期刊文献+

面向CDP系统的视图盘构建方法 被引量:2

Construction Method of View Disk for CDP System
在线阅读 下载PDF
导出
摘要 在传统的块级持续数据保护(continuous data protection,CDP)系统中,过去某时间点的恢复任务一旦完成,被保护磁盘当前时刻的数据状态就被完全覆盖,必须将被保护磁盘再次恢复到最新数据状态,当前工作才能得以继续进行下去.针对传统CDP系统恢复功能"一次查看,两次恢复"的问题,提出了日志盘分区技术及一种元数据层次式多级索引技术.将元数据与变动数据分别存放在日志盘的不同区域,并利用B^+树与改进B^+树将元数据区块和变动数据区块组织起来,形成元数据层次式多级索引,将过去任意时间点的数据挂载到虚拟磁盘供用户检视.经实验证明,该方法在不影响被保护磁盘当前数据状态的前提下向用户提供过去任意时间点的数据,简化了用户操作,减少了时间消耗. In the traditional block-level continuous data protection(CDP) system, once the recovery task at a certain point in time has been completed, the data state of the protected disk at the current time is completely covered. The current work can continue which means that the protected disk must be restored to the latest state again. Aiming at the problem of "one-view, tworecovery" of the traditional CDP system recovery function, a log disk partitioning technology and a metadata hierarchical multi-level indexing technology are proposed. The metadata and the changed data are respectively stored in different areas of the log disk, and the metadata block and the variable data block are organized by using the B^+ tree and the improved B^+ tree to form a hierarchical multi-level index of the metadata, and any point in the past will be used. The data is mounted to a virtual disk for user viewing. It has been proved by experiments that the method provides users with data at any point in time without affecting the current data state of the protected disk, which simplifies operations of users and reduces their time consumption.
作者 周娇 Zhou Jiao(School of Computer Science,Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2019年第2期157-161,共5页 Journal of Information Security Research
关键词 持续数据保护 日志盘分区 元数据 B^+ 索引 虚拟磁盘 continuous data protection(CDP) log disk partition metadata B^+ tree index virtual disk
  • 相关文献

参考文献5

二级参考文献40

  • 1刘正伟,张华忠,文中领,王旭.海量数据持续数据保护技术研究及实现[J].计算机研究与发展,2012,49(S1):37-41. 被引量:16
  • 2王树鹏 云晓春 郭莉.持续数据保护(CDP)技术的发展综述.信息技术快报,6(6):24-33.
  • 3ROCK M, PORESKY P. Shorten your backup window[J].Storage: Special Issue on Managing the Information that Drives the Enterprise, 2005: 28-34.
  • 4CHERVENAK A L,VELLANKI V,KURMAS Z.Protecting file systems: a survey of backup techniques[C] // Proceedings of the Joint NASA and IEEE Mass Storage Conference. Piscataway: IEEE, 1998: 18-31.
  • 5DUZY G. Match snaps to apps[J].Storage: Special Issue on Managing the Information that Drives the Enterprise, 2005: 46-52.
  • 6PATTERSON D. A new focus for a new century: Availability and maintainabilityperformance[C/OL] // FAST '02: Proceedings of the 1st USENIX Conference on File and Storage Technologies. Berkeley: USENIX, 2002[2011-12-06]. http://www.cs.berkeley.edu/~pattrsn/talks/keynote.html.
  • 7KEETON K, SANTOS C, BEYER D, et al. Designing for disasters[C] // FAST '04: Proceedings of the 3rd USENIX Conference on File and Storage Technologies. Berkeley: USENIX, 2004: 59-72.
  • 8DAMOULAKIS J. Continuous protection[J].Storage, 2004, 3(4):33-39.
  • 9LADEN G, TA-SHMA P, YAFFE E, et al. Architectures for controller based CDP[C] // FAST'07: Proceedings of the 5th USENIX Conference on File and Storage Technologies. Berkeley: USENIX, 2007: 107-121.
  • 10ZHU N, CHIUEH T. Portable and efficient continuous data protection for network file servers[C] // DSN '07: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington, DC: IEEE Computer Society, 2007: 687-697.

共引文献25

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部