期刊文献+

基于Java的NAT软交换代理及存储集群系统研究

Research of NAT soft-switch proxy and storage cluster based on Java
在线阅读 下载PDF
导出
摘要 NAT在代理服务器、路由器、防火墙等领域应用广泛,但在存储系统方面的应用还很少。为此,探讨NAT种类、应用及核心思想,及用Java网络包java.net实现NAT软交换的思路和方法,并根据网络存储系统安全问题,提出基于NAT的存储集群架构,分析其运行机制算法。模拟测试结果表明,基于NAT可在存储集群系统上实现代理服务,实现存储安全访问,对外网隐藏了存储系统的实际地址。 NAT play an important role on proxy server,router and firewall.NAT is seldom used in storage system design.The types,application and core ideas of NAT,and the method and steps of the implements based on Java.net are discussed.Based on the state of the art of network storage security,a novel structure of NAT network storage cluster is presented,its running mechanism and algorithm are analyzed.Simulation testing illustrates NAT implement proxy service and security access to storage system,and hide real address of storage system to outside network.
作者 曾文英 赵跃龙 宋玮 王文丰 ZENG Wen-ying;ZHAO Yue-long;SONG Wei;WANG Wen-feng(School of Computer and Engineer,South China University of Technology,Guangzhou 510640,China;School of Computer Engineering Technical,Guangdong Institute of Science and Technology,Zhuhai 519090,China)
出处 《计算机工程与设计》 CSCD 北大核心 2009年第13期3050-3053,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60573145) 湖南自然科学基金项目(05JJ30120) 广州科技计划基金项目(2007J1-C0401)
关键词 JAVA NAT 软交换 代理 存储集群 Java NAT soft switeh proxy storage cluster
  • 相关文献

参考文献8

二级参考文献35

  • 1刘冠蓉,陈爽.NAT代理服务器穿透方法的研究[J].计算机技术与发展,2006,16(6):74-76. 被引量:4
  • 2李亚敏,李小鹏,吴果.身份认证的密钥交换算法[J].计算机工程,2006,32(12):171-172. 被引量:8
  • 3赵水清,冯丹.基于对象存储设备上的服务质量研究[J].计算机科学,2006,33(9):89-92. 被引量:1
  • 4Mesnier M,Ganger G.R,Riedel E.Object-based storage[J].Communications Magazine,IEEE,2003,41 (8): 84-90.
  • 5Andrew W Leung, Ethan L Miller. Scalable security for large, high performance storage systems[C]. Proceedings of the second ACM workshop on Storage security and survivability,2006.
  • 6Sandhu R,Coyne EJ,Feinstein HL,et al.Role based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 7Seo D, Sweeney E.Simple authenticated key agreement algorithm[J].Electronics Letters, 1999,35(13): 1073-1074.
  • 8Diffie W, Hellman M.New directions in cryptography[J].IEEE Trans on Information Theory, 1976,22(6):644-654.
  • 9Mesnier M, Ganger G R, Riedel E. Object-based storage [J]. IEEE Communications Magazine, 2003,41(8):84-90.
  • 10ANSI INCITS 400-2004, Information technology - SCSI object- based storage device commands (OSD)[S].

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部