摘要:
When a file server is to create data that does not permit falsification in an external storage, it is not possible to guarantee that the rewriting of this data can be prevented from a computer connected to the external storage without going through a file server. Provided is a storage system configured from a first storage having a file I/O processing unit and a second storage connected to this first storage, wherein the first storage includes a unit for requesting a change of access authority to the storage area in the own storage and in the second storage provided to the own storage. An access request to a storage area in a second storage from a computer connected to a second storage without going through a file I/O processing unit is restricted based on the change of access authority executed by the second storage upon receiving the request from the first storage.
摘要:
A search device receives a search request, extracts at least one of an alias or a metadata name from the search request, converts the alias to metadata name by referring to metadata schema management information for managing in an inclusive manner a namespace alias and a metadata name for the retrieval device to identify a metadata schema definition defining the structure of a retrieval-target file that includes metadata, and specifies a field name from the metadata name by referring to schema mapping management information for managing the corresponding relationship between a metadata name of metadata schema definition information and a field name of the retrieval index schema definition.
摘要:
A progress status management system comprises a management target system configured to execute a series of processes to the file, which includes a plurality of process units configured to execute a process to a file, and a progress status management unit configured to manage a progress status of a process executed by the process unit included at the management target system. The progress status management unit, in a case of acquiring the first identification information of a file in a first process unit, acquires the first identification information of the file in the second process unit, and links the acquired first identification information in the first process unit and the acquired first identification information in the second process unit to the same second identification information.
摘要:
A storage system 103 carries out first and second de-duplication processes in response to receiving a write request from a client. First, a determination is made as to whether a write target data item overlaps with any of the stored data items of a part of a stored data item group, which is a user data item group stored in a storage device 209, and if so, the write target data item is prevented from being stored in the storage device. Second, a determination is made as to whether a target stored data item, which is not finished being evaluated as to whether it overlaps with the stored data item in the first de-duplication process, overlaps with another stored data item, and if so, the target stored data item or the same data item overlapping with the target stored data item is deleted from the storage device 209.
摘要:
Appropriate control is performed for data blocks and data block groups in a file.A file system having various functions provides an upper program with an interface for changing size, storage position and processing method in each function of extents being data block management units in a file. The file system can improve the effects aimed by the respective functions by implementing the extent configuration and processing optimized for the various functions of the file system, based on the instruction from the upper program.
摘要:
A WEB service providing server can execute WEB service processing using data provided by an online storage service providing server, and leaking of data at the WEB service providing server can be prevented.A WEB service providing server 102 requests, in response to a service request from a client terminal 100, that an online storage service providing server 101 provides data that will satisfy the service request. The online storage service providing server 101 extracts content data from storage devices, encrypts the extracted content data, and provides the WEB service providing server 102 with storage service data composed of data including the encrypted content data and metadata. The WEB service providing server 102 constructs a WEB service screen according to the metadata and provides the client terminal 100 with the constructed WEB service screen.
摘要:
A backup control apparatus which references duplication management information which includes first stored location information indicating the stored location of first information resource and second stored location information indicating the stored location of a second information resource which duplicates the first information resource, and identifies, from among a plurality of information resources belonging to a backup region. The first information resource stored in the location indicated by the first stored location information, and a second information resource stored in the location indicated by the second stored location information corresponding to the first stored location information. The backup control apparatus replaces the identified second information resource with linked information indicating a link to the identified first information resource, and backs up the backup region in which the second information resource is replaced with the linked information.
摘要:
A wide area distributed storage system checks for erasure of WORM (Write-Once Read-Many) files. A first management server acquires a storage location of a second file on a second disk apparatus which corresponds to a first file stored on a first disk apparatus, of which a retention period has expired, and queries a second management server about a retention period of the second file whose storage location has been acquired. The queried second management server refers to a file table and indicates existence or non-existence of the second file on the second disk apparatus and whether the retention period of the second file has expired or not. The system avoids unintended deletion of files by querying a plurality of file management servers about whether a file with an expired retention period should be set as a deletable object.
摘要:
Provided is a storage system for solving the problem in that, when the registration of a nonexistent user is deleted, only a system administrator can access files that the user left, so that a load placed on the administrator increases at the time of an audit. The authentication program for permitting a user, who is attempting to log in to a storage system, to access a file recorded in the storage system, the program including: a first step for receiving a user name and a password from the user; a second step for referring to a validity term corresponding to a pair of the user name and the password recorded in the storage system; and a third step for permitting access by the user to a file corresponding to the validity term based on a result of the second step, the first to third steps being executed by a processor.
摘要:
A log management system is devised to easily discover improper handling log information by managers. Virtual operation systems (OS) are respectively installed for respective users in a file server constructed as an NAS device. These virtual OS function as virtual NAS. The virtual OS and manager OS exchange information relating to log information via an information exchange part constructed as a kernel. The log information produced in the virtual OS is transmitted to a first log management device via a first communications network, and is also transmitted to a second log management device via a second communications network separated from the first communications network. As a result of the same log information being managed by multiplex management using separate management devices, the system detects whether or not there has been any improper handling of the log information.