Skip to main content
Log in

Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the continuous development of information technology, the amount of data in information systems continues to increase. Big data has become an inevitable trend in the development of information technology, and the problems faced by the secure storage of big data have also become problems that must be solved. On the one hand, the research in this paper meets the storage requirements of unstructured massive data. On the other hand, it applies digital certificate authentication technology to realize storage security identity authentication based on digital certificate, and solves the application problem of high-security identity authentication in distributed storage. The innovation of this paper is to use the corresponding virtual storage space mapping algorithm to realize the unified management of resource pool. And before data transmission, the digital certificate authentication method is used to realize the authority control of the storage resource pool. This paper has completed the design and implementation of the distributed secure storage system, and completed the related testing and verification work, which significantly improved the performance of data storage and solved the problem of big data secure storage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Chang F, Dean J, Ghemawat S (2008) Bigtable: a distributed storage system for structured data. ACM Trans Comput Syst 26(2):4–26

    Article  Google Scholar 

  • Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  • Han D, Huang J (2006) Security for the storage network merging nas and san. In: 2006 international conference on machine learning and cybernetics, pp 736–741

  • Hong S, Zeng Y (2021) A health assessment framework of lithium-ion batteries for cyber defense. Appl Soft Comput 101:107067. https://doi.org/10.1016/j.asoc.2020.107067

    Article  Google Scholar 

  • Hong S, Wang B, Ma X, Wang J, Zhao T (2015) Failure cascade in interdependent network with traffic loads. J Phys A 48(48):485101

    Article  MathSciNet  MATH  Google Scholar 

  • Hong S, Lv C, Zhao T (2016a) Cascading failure analysis and restoration strategy in an interdependent network. J Phys A 49(19):195101

    Article  MATH  Google Scholar 

  • Hong S, Yang H, Zhao T (2016b) Epidemic spreading model of complex dynamical network with the heterogeneity of nodes. Int J Syst Sci 47(11):2745–2752

    Article  MATH  Google Scholar 

  • Hong S, Zhu J, Braunstein LA, Zhao T, You Q (2017) Cascading failure and recovery of spatially interdependent networks. J Stat Mech Theory Exp 10:103208

    Article  MathSciNet  MATH  Google Scholar 

  • Hong S, Yue T, Liu H (2020) Vehicle energy system active defense: a health assessment of lithium-ion batteries. Int J Intell Syst. https://doi.org/10.1002/int.22309

  • Huang J, Han D, Xie C (2004) Research on the security of the united storage network based on nas. J Chongqing Univ 2:48–53

    Google Scholar 

  • Long Q, Zeng F, Wu S, Pan A (2005) A secure storage system in the open environment. Wuhan Univ J Nat Sci 10(1):6–30

    Google Scholar 

  • Luo X, Shu J (2012) Summary of research for erasure code in storage system. J Comput Res Dev 49(1):1–11

    Google Scholar 

  • Meth KZ, Satran J (2003) Design of the iscsi protocol. In: 20th IEEE/11th NASA goddard conference on mass storage systems and technologies, 2003. (MSST 2003). Proceedings, pp 116–122

  • O’Malley O, Zhang K, Radia S (2009) Hadoop security design. http://bit.ly/75011//

  • Ren W, Ren Y, Zhang H (2010) Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. Sci China Ser F Inf Sci 53(5):964–979

    Article  Google Scholar 

  • Renesse RV, Schneider FB (2004) Chain replication for supporting high throughput and availability. In: In Proceedings of the 6th symposium on operating systems design and implementation, pp 91–104

  • Weatherspoon H, Kubiatowicz JD (2002) Erasure coding vs. replication: a quantitative comparison. In: IPTPS ’01 revised papers from the first international workshop on peer-to-peer systems, pp 328–338

  • Weil SA, Brandt SA, Miller EL (2006) Ceph: a scalable, high-performance distributed file system. In: Proceedings of the 7th symposium on Operating systems design and implementation, pp 307–320

  • Yi X, Zheng F (2013) A research on high availability mechanism of virtual machine based on ceph. In: 2013 international conference on software engineering and computer science, pp 16–20

  • Zhang C, Sterck HD (2010) Supporting multi-row distributed transactions with global snapshot isolation using bare-bones hbase. In: 2010 11th IEEE/ACM international conference on grid computing, pp 177–184

Download references

Acknowledgements

First of all, I would like to thank all the authors for their joint efforts to complete this paper. Secondly, the authors are highly thankful for National Key Research Program (2019YFB1706001), National Natural Science Foundation of China (61773001), Industrial Internet Innovation Development Project (TC190H46B).and this project supported by Chinese National Key Laboratory of Science and Technology on Information System Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Hong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, Y., Hong, S., Wang, J. et al. Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication. J Ambient Intell Human Comput 14, 7247–7254 (2023). https://doi.org/10.1007/s12652-021-03577-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03577-z

Keywords

Navigation