Memory data block integrity checking method

A technology for integrity inspection and memory data, which is applied in the field of integrity inspection of memory data blocks, can solve the problems of reduced accuracy rate and recognition accuracy rate, and achieve the effect of taking into account performance requirements and protecting against security threats

Inactive Publication Date: 2019-12-20
PEKING UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the recognition of handwritten digits, tampering with the data blocks of the training samples will greatly reduce the accuracy of the recognition, and as the probability of the wrong copy being read increases, the accuracy will drop significantly, as shown in Table 2-5

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory data block integrity checking method
  • Memory data block integrity checking method
  • Memory data block integrity checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention not only improves the security of the Alluxio platform, but also has little impact on performance.

[0061] The cluster in this part of the experiment contains 11 nodes, including a master node Master and 10 slave nodes Worker, where Worker1 to Worker5 are deployed on the same rack, Worker6 to Worker10 are deployed on the same rack, and each node is installed with 64-bit Ubuntu 16.04 operation The system is physically configured with an Inter Core i7 processor with a main frequency of 3.4GHz, 8GB of physical memory and 256GB of hard disk storage. The version of Spark is 2.2.0 as the upper-level computing framework, the version of HDFS as the underlying file system is 2.8.1, and the JDK is Oracle-JDK8u121. The experimental clusters are in the same LAN environment. Deploy the native Alluxio system and SE-Alluxio on the cluster as an experimental comparison. Each Alluxio Worker is configured with 2GB memory storage and 10GB hard disk storage. The n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a memory data block integrity checking method. The method comprises the following steps that 1) for a data block verification request received from a client, when a requested data block does not exist in the space managed by an Alluxio system, the client reads the corresponding data block from a UFS, calculates the Hash value of the data block, and then carries out the step2); if the requested data block exists in the space managed by the Aluxio system, the step 3) is carried out; 2) the client transmits the Hash value of the data block to a main node of an Alluxio system for storage; and 3) the client performs Hash value calculation on the read data block, then communicates with a main node to confirm the consistency of the read data block and the real data block,and judges that the integrity of the data block is damaged if the read data block is not consistent with the real data block. According to the method, the security threat can be effectively prevented, and the requirement for the performance is considered while the security is considered.

Description

technical field [0001] The present invention belongs to Alluxio, a mainstream big data memory storage system, and relates to the security issue of data integrity in the Alluxio platform. A method for checking the integrity of memory data blocks is designed for the security threat of integrity damage of such memory data blocks. Background technique [0002] In recent years, the development of big data technology has deeply affected and changed human society. The huge data generated by all walks of life has become a new resource, which contains huge social value and commercial value. Efficient and safe storage, management, and processing of these massive data are key issues in big data technology. [0003] With the development of technology, the architecture that separates computing and storage has become the mainstream. For example, computing frameworks such as Spark and Flink are used in the computing layer, and big data storage systems represented by HDFS or S3 are used in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 沈晴霓杨溢哲辛武钱文君吴中海
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products