Research on Mimic Data Processing Based on Mycat Middleware
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The security of the database system depends not only on the security of the database itself, but also on the security of the network environment and the operating system. The mimicry defense is proposed firstly by Academician WU Jiang-Xing based on the dynamic heterogeneous redundancy architecture, and the database is dependent on the environment. Security has changed from passive defense to active defense. This study uses Mycat as a database middleware, through the separated read and write of the database, the cluster's high availability, distributed transaction processing, fingerprinting SQL identification, to alleviate the data access and processing pressure of a single database. Mycat turns the database module into a heterogeneous dynamic redundancy mode, which enables database mimicking, enabling efficient, fast, and secure access and segmentation of data.

    Reference
    Related
    Cited by
Get Citation

曹国栋,倪明,喻卫东,王灿.基于Mycat的拟态数据库中间件研究.计算机系统应用,2019,28(10):219-225

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 14,2019
  • Revised:April 04,2019
  • Adopted:
  • Online: October 15,2019
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063