Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Shanyan leads domestic distributed storage manufacturers and adheres to the technical route of localization.

2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

As China enters the first year of the new data era in 2019, the latest IDC release "China will have the world's largest data circle in 2025" shows that various types of data in China are growing exponentially, and it is expected that China's data circle will increase to 48.6ZB in 2025. Data brings unprecedented commercial dividends as well as unprecedented risks. According to the data disclosure level index, more than 25 million pieces of data were leaked or leaked every day in 2018, including health care, credit cards, financial data, personal identity information, and so on.

Storage media as the carrier of such a large amount of data, in this context, security is particularly important. At present, China is making every effort to promote the construction of party and government informatization, and the National Informatization Plan of the 13th five-year Plan puts forward that by 2020, the construction of "Digital China" will achieve remarkable results. an internationally competitive, secure and controllable information industry ecosystem has been basically established.

Shanyan data has always been responsible for the development of data storage technology, adhering to the route of localization technology, focusing on deep ploughing in the field of distributed storage, and has taken many years to develop a national distributed unified storage platform USP.

As a domestic distributed storage software product, Sandstone USP adopts the industry-leading fully distributed and highly available design, the whole platform has no single point of failure, and can provide three different types of storage modules: file storage, block storage and object storage. These storage modules can be flexibly combined to provide fast and simple access to meet the agile development needs of the new generation of applications. It can flexibly expand according to the development of the application. Provide full semantic, cross-protocol data access to help enterprises open up data islands, achieve data sharing among traditional applications, integrated minimalist architecture, minute-level expansion, second-level data retrieval, and accelerate the transformation of enterprises on the cloud. In the field of data security and value discovery, the national secret algorithm is adopted to ensure the absolute security of the data. Data migration, data warehouse and other data governance modules can dock with various big data processing platforms to accelerate data mining, prevent enterprises from falling into data swamps, and build an exclusive data lake with enterprise characteristics.

Continuous and stable high-performance experienc

For business data, different business data have their own advantages, but there is nothing more than the sequence, randomness, timeliness and flood peak of data access. For storage devices, they are limited by their own hardware characteristics, and the access performance they can provide is also very different. After years of technical precipitation, Shanyan comprehensively considers the characteristics of business data and storage hardware, deeply optimizes the access path of data, and adapts data storage equipment.

Provide all-round performance optimization to ensure a continuous and stable high-performance experience for the business.

Multiple guarantees to protect data security

1. Multiple data redundancy modes

Shanyan data provides two kinds of data redundancy strategies: multi-copy and erasure code. multi-copy strategy provides data redundancy in the way of data mirroring, which ensures the integrity of redundant data and shortens the data reading path. In the data fragmentation scenario, the performance advantage of multiple copies is obvious. The erasure code strategy uses a specific algorithm to calculate the data fragment check code and store the data redundancy, which is different from the mirror redundancy of multiple copies of the data. Through data fragmentation redundancy, the erasure code strategy greatly improves the storage space utilization, can achieve the industry-leading effective space utilization, and greatly improve the space utilization of the replica 1x3, which is especially suitable for storage cost-sensitive scenarios.

2. Perfect disaster recovery system

The storage system supports multi-site disaster recovery mechanism, cross-regional data storage, extended cluster, asynchronous disaster recovery, to ensure data security and the highest space utilization, and greatly reduce RPO and RTO. USP is closely integrated with mainstream backup and archiving applications to replace traditional tape technology to achieve high-performance, low-cost disaster recovery backup, while combined with erasure code technology to ensure the safe availability of data under node and site failures.

4. Data desensitization

USP uses data desensitization technology to help enterprises improve security and confidentiality and prevent data abuse. At the same time, it helps enterprises comply with security regulations and privacy standards required by management / audit institutions.

For example, the sensitive information fields of enterprise customers (such as name, certificate number, bank account, address, telephone number, enterprise name, industrial and commercial registration number, taxpayer identification number, etc.) are desensitized and deformed through predefined desensitization rules to achieve sensitive private data protection.

5. National secret algorithm

The circulating data is valuable, so it is inevitable that the data must be transmitted and interacted, which is the part that is easy to be ignored in the process of data security protection. Shan Yan took the lead in integrating the state secret algorithm in the USP storage system, using two door locks to protect user data:

Add SM4 encryption and decryption to the input and output of the data to ensure that the stored user data is ciphertext

With the addition of SM3 and SM4 algorithms to the media key, only trusted users can see the plaintext of user data.

* * focus on domestic ecological construction

At present, China's deep participation in IT independent controllable industry is mainly the four major IT groups, including CEC, CETC, the Department of Chinese Academy of Sciences and Huawei. Shan Yan believes that the localization of IT can not be done on its own. It is necessary to focus on domestic ecological construction, integrate upstream and downstream resources, give full play to the advantages of various fields, and jointly promote the localization of IT industry chain in China to form an intelligent closed loop.

Multiple layout of application scene

1. Unified storage in data center

Data center virtualization technology platform, whether it is the new OpenStack, K8S or traditional VMware platform, Shanyan can support seamlessly, providing block, file and object support to each major virtualization platform. At the same time, in order to meet the smooth migration of existing application data and support the data storage needs of complex applications in the data center.

2. Security monitoring scene

Security is a problem that can not be ignored all the time, and security surveillance is like God's perspective, with a pair of "heavenly eyes" to protect our security, only eyes, no memory, all meaningless. Security monitoring has high requirements for real-time, reliability, capacity utilization and diversity of data. Through centralized management of data, Shanyan USP uniformly manages and classifies the real-time video stream, captured images, summary information and driving records generated by monitoring equipment, so as to reduce the storage cost of each TB data. Built-in various data processing frameworks, including multi-format transcoding, encryption and compression, tags, anti-deletion, quotas, event notifications, etc., to help applications quickly build a business platform. Shanyan data has accumulated a lot of practical experience in the field of security monitoring, including subway / urban rail monitoring, industrial control monitoring, highway monitoring, medical imaging and so on, supporting the construction of safe city and smart city.

3. Big data's application scenario

Shanyan is seamlessly compatible with the semantics of Hadoop underlying file storage HDFS, and can replace HDFS to solve the problems caused by HDFS, such as insufficient lowerwrite performance, low capacity utilization and no persistent writing. For read-write-intensive optimized unified storage platform, it can provide 7-hour, 24-hour data read and write. Big data platform is very sensitive to data source storage cost control. The erasure code mode provided by Shanyan can achieve extremely high storage space utilization without sacrificing performance and reliability, and can increase capacity benefits by 80% compared with HDFS replica mode.

4. Traditional NAS application scenarios

The traditional NAS is mainly based on NFS and CIFS/SMB protocols. Shanyan provides NAS gateways to expose NFS, CIFS/SMB and other protocols to realize file sharing across the network. At the same time, it supports Windows domain security and Linux file security configuration.

5. The scene of the party, government and army OA office system

The party, government and army OA office system undertakes the daily management norms of the unit, the examination and approval of various matters, the management of office resources, the coordination of multiple people and departments, and the communication and transmission of all kinds of information. The data involved in these functions are related to the national economy and people's livelihood, and put forward more stringent requirements for the security of data storage. As a domestic distributed unified storage platform with independent intellectual property rights, Shanyan data can provide safe, reliable and reliable data storage services for party, government and military users.

6. Out-of-the-box scenarios

For the vast majority of small and medium-sized enterprises, they do not have a large budget for IT construction, internal office applications are often very simple, but internal data is very important and must ensure absolute reliability and security. With the development of enterprises, there will be more and more data. In application scenarios like this, Shanyan can provide super-converged storage machines, provide one-stop solutions for virtualization and storage, and help small and medium-sized enterprises to quickly build internal IT. There is no need to make a budget in advance, and when you need to expand capacity, you can automatically expand capacity by joining the cluster with one click.

At present, information security has risen to the height of national strategy, and only with the localization of storage can national information security be fundamentally guaranteed. As a leading domestic distributed unified storage platform provider, Shanyan data provides overall cloud storage solutions for data information storage and security management for the party, government, transportation, energy, operators, education, health care and other industries. At the same time, we will continue to improve our service capabilities, focus on the ecological construction of domestic cloud industry, actively build high-quality national brands, and work with other Chinese enterprises to promote the comprehensive localization of the information industry to protect national information security.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report