Mimetic Distributed File Storage Device
Mimetic Distributed File Storage Device
Introduction
Mimetic distributed file storage is one of the achievements of mimetic defense theory in the field of distributed storage. Its goal is to provide highly robust file storage services for applications such as enterprise applications, cloud computing, and big data processing. On the premise of integrity and availability, the issue of data security and privacy can be effectively solved. Mimetic file storage is the latest product that combines high performance and high security.
Type | ||
Category | Metadata Server | Data Server |
Model | NTS-6002 | NTS-6004 |
CPU | Heterogeneous Node 1:INTEL XEON E5 2650 V4 Heterogeneous Node 2:ARM64 XGEN | INTEL XEON E5 2620 V4 Optional ARM64 XGEN |
Memory Cache Space | 512GB | 64GB |
Storage | 4 480G SSD | 24 3.5 inch SATA/SAS3 bays (up to 240T storage capacity) |
Network Interface | Four GbE Two 10GbE | Four GbE Two 10GbE |
Physical Form | 2U Rack | 4U Rack |
Power | 800W 1+1 Redundancy | 1200W 1+1 Redundancy |
Software System | Distributed Mimicry Secure Storage Metadata Management System V1.2 | Distributed Mimicry Secure Storage Metadata Management System V1.2 |
Safety Features
Ø Endogenous Safety
In the mimetic file storage, metadata nodes are constructed using Dynamic Heterogeneous Redundancy (DHR) architecture, and data nodes are deployed in a heterogeneous platform. By adopting the DHR architecture, the storage can not only bring high fault tolerance to the storage system, but also independently provide certain or indefinite threat defense capabilities, effectively solve uncertainties in the distributed storage domain based on unknown vulnerabilities, backdoors, Trojan horses or other threat security issues. This innovative storage architecture has endogenous security and can provide high security defense capabilities while ensuring the reliability and scalability of the storage system. Compared to the method of securing a storage system by attaching or stacking specialized security defense facilities, its endogenous nature of security has a better price/performance ratio in deployment.
Ø Threat Awareness
Traditional distributed storage systems need to introduce independent security protection measures to ensure data storage and read-write access security. Specific technologies include encryption authentication, virus detection, virus removal, Trojan removal, and intrusion detection. The endogenous security of the mimetic storage system is independent of the security technologies mentioned above. Therefore, traditional security technology can be used as a complementary measure to stabilize the mimic state storage defense effect, and can be merged to make the mimetic storage defense capability obtain super nonlinear improvement for greater safety gains.
Mimetic file storage has powerful threat awareness capabilities. Traditional security products such as firewalls and intrusion detection systems generally adopt a match detection mechanism, so they can only be aware of known threats. The threat-awareness of mimetic file storage is derived from the determination of the output of multiple parallel heterogeneous executables in the DHR architecture, which makes it effective not only for known threats, but also for uncertain threats.
Ø Independent Security Gains
Traditional distributed storage systems need to introduce independent security protection measures to ensure data storage and read-write access security. Specific technologies include encryption authentication, virus detection, virus removal, Trojan removal, and intrusion detection. The endogenous security of the mimetic storage system is independent of the security technologies mentioned above. Therefore, the traditional security technology can be used as a complementary measure to stabilize the mimic state storage defense effect, and can be merged to make the mimetic storage defense capability obtain super nonlinear improvement for greater safety gains.