首页 | 本学科首页   官方微博 | 高级检索  
     

基于Mycat的拟态数据库中间件研究
引用本文:曹国栋,倪明,喻卫东,王灿.基于Mycat的拟态数据库中间件研究[J].计算机系统应用,2019,28(10):219-225.
作者姓名:曹国栋  倪明  喻卫东  王灿
作者单位:华东计算技术研究所, 上海 201808,华东计算技术研究所, 上海 201808,华东计算技术研究所, 上海 201808,华东计算技术研究所, 上海 201808
摘    要:数据库系统的安全不仅依赖于数据库本身的安全,还受网络环境和操作系统的安全性影响,拟态防御是邬江兴院士首次提出的基于动态异构冗余体系架构,协同实现数据库所依赖环境,使数据库安全由被动防御变为主动防御.本文通过Mycat作为数据库中间件,通过对数据库的读写分离,集群的高可用,分布式事务处理,对指纹化SQL识别,以减轻单一数据库的数据存取和处理压力.Mycat将数据库模块变为异构动态冗余模式,实现数据库拟态化,使数据高效,快速,安全的存取和切分.

关 键 词:拟态防御  Mycat  高集群  高可用  分布式处理  指纹SQL
收稿时间:2019/3/14 0:00:00
修稿时间:2019/4/4 0:00:00

Research on Mimic Data Processing Based on Mycat Middleware
CAO Guo-Dong,NI Ming,YU Wei-Dong and WANG Can.Research on Mimic Data Processing Based on Mycat Middleware[J].Computer Systems& Applications,2019,28(10):219-225.
Authors:CAO Guo-Dong  NI Ming  YU Wei-Dong and WANG Can
Affiliation:East China Institute of Computing Technology, Shanghai 201808, China,East China Institute of Computing Technology, Shanghai 201808, China,East China Institute of Computing Technology, Shanghai 201808, China and East China Institute of Computing Technology, Shanghai 201808, China
Abstract:The security of the database system depends not only on the security of the database itself, but also on the security of the network environment and the operating system. The mimicry defense is proposed firstly by Academician WU Jiang-Xing based on the dynamic heterogeneous redundancy architecture, and the database is dependent on the environment. Security has changed from passive defense to active defense. This study uses Mycat as a database middleware, through the separated read and write of the database, the cluster''s high availability, distributed transaction processing, fingerprinting SQL identification, to alleviate the data access and processing pressure of a single database. Mycat turns the database module into a heterogeneous dynamic redundancy mode, which enables database mimicking, enabling efficient, fast, and secure access and segmentation of data.
Keywords:cyberspace minic defense  Mycat  high cluster  high availability  distributed processing  fingerprint SQL
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号