Abstract

With the development and progress of network technology, hidden dangers of network security have also become a threat to network storage systems. This research mainly discusses the secure storage of big data based on hybrid large-scale databases. The user sends an authentication request to the SSP, and the SSP verifies the user’s time stamp ts to ensure that it is not a replayed message, and checks whether the user ID is legal. The virtualization layer logically divides the hardware devices at the facility layer through virtualization technology, provides unified services to the outside world, and supports the operation of the platform layer; the platform layer builds a file system and database to provide an operating environment for the operation layer; the operation layer provides users with a big data environment resource access behavior and platform traffic are reasonably allocated and managed, platform business deployment, etc.; the application layer provides users with big data computing services. During the file download process, the big data storage module is relatively fast (300-600k/s), while the speed of Seccloud and invisible cloud is relatively slow (200-400k/s). This research helps to improve the data access efficiency of the big data secure storage module.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.