Protocol Label Switch(MPLS) Tunneling Virtual Private Network(VPN) Virtualization Cloud Storage
  • 相关文献

参考文献5

二级参考文献31

  • 1付长冬,舒继武,郑纬民,沈美明.基于自主运算的自适应存储区域网络系统[J].软件学报,2004,15(7):1056-1063. 被引量:4
  • 2Amazon Simple Storage Service (Amazon S3) [EB/OL]. [2010-06-16]. http://aws.amazon. com/s3/.
  • 3Cryptographic Hash Function [EB/OL]. {2010-05-25]. http://en.wikipedia.org/wiki/ Cryptographic_hash_functions.
  • 4DENEHY T E, HSU W W. Duplicate Management for Reference Data [R]. Research Report. RJ 10305 (A0310-017). San Jose, CA, USA: IBM. 2003.
  • 5BRODER A Z. identifying and Filtering Near-duplicate Documents [C]ffProceedings of the 1 lth Annual Symposium on Combinatorial Pattern Matching(CPM '00), Jun 21-23, 2000, Montreal, Canada. Berlin, Germany: Sorinaer-Verlag, 2000:1-10.
  • 6HUNTJ W, MCILLROY M C. An Algorithm for Differential File Comparison [R]. Computing Science Technical Report 41. Stanford, CA, USA: Stanford University, 1976.
  • 7TOLIA N, KOZUCH M, SATYANARAYANAN M, et al. Opportunistic Use of Content-addressable Storage for Distributed File Systems [C]//Proceedings of the 2003 USENIX Annual Technical Conference (USENIX'03), Jun 9-14, 2003, San Antonio, TX, USA. Berkeley, CA, USA: USENIX Association. 2003:127-140.
  • 8GUPTA A, LISKOV B, RODRIGUES R. One Hop Lookups for Peer-to-peer Overlays [C]// Proceedings of the 9th Conference on Hot Topics in Operating Systems (HotOS'03), May 18-21, 2003, Lihue, HI,USA. Berkeley, CA, USA: USENIX Association,2003: 7-12.
  • 9BRODER A Z. Some Applications of Rabin's Fingerprinting Method [M]//CAPOCELLI R, DE SANTIS A, VACCARO U. Sequences Ⅱ: Methods in Communications, Security, and Computer Science. Berlin, Germany: Springer-Verlag, 1993:143-152.
  • 10ESH-GHI K, TANG H K. A Framework for Analyzing and Improving Content-based Chunking Algorithms [R]. TR 2005-30. Hewlett-Packard Labs. 2009.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部