Abstract
With the continuous development of information technology, the amount of data in information systems continues to increase. Big data has become an inevitable trend in the development of information technology, and the problems faced by the secure storage of big data have also become problems that must be solved. On the one hand, the research in this paper meets the storage requirements of unstructured massive data. On the other hand, it applies digital certificate authentication technology to realize storage security identity authentication based on digital certificate, and solves the application problem of high-security identity authentication in distributed storage. The innovation of this paper is to use the corresponding virtual storage space mapping algorithm to realize the unified management of resource pool. And before data transmission, the digital certificate authentication method is used to realize the authority control of the storage resource pool. This paper has completed the design and implementation of the distributed secure storage system, and completed the related testing and verification work, which significantly improved the performance of data storage and solved the problem of big data secure storage.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Chang F, Dean J, Ghemawat S (2008) Bigtable: a distributed storage system for structured data. ACM Trans Comput Syst 26(2):4–26
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Han D, Huang J (2006) Security for the storage network merging nas and san. In: 2006 international conference on machine learning and cybernetics, pp 736–741
Hong S, Zeng Y (2021) A health assessment framework of lithium-ion batteries for cyber defense. Appl Soft Comput 101:107067. https://doi.org/10.1016/j.asoc.2020.107067
Hong S, Wang B, Ma X, Wang J, Zhao T (2015) Failure cascade in interdependent network with traffic loads. J Phys A 48(48):485101
Hong S, Lv C, Zhao T (2016a) Cascading failure analysis and restoration strategy in an interdependent network. J Phys A 49(19):195101
Hong S, Yang H, Zhao T (2016b) Epidemic spreading model of complex dynamical network with the heterogeneity of nodes. Int J Syst Sci 47(11):2745–2752
Hong S, Zhu J, Braunstein LA, Zhao T, You Q (2017) Cascading failure and recovery of spatially interdependent networks. J Stat Mech Theory Exp 10:103208
Hong S, Yue T, Liu H (2020) Vehicle energy system active defense: a health assessment of lithium-ion batteries. Int J Intell Syst. https://doi.org/10.1002/int.22309
Huang J, Han D, Xie C (2004) Research on the security of the united storage network based on nas. J Chongqing Univ 2:48–53
Long Q, Zeng F, Wu S, Pan A (2005) A secure storage system in the open environment. Wuhan Univ J Nat Sci 10(1):6–30
Luo X, Shu J (2012) Summary of research for erasure code in storage system. J Comput Res Dev 49(1):1–11
Meth KZ, Satran J (2003) Design of the iscsi protocol. In: 20th IEEE/11th NASA goddard conference on mass storage systems and technologies, 2003. (MSST 2003). Proceedings, pp 116–122
O’Malley O, Zhang K, Radia S (2009) Hadoop security design. http://bit.ly/75011//
Ren W, Ren Y, Zhang H (2010) Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. Sci China Ser F Inf Sci 53(5):964–979
Renesse RV, Schneider FB (2004) Chain replication for supporting high throughput and availability. In: In Proceedings of the 6th symposium on operating systems design and implementation, pp 91–104
Weatherspoon H, Kubiatowicz JD (2002) Erasure coding vs. replication: a quantitative comparison. In: IPTPS ’01 revised papers from the first international workshop on peer-to-peer systems, pp 328–338
Weil SA, Brandt SA, Miller EL (2006) Ceph: a scalable, high-performance distributed file system. In: Proceedings of the 7th symposium on Operating systems design and implementation, pp 307–320
Yi X, Zheng F (2013) A research on high availability mechanism of virtual machine based on ceph. In: 2013 international conference on software engineering and computer science, pp 16–20
Zhang C, Sterck HD (2010) Supporting multi-row distributed transactions with global snapshot isolation using bare-bones hbase. In: 2010 11th IEEE/ACM international conference on grid computing, pp 177–184
Acknowledgements
First of all, I would like to thank all the authors for their joint efforts to complete this paper. Secondly, the authors are highly thankful for National Key Research Program (2019YFB1706001), National Natural Science Foundation of China (61773001), Industrial Internet Innovation Development Project (TC190H46B).and this project supported by Chinese National Key Laboratory of Science and Technology on Information System Security.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zheng, Y., Hong, S., Wang, J. et al. Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication. J Ambient Intell Human Comput 14, 7247–7254 (2023). https://doi.org/10.1007/s12652-021-03577-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03577-z