Data tamper-proofing

Updated at: 2025-02-19 06:41

This topic outlines the data tamper-proofing principles within Simple Log Service.

Simple Log Service uses an append-only pattern for data storage to ensure tamper-proofing. The process is as follows:

  1. Users send data to the Simple Log Service gateway using the SDK or Logtail.

  2. The gateway performs signature verification and permission authentication. Authenticated data is forwarded to the backend worker.

  3. The backend worker writes the data to the Apsara Distributed File System in an append-only manner for data persistence. This process includes several key features:

    1. Files for each logstore are separated to prevent cross-interference.

    2. Raw data remains unchanged until deleted after time-to-live (TTL) expiration.

    3. The distributed file system is append-only and does not permit file modifications.

    4. Logstore encryption can be activated, allowing data to be stored in ciphertext within the distributed file system.

    5. Data is stored with multiple replicas and verified by cyclic redundancy check (CRC), preventing direct manipulation.

  4. After confirming data persistence, the worker reports success to the gateway, which then notifies the user.

    Feedback