CN109976668A - Data-erasure method, data deletion apparatus and computer readable storage medium - Google Patents

Data-erasure method, data deletion apparatus and computer readable storage medium Download PDF

Info

Publication number
CN109976668A
CN109976668A CN201910194472.8A CN201910194472A CN109976668A CN 109976668 A CN109976668 A CN 109976668A CN 201910194472 A CN201910194472 A CN 201910194472A CN 109976668 A CN109976668 A CN 109976668A
Authority
CN
China
Prior art keywords
data
metadata
file
deleted
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910194472.8A
Other languages
Chinese (zh)
Inventor
高宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201910194472.8A priority Critical patent/CN109976668A/en
Publication of CN109976668A publication Critical patent/CN109976668A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Abstract

The application is about a kind of data-erasure method, data deletion apparatus and computer readable storage medium.The data-erasure method is applied in distributed memory system, comprising: receives the data removal request that client is sent, the identification information comprising instruction file to be deleted in data removal request;The metadata of the corresponding file of identification information is stored into object existing for trunking mode, is returned to client and deletes successful information;Document analysis is gone out into fragment data according to the metadata read out, all fragment datas are deleted one by one;After all fragment datas of file are deleted, the metadata being stored in object is deleted.The data-erasure method of the application by the meta-data preservation of file to be deleted in the cluster, fragment data, which is parsed, according to metadata carries out asynchronous deletion, metadata is finally deleted, file deletion can safely and fast be carried out, while can also guarantee the consistency of the integrality deleted and data.

Description

Data-erasure method, data deletion apparatus and computer readable storage medium
Technical field
The application belongs to computer software application field more particularly to data-erasure method and data deletion apparatus.
Background technique
With the rapid development of network application, network information data amount is increasing, and mass data storage becomes increasingly It is important, a kind of virtual disk technology maps virtual also more and more common, more commonly used at present in the application of secure data area The mode of disk is creation image file and is mapped as virtual disk.
For data storage, the read-write and deletion of data are also common operation, for client, are deleted It is better simply action type that read-write operation is compared in operation, ought to be rapidly completed.In the prior art when client is to image file When carrying out delete operation, it can first confirm that the distribution of each fragment data of configuration file, then seriatim send delete command, it will All fragment datas delete metadata object again after deleting, delete and return to operation successful information to client again after completing. This deletion mode is to delete metadata again after obstruction deletes all fragment datas, very slow for big image file deletion, is accounted for Erasing time is long, influences use of the user to other function, and when executing deletion program, may delete The case where meeting accidentally quit in the process, delete operation stops, when user is again started up in application, client will not execute again Same deletion task, causes to delete imperfect.
Summary of the invention
To overcome the problems in correlation technique, the application discloses a kind of data-erasure method and data deletion apparatus, In the cluster by the meta-data preservation of file to be deleted, fragment data is parsed according to metadata and carries out asynchronous deletion, finally Delete metadata, it can be ensured that delete information and do not lose, it is complete to guarantee that data are deleted.
According to the embodiment of the present application in a first aspect, providing a kind of data-erasure method, comprising:
The data removal request that client is sent is received, includes instruction file to be deleted in the data removal request Identification information;
The metadata of the corresponding file of the identification information is stored into object existing for trunking mode, to institute It states client and returns to the successful information of deletion;
The document analysis is gone out into fragment data according to the metadata read out, one by one by all fragment datas It is deleted;
After all fragment datas of the file are deleted, the metadata saved in the object is deleted It removes.
Optionally, the data-erasure method further include: setting timeouts, the metadata store in the object It is read after reaching the timeouts.
Optionally, the data-erasure method further include: when being stored with multiple metadata in the object, according to Storage time successively successively sequentially reads multiple metadata, and only reads one stored at first first number every time According to.
Optionally, when there is metadata to be accessed, should be deleted but be performed not yet in the object is stored Other described metadata of delete operation are marked as inaccessible.
Optionally, the object is saved in a manner of disaster tolerance, copies strange land data according to local data.
Optionally, described to preserve copy in object existing for trunking mode, the metadata refers to the metadata Show the storage position of the copy.
Optionally, the fragment data of the file, which refers to, carries out Fragmentation data obtained to the file Packet, the data packet at least two.
Optionally, the metadata indicates the storage location and file name of the fragment data.
Optionally, the file is image file, and the object is server.
According to a second aspect of the embodiments of the present invention, a kind of data deletion apparatus is provided, comprising:
Receiving module includes instruction in the data removal request for receiving the data removal request of client transmission The identification information of file to be deleted;
Memory module exists for storing the metadata of the corresponding file of the identification information to trunking mode Object in, Xiang Suoshu client, which returns, deletes successful information;
Parsing module, for the document analysis to be gone out fragment data according to the metadata read out, by all institutes Fragment data is stated to be deleted one by one;
Metadata removing module, it is described for will be stored in after all fragment datas of the file are deleted The metadata in object is deleted.
Optionally, the data deletion apparatus further include: time limit setting module, for setting timeouts, the member number It is read after reaching the timeouts according to storage in the object.
Optionally, the data deletion apparatus further include: read module, for multiple described when being stored in the object When metadata, multiple metadata are successively successively sequentially read according to storage time, and only read store at first every time One metadata.
Optionally, when there is metadata to be accessed, should be deleted but be performed not yet in the object is stored Other described metadata tokens of delete operation are inaccessible.
Optionally, the object is saved in a manner of disaster tolerance, copies strange land data according to local data.
Optionally, described to preserve copy in object existing for trunking mode, the metadata refers to the metadata Show the storage position of the copy.
Optionally, the file is image file, and the object is server.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to executing data-erasure method described in above-mentioned any one.
According to a fourth aspect of the embodiments of the present invention, a kind of computer readable storage medium is provided, which is characterized in that described Computer-readable recording medium storage has computer instruction, and the computer instruction, which is performed, realizes above-mentioned data deletion side Method.
The technical solution that embodiments herein provides can include the following benefits:
The data-erasure method by receive client transmission data removal request after, by the member of corresponding file Data are added to carry out the preservation of metadata in object existing for trunking mode, are then returned and are deleted successfully to client Information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, deletes fragment data one by one, Fragment data just carries out the deletion of metadata after deleting completely.Enable characterize data removal request metadata in time safely It saves, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if deleting in execution Accidentally quit when except operation, due to the presence of metadata, client still can execute the delete operation of fragment data again;And It is just returned to user after Preservation Metadata and deletes successful information, carried out asynchronous deletion later, current money will not be occupied Source, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
The technical solution that another embodiment of the application provides can include the following benefits:
Timeouts are set, start to execute delete operation after the meta-data preservation regular hour, it is ensured that data It deletes and completes in time, metadata is substituted in time, excessive memory space will not be occupied;And according to different metadata The chronological order being stored in object reads metadata, and the metadata first saved is allowed to first carry out delete operation, guarantees All delete operations can be completed systematically, in addition, having not been performed the metadata of delete operation, be marked as to visit It asks, maloperation can be prevented, avoid deleting chaotic.
The technical solution that another embodiment of the application provides can include the following benefits:
Meta-data preservation stores in entity object, and with trunking mode, so that the preservation of metadata is relatively reliable, is deleting Except break down when, data can be restored in time, continue to delete, object is saved in a manner of disaster tolerance, be by metadata strange land into Row backup further ensures that file is deleted complete even if local metadata damage, can also restore in time according to strange land data Whole property.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The application can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart of data-erasure method shown according to an exemplary embodiment;
Fig. 2 is the flow chart of the data-erasure method shown according to an exemplary embodiment summarized;
Fig. 3 is the schematic diagram that data store in data-erasure method shown according to an exemplary embodiment;
Fig. 4 is the schematic diagram of data deletion apparatus shown according to an exemplary embodiment;
Fig. 5 is the schematic diagram of the data deletion apparatus shown according to an exemplary embodiment summarized;
Fig. 6 is a kind of block diagram of electronic equipment for executing data-erasure method shown according to an exemplary embodiment;
Fig. 7 is a kind of frame of data deletion apparatus for executing data-erasure method shown according to an exemplary embodiment Figure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
Fig. 1 is the flow chart of data-erasure method shown according to an exemplary embodiment, specifically includes following steps.
In step s101, the data removal request that client is sent is received, includes to indicate wait delete in data removal request The identification information of the file removed.
In distributed memory system, when needing to carry out data deletion, user can be received first and is sent by client Data removal request, corresponding file or data are deleted according to data removal request.It include instruction in data removal request The identification information of file to be deleted, different files or data correspond to different identification informations, can be fast by this identification information Speed navigates to the file to be deleted, thereby executing delete operation.
In step s 102, the metadata of the corresponding file of identification information is stored to object existing for trunking mode In, it is returned to client and deletes successful information.
File mentioned above is, for example, image file, and mirror image is a kind of document form, and the format of image file is a kind of Disk image format file-based, image file is similar with ZIP compressed package, it is by a series of specific files according to certain Format is fabricated to single file, with facilitate user download and use, common image file format have ISO, BIN, IMG, TAO,DAO,CIF,FCD.It may include many information in image file, such as system file, guidance file, partition table are believed Breath etc., such image file can include all information of even one piece hard disk of a subregion.Image file includes first number According to and fragment data, metadata be mainly describe data attribute information, for support as instruction storage location, historical data, The functions such as resource lookup, file record, so metadata can indicate the storage location of fragment data.
In the present embodiment, after the data removal request for obtaining user, by the corresponding first number of the image file that need to be deleted According to being stored into the object of one group of cluster, object is, for example, server, includes at least two-server in cluster.Metadata is deposited It after storage is into server, i.e., is returned to client used by a user and deletes successful information, for the next item down behaviour can be executed Make.Due to only deleting meta-data preservation successfully in server, that is, feedback user, the data of energy quick response user are deleted Request.Then asynchronous delete processing is carried out to data again, effectively shortens the waiting time of client.And it saves to be deleted The metadata of image file is to entity object, it can be ensured that delete operation is not lost, to realize complete delete.
In step s 103, document analysis is gone out by fragment data according to the metadata read out, by all fragment datas by One is deleted.
The metadata saved is read, image file to be deleted is parsed by fragment data according to the metadata read out, The corresponding fragment data of image file is found according to metadata, is then deleted one by one, the different of image file is thus completed Step is deleted.The fragment data of file, which refers to, carries out Fragmentation data packet obtained to image file, and data packet is at least two It is a.Metadata can indicate the storage location and corresponding file name of fragment data.
It is returned to user after deleting successful information, the asynchronous metadata for reading characterize data removal request in backstage, then The fragment data that image file is parsed according to the metadata read out deletes all fragment datas, can hinder to avoid user terminal Plug too long, the request of quick response user, while fragment data is deleted according to metadata, the deletion data also guaranteed it is consistent Property and integrality.
In step S104, after all fragment datas of file are deleted, the metadata being stored in object is deleted.
It, at this time can be by the metadata of preservation after the corresponding all fragment datas of image file are deleted successfully one by one It deletes, indicates the completion completely deleted an of image file, also illustrate that the complete execution of a data operation requests.At one In embodiment, since metadata stores in the cluster, storage is safe and reliable, and information is not easy to lose, it is possible to repeat root Document analysis is gone out to the operation of fragment data according to metadata, then deletes the fragment data parsed, until image file When all fragment datas are sky, indicate that all fragment datas are clean to delete.For example, at least executing twice, second Parsing operation can regard judgement operation as, judge whether all fragment datas are deleted, if clean there are also not deleting , then once deleted, metadata is just deleted after all fragment datas are deleted successfully.It is performed a plurality of times according to metadata Document analysis is gone out to the operation of fragment data, can to avoid when executing delete operation accidentally quit bring delete it is incomplete Phenomenon, in addition, according to the data-erasure method of the present embodiment, it is next even if occurring the case where accidentally quit during deletion It is secondary to enter in application, since metadata is also in store, so can also continue to execute deleting for the corresponding image file of the metadata Except operation, guarantee to need the image file deleted that can completely delete.
In the present embodiment, metadata is stored in in object existing for trunking mode, and cluster refers to one group of service Device runs one or more application programs, at least has two-server, and config failure switches between them, if a service Device failure, by the processing of another server adapter tube application program.So the preservation of metadata has recovery capability, in time There is the case where accidentally quit, can also restore in time, guarantees the integrality deleted.
In one embodiment, object is saved in a manner of disaster tolerance, copies strange land data according to local data.Data disaster tolerance Refer to the data system for establishing a strange land, which is a local crucial available duplication using data.In local data And entire application system, when there is disaster, system at least preserves the data of a available key business in strange land.The data It can be the complete real-time duplication with local creation data, can also slightly fall behind than local data, but be centainly available.It adopts Major technique is data backup and Data Replication Technology in Mobile.Object is saved in a manner of disaster tolerance, it can be ensured that and metadata is not lost, It could also say that and guarantee that data removal request is not lost, achieve the effect that completely to delete image file, it is ensured that the consistency of data.
Meta-data preservation stores in entity object, and with trunking mode, so that the preservation of metadata is relatively reliable, is deleting Except break down when, data can be restored in time, continue to delete, object is saved in a manner of disaster tolerance, be by metadata strange land into Row backup further ensures that file is deleted complete even if local metadata damage, can also restore in time according to strange land data Whole property.
In another embodiment, metadata preserves copy, metadata instruction in object existing for trunking mode The storage position of copy.Metadata can save other a copy, metadata can indicate when storage is into server The storage location of copy also further ensures the secure storage of metadata convenient for searching and restoring.
The data-erasure method by receive client transmission data removal request after, by the member of corresponding file Data are added to carry out the preservation of metadata in object existing for trunking mode, are then returned and are deleted successfully to client Information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, deletes fragment data one by one, Fragment data just carries out the deletion of metadata after deleting completely.Enable characterize data removal request metadata in time safely It saves, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if deleting in execution Accidentally quit when except operation, due to the presence of metadata, client still can execute the delete operation of fragment data again;And It is just returned to user after Preservation Metadata and deletes successful information, carried out asynchronous deletion later, current money will not be occupied Source, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
Fig. 2 is the flow chart of the data-erasure method shown according to an exemplary embodiment summarized, is specifically included following Step.
In step s 201, the data removal request that client is sent is received, includes to indicate wait delete in data removal request The identification information of the file removed.
In step S202, the metadata of the corresponding file of identification information is stored to object existing for trunking mode In, it is returned to client and deletes successful information.
In step S203, set timeouts, metadata stores in object reach timeouts after be read.
In step S204, when being stored with multiple metadata in object, according to storage time, successively successively sequence is read Multiple metadata, and the metadata stored at first is only read every time.
In step S205, reads metadata and document analysis is gone out by fragment data according to metadata, by all fragment numbers According to being deleted one by one.
In step S206, after all fragment datas of file are deleted, the metadata being stored in object is deleted.
The step of the present embodiment is the prioritization scheme of Fig. 1 embodiment, step S201-S202 and step S205-S206 and Fig. 1 S101-S104 is identical, and which is not described herein again.
In step S203, set timeouts, metadata stores in object reach timeouts after be read.
Fig. 1 embodiment describes quick, the complete delet method of image file, and the present embodiment is to erasing time and to delete The further explanation carried out except sequence.In the present embodiment, timeouts, i.e. one section of regular time can be set, e.g. It ten minutes, is just read ten minutes later when the storage of metadata in the server reaches, that is, starts the reading behaviour for carrying out metadata Make, starts asynchronous deletion.Although image file is also to user feedback deletion successful information after Preservation Metadata It is to need to carry out backstage deletion, a timeouts is set, it is ensured that the deletion of image file carries out automatically, and can stay There is the regular hour that processor is made to execute other tasks.Specifically, it is corresponding that metadata can be read when reaching timeouts Image file information, parse fragment data, then deleted one by one, first number of preservation is deleted after deletion According to.
In step S204, when being stored with multiple metadata in object, according to storage time, successively successively sequence is read Multiple metadata, and the metadata stored at first is only read every time.
User is when carrying out the deletion of image file, it may be necessary to which the deletion for carrying out multiple and different image files then can Multiple data removal requests are generated, multiple metadata will be saved in object, if deleted simultaneously, may cause deletion Confusion, so that deletion is imperfect, and if deletion sequentially, does not select a metadata arbitrarily and parsed and deleted, it can The metadata stored at first can be caused not to be deleted always, thus in the present embodiment according to the sequencing of storage time successively into Row is deleted.
In the present embodiment, when being stored with multiple metadata in object because user send to different image files Data removal request have sequencing, that identical element data in the server storage be also have sequencing, first deposit The metadata of storage should preferentially carry out delete operation, so successively successively sequence reads the metadata stored according to storage time, And the metadata stored at first is only read every time, the deletion task an of image file is executed, then execute next.
In one embodiment, in a upper image file when executing delete operation, other image files should be located In static condition, as long as so quilt not yet should be deleted still by being stored in object when there is a metadata to be accessed Other metadata of execution delete operation should be marked as inaccessible.When reaching timeouts, start to read at first One metadata of storage, if storing multiple metadata in succession, in fact it could happen that reach super in the metadata that second stores It constantly prescribes a time limit, the delete operation of first metadata does not complete also, not can be carried out the access of second metadata at this time, can only wait After can just read second metadata after the completion of the deletion of first metadata.So the starting of timeouts can will be set It sets after a upper metadata is deleted successfully.
In the present embodiment, each delete operation can only execute the deletion of the corresponding image file of a metadata, repeatedly read The metadata is taken, fragment data is parsed, then seriatim sends delete command, all fragment datas is waited to delete completion It deletes metadata again afterwards, just executes the delete operation of the corresponding image file of next metadata later, guarantee delete operation Stablize and executes.
The data-erasure method of the present embodiment sets timeouts, starts to execute after the meta-data preservation regular hour Delete operation, it is ensured that the deletion of data is completed in time, and metadata is substituted in time, and it is empty will not to occupy excessive storage Between;And metadata is read according to the chronological order in different metadata deposit objects, so that the metadata first saved Delete operation can be first carried out, guarantees that all delete operations can be completed systematically, in addition, having not been performed delete operation Metadata, be marked as inaccessible, maloperation can be prevented, avoid deleting chaotic.
Fig. 3 is the schematic diagram that data store in data-erasure method shown according to an exemplary embodiment.
As shown in figure 3, client 310 and meta data server 320 pass through metadata interface interaction, client 310 and number According to server 330 by object interface interaction, the client-server service mode of networking is realized.Client 310 is responsible for upward Layer application program provides file access services, and server is responsible for storage of the file on hard disk.
The storage management of file system is divided into the metadata management of file system and the fragment data management of file system, member Metadata is stored in data server 320, fragment data is stored in data server 330, and meta data server 320 and data take Data interaction may be implemented between business device 330.
Meta data server 320 is extended to multiple, i.e., exists with trunking mode, illustrated for two here.Data The hard disk user of server 330 stores fragment data, and data server 330 is also extended to multiple.For example, there is 10 metadata Server 320, each server have 5 hard disks, and file is to be distributed in different server by blocks of files (about 1MB or 4MB) Different hard disks on, in addition, because there is the possibility of failure in any one server or hard disk, so, each file has one A or multiple copies.
It include hard disk in each server, user stores data, and the hard disk of meta data server 320 is for storing member Data are equivalent to catalogue, and the storage location of fragment data can be navigated to by the catalogue.The distribution situation of file is stored in member In data server 320, and by the management of meta data server 320, i.e. meta data server 320 is responsible for file in data service Storage and distribution on device 330, and adjustment (as increased, reducing, migrate), client 310 is known by meta data server 320 Distribution of the fragment data on data server 330.
It is stored with trunking mode, and preserves copy, then when one on one server of system discovery or server is hard When disk fails, it can indicate that meta data server again backs up the data on the disabling devices, guarantee the reliability of file, and be System self-healing is automatically, not need the participation of administrator.Thus the storage and interaction of data are completed.
Fig. 4 is the schematic diagram of data deletion apparatus shown according to an exemplary embodiment.The data deletion apparatus 400 packet Include receiving module 401, memory module 402, parsing module 403 and metadata removing module 404.
Receiving module 401 is used to receive the data removal request of client transmission, in data removal request comprising instruction to The identification information of the file of deletion;
Memory module 402 is for storing the metadata of the corresponding file of identification information to object existing for trunking mode In, it is returned to client and deletes successful information;
Parsing module 403 is used to that document analysis to be gone out fragment data according to the metadata read out, by all fragment datas It is deleted one by one;
Metadata removing module 404 is used for after all fragment datas of file are deleted, the member that will be stored in object Data are deleted.
In one embodiment, file is image file, and object is server.Object is saved in a manner of disaster tolerance, Ke Yigen Strange land data are copied according to local data.Metadata preserves copy, metadata instruction in object existing for trunking mode The storage position of copy, it is possible thereby to guarantee the complete deletion of image file.
The data deletion apparatus of the present embodiment by receive client transmission data removal request after, will be corresponding The metadata of file is added to carry out the preservation of metadata in object existing for trunking mode, is then deleted to client return Except successful information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, one by one delete point Sheet data, fragment data just carry out the deletion of metadata after deleting completely.Enable characterize data removal request metadata and When safely save, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if The accidentally quit when executing delete operation, due to the presence of metadata, client still can execute the deletion of fragment data again Operation;And just returned to user after Preservation Metadata and delete successful information, asynchronous deletion is carried out later, will not be occupied Current resource, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
Fig. 5 is the schematic diagram of the data deletion apparatus shown according to another exemplary embodiment.
Fig. 5 is the optimization to the embodiment of Fig. 4, and it includes receiving module 401, memory module which, which removes, 402, outside parsing module 403 and metadata removing module 404 further include: time limit setting module 501 and read module 502.
Time limit setting module 501 for setting timeouts, metadata stores in object reach timeouts after read It takes.
Read module 502 is used for when being stored with multiple metadata in object, and according to storage time, successively successively sequence is read Multiple metadata are taken, and only read the metadata stored at first every time.When there is metadata to be accessed, it is stored in object In should be deleted but be performed not yet delete operation other metadata be marked as it is inaccessible.
The data deletion apparatus of the present embodiment sets timeouts, starts to execute after the meta-data preservation regular hour and delete Except operation, it is ensured that the deletion of data is completed in time, and metadata is enabled to substitute in time, and it is empty will not to occupy excessive storage Between;And metadata is read according to the chronological order in different metadata deposit objects, so that the metadata first saved Delete operation can be first carried out, guarantees that all delete operations can be completed systematically, in addition, having not been performed delete operation Metadata, be marked as inaccessible, maloperation can be prevented, avoid deleting chaotic.
About the data deletion apparatus in above-described embodiment, since the function of wherein modules has been deleted in above-mentioned data Except being described in detail in the embodiment of method, relatively simple description has thus been carried out.
Fig. 6 is a kind of electronic equipment 1200 for above-mentioned data-erasure method shown according to an exemplary embodiment Block diagram.For example, electronic equipment 1200 can be mobile phone, computer, digital broadcasting terminal, messaging device, game control Platform processed, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig. 6, electronic equipment 1200 may include following one or more components: processing component 1202, memory 1204, electric power assembly 1206, multimedia component 1208, audio component 1210, the interface 1212 of input/output (I/O), sensor Component 1214 and communication component 1216.
The integrated operation of the usual controlling electronic devices 1200 of processing component 1202, such as with display, call, data are logical Letter, camera operation and record operate associated operation.Processing component 1202 may include one or more processors 1220 It executes instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1202 may include one or more Module, convenient for the interaction between processing component 1202 and other assemblies.For example, processing component 1202 may include multimedia mould Block, to facilitate the interaction between multimedia component 1208 and processing component 1202.
Memory 1204 is configured as storing various types of data to support the operation in electronic equipment 1200.These numbers According to example include any application or method for being operated on electronic equipment 1200 instruction, contact data, electricity Talk about book data, message, picture, video etc..Memory 1204 can be by any kind of volatibility or non-volatile memory device Or their combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
Power supply module 1206 provides electric power for the various assemblies of electronic equipment 1200.Power supply module 1206 may include power supply Management system, one or more power supplys and other with for electronic equipment 1200 generate, manage, and distribute associated group of electric power Part.
Multimedia component 1208 includes the screen of one output interface of offer between the electronic equipment 1200 and user Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching Panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touchings Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.In some embodiments In, multimedia component 1208 includes a front camera and/or rear camera.When electronic equipment 1200 is in operation mould Formula, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multi-medium data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom energy Power.
Audio component 1210 is configured as output and/or input audio signal.For example, audio component 1210 includes a wheat Gram wind (MIC), when electronic equipment 1200 is in operation mode, when such as call mode, recording mode, and voice recognition mode, Mike Wind is configured as receiving external audio signal.The received audio signal can be further stored in memory 1204 or via Communication component 1216 is sent.In some embodiments, audio component 1210 further includes a loudspeaker, for exporting audio letter Number.
I/O interface 1212 provides interface, above-mentioned peripheral interface module between processing component 1202 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1214 includes one or more sensors, for providing the shape of various aspects for electronic equipment 1200 State assessment.For example, sensor module 1214 can detecte the state that opens/closes of electronic equipment 1200, component it is relatively fixed Position, such as the component are the display and keypad of device 1200, and sensor module 1214 can also detect electronic equipment 1200 or 1,200 1 components of electronic equipment position change, the existence or non-existence that user contacts with electronic equipment 1200, electricity The temperature change in sub- 1200 orientation of equipment or acceleration/deceleration and electronic equipment 1200.Sensor module 1214 may include approaching Sensor is configured to detect the presence of nearby objects without any physical contact.Sensor module 1214 may be used also To include optical sensor, such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, the biography Sensor component 1214 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensing Device.
Communication component 1216 is configured to facilitate the logical of wired or wireless way between electronic equipment 1200 and other equipment Letter.Electronic equipment 1200 can access the wireless network based on communication standard, such as WiFi, carrier network (such as 2G, 3G, 4G or 5G) or their combination.In one exemplary embodiment, communication component 1216 is received via broadcast channel from external wide The broadcast singal or broadcast related information of broadcast management system.In one exemplary embodiment, the communication component 1216 also wraps Near-field communication (NFC) module is included, to promote short range communication.For example, it can be based on radio frequency identification (RFID) technology in NFC module, it is red Outer data association (IrDA) technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, electronic equipment 1200 can by one or more application specific integrated circuit (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array It arranges (FPGA), controller, microcontroller, microprocessor or other electronic components to realize, for executing above-mentioned data-erasure method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1204 of instruction, above-metioned instruction can be executed by the processor 1220 of electronic equipment 1200 to complete above-mentioned side Method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, magnetic Band, floppy disk and optical data storage devices etc..
Fig. 7 is a kind of data deletion apparatus for above-mentioned data-erasure method shown according to an exemplary embodiment 1300 block diagram.For example, device 1300 may be provided as a server.Referring to Fig. 7, device 1300 includes processing component 1322, it further comprise one or more processors, and the memory resource as representated by memory 1332, for storing It can be by the instruction of the execution of processing component 1322, such as application program.The application program stored in memory 1332 may include It is one or more each correspond to one group of instruction module.In addition, processing component 1322 is configured as executing instruction, To execute above-mentioned data-erasure method.
Device 1300 can also include that a power supply module 1326 be configured as the power management of executive device 1300, and one Wired or wireless network interface 1350 is configured as device 1300 being connected to network and input and output (I/O) interface 1358.Device 1300 can be operated based on the operating system for being stored in memory 1332, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the application Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following Claim is pointed out.
It should be understood that the application is not limited to the precise structure that has been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.Scope of the present application is only limited by the accompanying claims.

Claims (10)

1. a kind of data-erasure method, which is characterized in that be applied in distributed memory system, comprising:
Receive the data removal request that client is sent, the mark comprising instruction file to be deleted in the data removal request Information;
The metadata of the corresponding file of the identification information is stored into object existing for trunking mode, to the visitor Family end, which returns, deletes successful information;
The document analysis is gone out into fragment data according to the metadata read out, all fragment datas are carried out one by one It deletes;
After all fragment datas of the file are deleted, metadata deletion in the object will be saved.
2. data-erasure method according to claim 1, which is characterized in that further include:
Set timeouts, the metadata stores in the object reach the timeouts after be read.
3. data-erasure method according to claim 1, which is characterized in that further include:
When being stored with multiple metadata in the object, multiple members are successively successively sequentially read according to storage time Data, and the metadata stored at first is only read every time.
4. data-erasure method according to claim 3, which is characterized in that when there is metadata to be accessed, be stored in institute State in object should be deleted but be performed not yet delete operation other described metadata be marked as it is inaccessible.
5. data-erasure method according to claim 1, which is characterized in that the object is saved in a manner of disaster tolerance, according to Local data copies strange land data.
6. data-erasure method according to claim 1, which is characterized in that the metadata is deposited described with trunking mode Object in preserve copy, the metadata indicates the storage position of the copy.
7. data-erasure method according to claim 1, which is characterized in that the file is image file, the object For server.
8. a kind of data deletion apparatus characterized by comprising
Receiving module includes to indicate wait delete in the data removal request for receiving the data removal request of client transmission The identification information of the file removed;
Memory module, for storing the metadata of the corresponding file of the identification information to right existing for trunking mode As in, Xiang Suoshu client, which returns, deletes successful information;
Parsing module, for the document analysis to be gone out fragment data according to the metadata read out, by all described points Sheet data is deleted one by one;
Metadata removing module, for the object will to be stored in after all fragment datas of the file are deleted In the metadata delete.
9. a kind of electronic equipment characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to executing data-erasure method described in the claims 1-7 any one.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, the computer instruction, which is performed, realizes data-erasure method as described in any one of claim 1 to 7.
CN201910194472.8A 2019-03-14 2019-03-14 Data-erasure method, data deletion apparatus and computer readable storage medium Pending CN109976668A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910194472.8A CN109976668A (en) 2019-03-14 2019-03-14 Data-erasure method, data deletion apparatus and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910194472.8A CN109976668A (en) 2019-03-14 2019-03-14 Data-erasure method, data deletion apparatus and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109976668A true CN109976668A (en) 2019-07-05

Family

ID=67079007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910194472.8A Pending CN109976668A (en) 2019-03-14 2019-03-14 Data-erasure method, data deletion apparatus and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109976668A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110515553A (en) * 2019-08-22 2019-11-29 苏州浪潮智能科技有限公司 A kind of volume delet method and equipment
CN110569219A (en) * 2019-09-02 2019-12-13 深信服科技股份有限公司 Fragment garbage processing method, user equipment, storage medium and device
CN110888844A (en) * 2019-11-22 2020-03-17 浪潮电子信息产业股份有限公司 Data deleting method, system, equipment and computer readable storage medium
CN111026751A (en) * 2019-11-22 2020-04-17 北京金山云网络技术有限公司 Processing method, device and system of distributed table and electronic equipment
CN111596864A (en) * 2020-05-22 2020-08-28 柏科数据技术(深圳)股份有限公司 Method, device, server and storage medium for data delayed deletion
CN112181911A (en) * 2020-09-27 2021-01-05 广州三星通信技术研究有限公司 File deletion method and equipment
WO2021083005A1 (en) * 2019-10-28 2021-05-06 中兴通讯股份有限公司 Batch deletion method and apparatus for cache contents, device and readable storage medium
CN113590605A (en) * 2021-08-09 2021-11-02 北京达佳互联信息技术有限公司 Data processing method and device, electronic equipment and storage medium
WO2024021492A1 (en) * 2022-07-29 2024-02-01 天翼云科技有限公司 Data recycling method and apparatus, electronic device, and storage medium
WO2024078107A1 (en) * 2022-10-12 2024-04-18 北京奥星贝斯科技有限公司 Database service execution method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580437A (en) * 2014-12-30 2015-04-29 创新科存储技术(深圳)有限公司 Cloud storage client and high-efficiency data access method thereof
CN104731516A (en) * 2013-12-18 2015-06-24 腾讯科技(深圳)有限公司 Method and device for accessing files and distributed storage system
CN105630808A (en) * 2014-10-31 2016-06-01 北京奇虎科技有限公司 Distributed file system based file reading and writing method and node server
CN105677250A (en) * 2016-01-04 2016-06-15 北京百度网讯科技有限公司 Method and device for updating object data in object storage system
CN105718484A (en) * 2014-12-04 2016-06-29 中兴通讯股份有限公司 File writing method, file reading method, file deletion method, file query method and client

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104731516A (en) * 2013-12-18 2015-06-24 腾讯科技(深圳)有限公司 Method and device for accessing files and distributed storage system
CN105630808A (en) * 2014-10-31 2016-06-01 北京奇虎科技有限公司 Distributed file system based file reading and writing method and node server
CN105718484A (en) * 2014-12-04 2016-06-29 中兴通讯股份有限公司 File writing method, file reading method, file deletion method, file query method and client
CN104580437A (en) * 2014-12-30 2015-04-29 创新科存储技术(深圳)有限公司 Cloud storage client and high-efficiency data access method thereof
CN105677250A (en) * 2016-01-04 2016-06-15 北京百度网讯科技有限公司 Method and device for updating object data in object storage system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110515553A (en) * 2019-08-22 2019-11-29 苏州浪潮智能科技有限公司 A kind of volume delet method and equipment
CN110569219A (en) * 2019-09-02 2019-12-13 深信服科技股份有限公司 Fragment garbage processing method, user equipment, storage medium and device
CN110569219B (en) * 2019-09-02 2023-05-12 深信服科技股份有限公司 Method, user equipment, storage medium and device for processing fragmented garbage
WO2021083005A1 (en) * 2019-10-28 2021-05-06 中兴通讯股份有限公司 Batch deletion method and apparatus for cache contents, device and readable storage medium
CN111026751A (en) * 2019-11-22 2020-04-17 北京金山云网络技术有限公司 Processing method, device and system of distributed table and electronic equipment
WO2021098260A1 (en) * 2019-11-22 2021-05-27 浪潮电子信息产业股份有限公司 Data deletion method, system and device, and computer readable storage medium
CN110888844B (en) * 2019-11-22 2023-03-21 浪潮电子信息产业股份有限公司 Data deleting method, system, equipment and computer readable storage medium
CN110888844A (en) * 2019-11-22 2020-03-17 浪潮电子信息产业股份有限公司 Data deleting method, system, equipment and computer readable storage medium
CN111026751B (en) * 2019-11-22 2024-02-09 北京金山云网络技术有限公司 Distributed form processing method, device and system and electronic equipment
CN111596864A (en) * 2020-05-22 2020-08-28 柏科数据技术(深圳)股份有限公司 Method, device, server and storage medium for data delayed deletion
CN112181911A (en) * 2020-09-27 2021-01-05 广州三星通信技术研究有限公司 File deletion method and equipment
CN113590605A (en) * 2021-08-09 2021-11-02 北京达佳互联信息技术有限公司 Data processing method and device, electronic equipment and storage medium
CN113590605B (en) * 2021-08-09 2024-01-05 北京达佳互联信息技术有限公司 Data processing method, device, electronic equipment and storage medium
WO2024021492A1 (en) * 2022-07-29 2024-02-01 天翼云科技有限公司 Data recycling method and apparatus, electronic device, and storage medium
WO2024078107A1 (en) * 2022-10-12 2024-04-18 北京奥星贝斯科技有限公司 Database service execution method and apparatus

Similar Documents

Publication Publication Date Title
CN109976668A (en) Data-erasure method, data deletion apparatus and computer readable storage medium
US11275489B2 (en) Method and apparatus for uploading photographed file
US10235444B2 (en) Systems and methods for providing a user with a set of interactivity features locally on a user device
AU2014369911B2 (en) Providing access to a cloud based content management system on a mobile device
JP2017531330A (en) Picture processing method and apparatus
CN109359091B (en) File management method, device, terminal and computer readable storage medium
CN105095025B (en) Restore the method and device of deleted document in ext file system
CN105204959A (en) Method and device for restoring deleted files in ext file system
KR20170097980A (en) Method for sharing content group of electronic device and electronic device thereof
CN106231152B (en) Transmit the method and device of picture
CN109684406A (en) Method, apparatus, equipment and the storage medium of redis cluster backup data across computer room
JP7139444B2 (en) Method, device, device, storage medium, and program for obtaining sample
CN109885255A (en) Memory space method for sorting and device
CN108573034A (en) Data back up method, device, computer equipment and readable storage medium storing program for executing
CN110309100B (en) Snapshot object generation method and device
US20210133505A1 (en) Method, device, and storage medium for retrieving samples
US11368531B2 (en) Method and apparatus for file management
CN107231283A (en) Information management method and device, message pre-head method and device
CN104933085B (en) Update method, terminal and the server of e-book
WO2021259197A1 (en) File processing method and apparatus, storage medium, and terminal
CN105808677A (en) Picture deleting method and device and electronic equipment
CN102932513B (en) A kind of business card maintaining method, device and equipment
CN114546992A (en) Database migration method and device, storage medium and electronic equipment
CN110727808A (en) Image processing method and device and terminal equipment
CN107483605A (en) Document down loading method and device, storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705