Welcome to Scholar Publishing Group

International Journal of Neural Network, 2025, 4(1); doi: 10.38007/NN.2025.040103.

Exploration of State Machine-Driven Access Control Mechanisms in Distributed Systems

Author(s)

Yizhou Meng

Corresponding Author:
Yizhou Meng
Affiliation(s)

DRIVE VRI COGS 1010, Microsoft, Redmond, WA, 98052, USA

Abstract

Technologies such as the Internet of Things are driving exponential growth in data volume, while traditional data management systems are difficult to solve the challenges of "data chimney" and cross domain sharing due to inconsistent data standards. Data oriented architecture (DOA) focuses on data as its core and builds a data ecosystem through a data registry center (DRC). However, distributed DRC faces high availability and efficiency bottlenecks in high concurrency scenarios - traditional Raft protocol dual center solutions face issues such as storage and write congestion, and "leaderless" fault selection. High availability cluster solutions lack fault tolerance and recovery capabilities. This study proposes a distributed DRC high availability scheme based on role partitioning, which includes: dividing NameNode nodes into four roles: Leader, Inheritor, etc., clarifying read-write division of labor and fault takeover mechanism; Optimize Raft protocol to avoid "leaderless state" and shorten election time; Introducing vector clock to achieve data version conflict detection and improve synchronization efficiency. The experiment shows that the performance of the improved scheme is significantly improved: the write response delay is stable at 0.16-0.75ms (the highest in the original scheme was 4.74ms), the fault recovery time is reduced to 500-800ms (the original 1400-1700ms), and the synchronization time of the three/five machine mode is 428.4ms and 588.2ms, respectively. This solution solves the problem of multi machine data consistency through algorithm innovation, providing high-performance technical support for data sharing under DOA architecture.

Keywords

Distributed DRC; Role division; Raft protocol optimization; Data synchronization mechanism; High availability

Cite This Paper

Yizhou Meng. Exploration of State Machine-Driven Access Control Mechanisms in Distributed Systems. International Journal of Neural Network (2025), Vol. 4, Issue 1: 23-31. https://doi.org/10.38007/NN.2025.040103.

References

[1] Chen W, Zuo J, Su S, et al. A Privacy-Preserving Across-Institution Archives Utilization Framework and Implementation[J]. 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 2024:138-145. DOI:10. 1109/cyberscitech64112. 2024. 00031.

[2] Erics Z, Cirulis A. A Proposal foranAdaptive Compiler Architecture andDesign forPrecision andScale Aware Compilation Using Data-Oriented Design[C]//International Conference on Human-Computer Interaction. Springer, Cham, 2025. DOI:10. 1007/978-3-031-93848-1_13.

[3] Information V F A, Hnumanthappa L P, Information V F A, et al. Fractional social optimization-based migration and replica management algorithm for load balancing in distributed file system for cloud computing[J].  2024.

[4] Chen X. Research on AI-Based Multilingual Natural Language Processing Technology and Intelligent Voice Interaction System[J]. European Journal of AI, Computing & Informatics, 2025, 1(3): 47-53.

[5] Dean J, Ghemawat S. MapReduce: Simplified Data Processing on Large Clusters[C]//Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6. USENIX Association, 2004. DOI:10. 1145/1327452. 1327492.

[6] Banerji N, Choudhury B, Choudhury S. Design of a Context-Aware Distributed Service Registry and Discovery Mechanism for IoT[J]. IEEE Internet of Things Journal, 2024, 11(15):12. DOI:10. 1109/JIOT. 2024. 3395155.

[7] Wu X, Bao W. Research on the Design of a Blockchain Logistics Information Platform Based on Reputation Proof Consensus Algorithm[J]. Procedia Computer Science, 2025, 262: 973-981.

[8] Li W. Building a Credit Risk Data Management and Analysis System for Financial Markets Based on Blockchain Data Storage and Encryption Technology[C]//2025 3rd International Conference on Data Science and Network Security (ICDSNS). IEEE, 2025: 1-7.

[9] Zhang K. Research on the Application of Homomorphic Encryption-Based Machine Learning Privacy Protection Technology in Precision Marketing[C]//2025 3rd International Conference on Data Science and Network Security (ICDSNS). IEEE, 2025: 1-6.

[10] Tang X, Wu X, Bao W. Intelligent Prediction-Inventory-Scheduling Closed-Loop Nearshore Supply Chain Decision System[J]. Advances in Management and Intelligent Technologies, 2025, 1(4).

[11] Huang, J. (2025). Research on Resource Prediction and Load Balancing Strategies Based on Big Data in Cloud Computing Platform. Artificial Intelligence and Digital Technology, 2(1), 49-55.

[12] Zhou Y. Cost Control and Stability Improvement in Enterprise Level Infrastructure Optimization[J]. European Journal of Business, Economics & Management, 2025, 1(4): 70-76.

[13] Chen X. Research on the Integration of Voice Control Technology and Natural Language Processing in Smart Home Systems[J]. European Journal of Engineering and Technologies, 2025, 1(2): 41-48.

[14] Chen M. Research on the Application of Privacy-enhancing Technologies in AI-driven Automated Risk Detection Systems[J]. Advances in Computer and Communication, 2025, 6(4).

[15] Lyu N. Adaptive Generative AI Interfaces via EEG-based Cognitive State Recognition[J]. Advances in Computer and Communication, 2025, 6(4).