CN107395772B - Management method and management system for repeated data - Google Patents

Management method and management system for repeated data Download PDF

Info

Publication number
CN107395772B
CN107395772B CN201710805266.7A CN201710805266A CN107395772B CN 107395772 B CN107395772 B CN 107395772B CN 201710805266 A CN201710805266 A CN 201710805266A CN 107395772 B CN107395772 B CN 107395772B
Authority
CN
China
Prior art keywords
data
identification code
unique identification
cloud
private cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710805266.7A
Other languages
Chinese (zh)
Other versions
CN107395772A (en
Inventor
张贵勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201710805266.7A priority Critical patent/CN107395772B/en
Publication of CN107395772A publication Critical patent/CN107395772A/en
Application granted granted Critical
Publication of CN107395772B publication Critical patent/CN107395772B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0607Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method for managing repeated data, which comprises the following steps: carrying out unique identification calculation processing on the data to obtain a unique identification code; judging whether an identification code identical to the unique identification code exists in the private cloud or not; if not, storing the data corresponding to the unique identification code in the private cloud; judging whether the number of the identification codes which are the same as the unique identification codes in the public cloud is smaller than a preset number or not; if so, storing the data corresponding to the unique identification code in the public cloud until the number is equal to the preset number. The repeated data is only stored in one private cloud, so that the utilization rate of the storage space of the private cloud is improved. The preset number of repeated data is stored in the public cloud to ensure the reliability of the data, the utilization rate of a storage space can be improved within a certain number, and the system performance is improved. The application also discloses a management system and a computer readable storage medium of the repeated data, which have the beneficial effects.

Description

Management method and management system for repeated data
Technical Field
The present application relates to the field of computer technologies, and in particular, to a management method, a management system, and a computer-readable storage medium for managing duplicate data.
Background
With the development of cloud computing technology, enterprises store more and more data in the cloud, and in consideration of data security, enterprises prefer to store data in a private cloud, but at the same time, it is desirable to reduce the cost of storage resources for computing in a public cloud. Therefore, a hybrid cloud which fuses the private cloud and the hybrid cloud appears, and the public cloud and the private cloud are mixed and matched to obtain the best effect, so that the purposes of saving money and ensuring safety are achieved.
However, in the hybrid cloud system, the amount of stored data is increased continuously in a geometric series, but most of the data is redundant data, which not only occupies network bandwidth, but also wastes storage space, increases data management cost, and reduces system performance.
Therefore, how to deal with the increasing amount of data is a hot issue facing those skilled in the art.
Disclosure of Invention
The purpose of the application is to provide a management method, a management system and a computer readable storage medium for repeated data, wherein whether the data is repeated in a private cloud is judged through a unique identification code of the data, and the repeated data is only stored in one private cloud, so that the utilization rate of the storage space of the private cloud is improved. The method and the system have the advantages that the preset number of repeated data is stored in the public cloud to ensure the reliability of the data, the utilization rate of a storage space can be improved within a certain number, the data management cost is reduced, and the system performance is improved.
In order to solve the above technical problem, the present application provides a method for managing duplicate data, including:
carrying out unique identification calculation processing on the data to obtain a unique identification code;
judging whether an identification code identical to the unique identification code exists in the private cloud or not;
if not, storing the data corresponding to the unique identification code in the private cloud;
judging whether the number of the identification codes identical to the unique identification code in the public cloud is smaller than a preset number or not;
if so, storing the data corresponding to the unique identification code into the public cloud until the number is equal to the preset number.
Optionally, before determining whether the number of the identification codes identical to the unique identification code in the public cloud is less than a preset number, the method includes:
encrypting the unique identification code to obtain an encryption key;
and sending the encryption key to the public cloud for decryption to obtain the unique identification code.
Optionally, the method further includes:
and storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud.
Optionally, the unique identification code is a hash value.
The present application further provides a system for managing duplicate data, including:
the calculation module is used for performing unique identification calculation processing on the data to obtain a unique identification code;
the private cloud duplicate data query module is used for judging whether an identification code identical to the unique identification code exists in the private cloud;
the private cloud data storage module is used for storing the data corresponding to the unique identification code in the private cloud;
the public cloud repeated data query module is used for judging whether the number of the identification codes which are the same as the unique identification code in the public cloud is smaller than a preset number or not;
and the public cloud data storage module is used for storing the data corresponding to the unique identification code into the public cloud until the number is equal to the preset number.
Optionally, the method further includes:
the private cloud encryption module is used for encrypting the unique identification code to obtain an encryption key;
and the public cloud decryption module is used for sending the encryption key to the public cloud for decryption processing to obtain the unique identification code.
Optionally, the method further includes:
and the data address storage module is used for storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud.
The present application also provides a computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when executed by a processor, implements the steps of the method for managing duplicate data according to any one of claims 1 to 4.
The application provides a method for managing repeated data, which comprises the following steps: carrying out unique identification calculation processing on the data to obtain a unique identification code; judging whether an identification code identical to the unique identification code exists in the private cloud or not; if not, storing the data corresponding to the unique identification code in the private cloud; judging whether the number of the identification codes identical to the unique identification code in the public cloud is smaller than a preset number or not; if so, storing the data corresponding to the unique identification code into the public cloud until the number is equal to the preset number.
Whether the repeated data exist in the private cloud or not is judged through the unique identification code of the data, if the repeated data exist, only one copy of the repeated data is stored in the private cloud, the repeated data are stored in the public cloud in a preset number, the utilization rate of a storage space can be improved, and meanwhile, the repeated data are stored in the public cloud in the preset number, so that the reliability of the data can be ensured. When the repeated data in the private cloud is damaged, the normal repeated data can be replaced in the public cloud through the unique identification code.
Meanwhile, the unique identifier is encrypted in the embodiment, so that the data security in the public cloud can be ensured.
The present application further provides a management system for duplicate data and a computer-readable storage medium, which have the above beneficial effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for managing duplicate data according to an embodiment of the present disclosure;
fig. 2 is a flowchart of unique identification code transmission in a method for managing duplicate data according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a system for managing duplicate data according to an embodiment of the present disclosure;
fig. 4 is an implementation manner of a system for managing duplicate data according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a management method, a management system and a computer readable storage medium for repeated data, whether the data are repeated in the private cloud is judged through the unique identification code of the data, only one copy of the repeated data is stored in the private cloud, and the utilization rate of the storage space of the private cloud is improved. The method and the system have the advantages that the preset number of repeated data is stored in the public cloud to ensure the reliability of the data, the utilization rate of a storage space can be improved within a certain number, the data management cost is reduced, and the system performance is improved.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for managing duplicate data according to an embodiment of the present disclosure.
The embodiment provides a method for managing duplicate data, which may include:
s101, carrying out unique identification calculation processing on the data to obtain a unique identification code;
the step aims to calculate the unique identification code for the data, and it should be noted that the data are compared in the same way in the cloud computing storage system, namely the unique identification code of the data are compared to determine whether the data are the same or not. The unique identification code is theoretically that one unit of data has the unique identification code, so that the unique identification code of the repeated data is the same, and the repeated unit data can be uniquely determined in the storage system. Moreover, the unique identification code can not change with the number of unit data, that is, the data volume of the unit data can be represented by the fixed-length unique identification code no matter how much, so that the characteristic code can be conveniently sent and received in the cloud computing storage.
The unique identifier calculation process selects different calculation modes according to different selection of the unique identifier, which is not described herein. The unique identification code can be a hash value or an MD5 value, and has a low repetition rate, so that the unique unit data can be accurately determined.
The data refers to a unit of data, the unit may refer to a block or a segment, and the unit suitable for the storage system should be selected according to different storage systems, which is not described herein.
S102, judging whether an identification code identical to the unique identification code exists in the private cloud or not;
s103, if not, storing the data corresponding to the unique identification code in a private cloud;
on the basis of step S101, steps S102 to S103 are intended to determine whether duplicate data exists in the private cloud, and ensure that duplicate data is only stored in one copy in the private cloud.
The identification code is a unique identification code, which is a name that is distinguished from other unique identification codes in a public cloud, and is not different in nature.
The private cloud has high cost, and when the amount of stored data is huge, a large amount of redundant data exists, so that the utilization rate of a storage system of the private cloud is reduced, a large amount of storage resources are occupied, and normal operation of the system is not facilitated. Therefore, the repeated data in the data is judged, only one copy of the repeated data is stored in the private cloud, the quantity of the redundant data is reduced, and the utilization rate of the storage system is improved.
S104, judging whether the number of the identification codes which are the same as the unique identification codes in the public cloud is smaller than a preset number or not;
and S105, if so, storing the data corresponding to the unique identification code in the public cloud until the number is equal to the preset number.
On the basis of steps S101 to S103, steps S104 to S105 aim to keep the number of duplicate data stored in the public cloud at a preset number. And judging whether the repeated data needs to be supplemented into the preset quantity or not by using a judging method.
It should be noted that only one copy of the duplicate data is stored in the private cloud, and when a system is disturbed, problems such as data errors may occur, which causes the situation of loss of the duplicate data, so that one copy of the duplicate data is stored in the hybrid cloud system.
The public cloud is low in cost and has a large number of storage resources, so that repeated data can be stored in the public cloud. And a preset amount of duplicate data may be saved to maintain the reliability of data storage.
When the repeated data stored in the republic cloud is wrong, the stored repeated data can be found in the public cloud according to the unique identification code, so that the lost wrong data in the private cloud is recovered.
In summary, the embodiment determines whether the data is repeated in the private cloud through the unique identification code of the data, and only one copy of the repeated data is saved in the private cloud, so that the utilization rate of the storage space of the private cloud is improved. The method and the system have the advantages that the preset number of repeated data is stored in the public cloud to ensure the reliability of the data, the utilization rate of a storage space can be improved within a certain number, the data management cost is reduced, and the system performance is improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating transmission of a unique identifier for a management method of duplicate data according to an embodiment of the present disclosure.
In combination with the above embodiment, the present embodiment mainly makes an explanation on how to transmit the unique identification code in the previous embodiment, and other parts are substantially the same as those in the previous embodiment, and please refer to the previous embodiment for the same parts, which will not be described herein again.
The embodiment may include:
s201, encrypting the unique identification code to obtain an encryption key;
this step aims at encrypting the sweater identification code to obtain an encryption key.
The unique identification code is transmitted to the public cloud, and in order to prevent a third party from maliciously acquiring the sweater identification code and stealing data content, the unique identification code is encrypted to improve the data security.
S202, the encryption key is sent to a public cloud for decryption processing, and the unique identification code is obtained.
On the basis of step S201, this step aims to send the encryption key to the public cloud, and perform decryption processing to obtain the unique identification code. And performing related operation of repeated data in the public cloud according to the revealed unique identification code.
The encryption processing and the decryption processing may be performed in a suitable processing manner according to the actual application situation and the system performance of the cloud storage system, and details are not repeated here.
In combination with the previous embodiment, the present embodiment mainly performs an expansion on the address of the private cloud stored data in the previous embodiment, and other parts are substantially the same as those in the previous embodiment, and please refer to the previous embodiment for the same parts, which will not be described herein again.
The embodiment may include:
and storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud.
When the private cloud needs to search and store the repeated data, the repeated data can be found in the private cloud and the public cloud according to the stored address of the repeated data.
It is conceivable that, when the storage address of the data is sent and saved, the storage address of the data may be encrypted to maintain the security and reliability of the storage address during transmission.
The embodiment of the application provides a method for managing repeated data, whether the data are repeated in a private cloud is judged through a unique identification code of the data, only one copy of the repeated data is stored in the private cloud, and the utilization rate of a storage space of the private cloud is improved. The method and the system have the advantages that the preset number of repeated data is stored in the public cloud to ensure the reliability of the data, the utilization rate of a storage space can be improved within a certain number, the data management cost is reduced, and the system performance is improved.
In the following, a management system for duplicate data provided by an embodiment of the present application is introduced, and a management system for duplicate data described below and a management method for duplicate data described above may be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a management system for duplicate data according to an embodiment of the present disclosure.
The embodiment may include:
the calculation module 100 is used for performing unique identification calculation processing on the data to obtain a unique identification code;
the private cloud duplicate data query module 200 is configured to determine whether an identification code identical to the unique identification code exists in the private cloud;
the private cloud data storage module 300 is used for judging whether the number of the identification codes which are the same as the unique identification codes in the public cloud is smaller than a preset number;
the public cloud duplicate data query module 400 is configured to determine whether the number of data with the same unique identification code in the public cloud is smaller than a preset number;
and the public cloud data storage module 500 is used for storing the data corresponding to the unique identification code into the public cloud until the number is equal to the preset number.
The method can also comprise the following steps:
the private cloud encryption module is used for encrypting the unique identification code to obtain an encryption key;
and the public cloud decryption module is used for sending the encryption key to the public cloud for decryption processing to obtain the unique identification code.
The method can also comprise the following steps:
and the data address storage module is used for storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud.
Referring to fig. 4, fig. 4 is a diagram illustrating an embodiment of a system for managing duplicate data according to the present application.
The modules can be divided into modules in a private cloud and modules in a public cloud according to different storage system positions executed by the modules in the system. The private cloud includes: the cloud computing system comprises a computing module, a private cloud repeating data query module, a private cloud data storage module and a private cloud encryption module. Public clouds include: the cloud data query system comprises a public cloud repeated data query module, a public cloud data storage module and a public cloud decryption module.
In the following, a computer-readable storage medium provided by an embodiment of the present application is introduced, and a computer-readable storage medium described below and a management method of duplicate data described above may be referred to correspondingly.
The present embodiment provides a computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program, which when executed by a processor implements the steps of the method for managing duplicate data according to any one of claims 1 to 4.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The detailed description is given above of a management method, a management system, and a computer-readable storage medium system for managing duplicate data provided by the present application. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.

Claims (6)

1. A method for managing duplicate data, comprising:
carrying out unique identification calculation processing on the data to obtain a unique identification code;
judging whether an identification code identical to the unique identification code exists in the private cloud or not;
if not, storing the data corresponding to the unique identification code in the private cloud;
judging whether the number of the identification codes identical to the unique identification code in the public cloud is smaller than a preset number or not;
if so, storing the data corresponding to the unique identification code in the public cloud until the number is equal to the preset number;
storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud; when the storage address of the data is transmitted and stored, the storage address of the data is encrypted.
2. The management method according to claim 1, wherein before the determining whether the number of the identification codes identical to the unique identification code in the public cloud is less than a preset number, the method comprises:
encrypting the unique identification code to obtain an encryption key;
and sending the encryption key to the public cloud for decryption to obtain the unique identification code.
3. The management method according to claim 2, wherein the unique identification code is a hash value.
4. A system for managing duplicate data, comprising:
the calculation module is used for performing unique identification calculation processing on the data to obtain a unique identification code;
the private cloud duplicate data query module is used for judging whether an identification code identical to the unique identification code exists in the private cloud;
the private cloud data storage module is used for storing the data corresponding to the unique identification code in the private cloud;
the public cloud repeated data query module is used for judging whether the number of the identification codes which are the same as the unique identification code in the public cloud is smaller than a preset number or not;
the public cloud data storage module is used for storing the data corresponding to the unique identification code into the public cloud until the number is equal to the preset number;
the data address storage module is used for storing the address of the data corresponding to the unique identification code in the private cloud and the address of the data corresponding to the unique identification code in the public cloud in the private cloud; when the storage address of the data is transmitted and stored, the storage address of the data is encrypted.
5. The management system according to claim 4, further comprising:
the private cloud encryption module is used for encrypting the unique identification code to obtain an encryption key;
and the public cloud decryption module is used for sending the encryption key to the public cloud for decryption processing to obtain the unique identification code.
6. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, carries out the steps of the method for managing duplicate data according to any one of claims 1 to 3.
CN201710805266.7A 2017-09-08 2017-09-08 Management method and management system for repeated data Active CN107395772B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710805266.7A CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710805266.7A CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Publications (2)

Publication Number Publication Date
CN107395772A CN107395772A (en) 2017-11-24
CN107395772B true CN107395772B (en) 2020-09-18

Family

ID=60349488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710805266.7A Active CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Country Status (1)

Country Link
CN (1) CN107395772B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639778A (en) * 2018-11-29 2019-04-16 威富通科技有限公司 A kind of data transmission method, private clound and server
CN110677429A (en) * 2019-10-10 2020-01-10 青岛大学 File storage method and system, cloud device and terminal device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765848A (en) * 2015-04-17 2015-07-08 中国人民解放军空军航空大学 Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage
CN104932956A (en) * 2015-06-19 2015-09-23 华南理工大学 Big-data-oriented cloud disaster tolerant backup method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9559915B2 (en) * 2013-10-01 2017-01-31 Blazemeter Ltd. System and method for dynamically testing networked target systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765848A (en) * 2015-04-17 2015-07-08 中国人民解放军空军航空大学 Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage
CN104932956A (en) * 2015-06-19 2015-09-23 华南理工大学 Big-data-oriented cloud disaster tolerant backup method

Also Published As

Publication number Publication date
CN107395772A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN109831487B (en) Fragmented file verification method and terminal equipment
CN107294729B (en) Communication method and device between different nodes in block chain
CN108270874B (en) Application program updating method and device
CN111656343B (en) Error correction coding based shared blockchain data storage in trusted execution environments
CN113343305B (en) Intersection calculating method, device, equipment and storage medium of privacy data
CN112988764B (en) Data storage method, device, equipment and storage medium
CN109948347B (en) Data storage method and device, server and readable storage medium
CN110995513B (en) Data sending and receiving method in Internet of things system, internet of things equipment and platform
KR102363271B1 (en) Data security of shared blockchain data storage based on error correction codes
CN107592202B (en) Application signature method, device, system, computing equipment and storage medium
CN110263579B (en) Data processing method, system and related equipment
CN111108734B (en) Improved anti-replay device based on memory space interchange
CN110989922B (en) Distributed data storage method and system
CN110597824A (en) Data storage method and device based on block chain network
CN111262822B (en) File storage method, device, block link point and system
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
CN113032357A (en) File storage method and device and server
CN107395772B (en) Management method and management system for repeated data
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN108133026B (en) Multi-data processing method, system and storage medium
CN113300875A (en) Return source data verification method, server, system and storage medium
CN110618989B (en) Information processing method, information processing device and related products
CN114785805B (en) Data transmission method, device, electronic equipment and storage medium
US9734154B2 (en) Method and apparatus for storing a data file
CN110958285B (en) Data storage system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200824

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant