CN109976668A - Data-erasure method, data deletion apparatus and computer readable storage medium - Google Patents
Data-erasure method, data deletion apparatus and computer readable storage medium Download PDFInfo
- Publication number
- CN109976668A CN109976668A CN201910194472.8A CN201910194472A CN109976668A CN 109976668 A CN109976668 A CN 109976668A CN 201910194472 A CN201910194472 A CN 201910194472A CN 109976668 A CN109976668 A CN 109976668A
- Authority
- CN
- China
- Prior art keywords
- data
- metadata
- file
- deleted
- fragment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
Abstract
The application is about a kind of data-erasure method, data deletion apparatus and computer readable storage medium.The data-erasure method is applied in distributed memory system, comprising: receives the data removal request that client is sent, the identification information comprising instruction file to be deleted in data removal request;The metadata of the corresponding file of identification information is stored into object existing for trunking mode, is returned to client and deletes successful information;Document analysis is gone out into fragment data according to the metadata read out, all fragment datas are deleted one by one;After all fragment datas of file are deleted, the metadata being stored in object is deleted.The data-erasure method of the application by the meta-data preservation of file to be deleted in the cluster, fragment data, which is parsed, according to metadata carries out asynchronous deletion, metadata is finally deleted, file deletion can safely and fast be carried out, while can also guarantee the consistency of the integrality deleted and data.
Description
Technical field
The application belongs to computer software application field more particularly to data-erasure method and data deletion apparatus.
Background technique
With the rapid development of network application, network information data amount is increasing, and mass data storage becomes increasingly
It is important, a kind of virtual disk technology maps virtual also more and more common, more commonly used at present in the application of secure data area
The mode of disk is creation image file and is mapped as virtual disk.
For data storage, the read-write and deletion of data are also common operation, for client, are deleted
It is better simply action type that read-write operation is compared in operation, ought to be rapidly completed.In the prior art when client is to image file
When carrying out delete operation, it can first confirm that the distribution of each fragment data of configuration file, then seriatim send delete command, it will
All fragment datas delete metadata object again after deleting, delete and return to operation successful information to client again after completing.
This deletion mode is to delete metadata again after obstruction deletes all fragment datas, very slow for big image file deletion, is accounted for
Erasing time is long, influences use of the user to other function, and when executing deletion program, may delete
The case where meeting accidentally quit in the process, delete operation stops, when user is again started up in application, client will not execute again
Same deletion task, causes to delete imperfect.
Summary of the invention
To overcome the problems in correlation technique, the application discloses a kind of data-erasure method and data deletion apparatus,
In the cluster by the meta-data preservation of file to be deleted, fragment data is parsed according to metadata and carries out asynchronous deletion, finally
Delete metadata, it can be ensured that delete information and do not lose, it is complete to guarantee that data are deleted.
According to the embodiment of the present application in a first aspect, providing a kind of data-erasure method, comprising:
The data removal request that client is sent is received, includes instruction file to be deleted in the data removal request
Identification information;
The metadata of the corresponding file of the identification information is stored into object existing for trunking mode, to institute
It states client and returns to the successful information of deletion;
The document analysis is gone out into fragment data according to the metadata read out, one by one by all fragment datas
It is deleted;
After all fragment datas of the file are deleted, the metadata saved in the object is deleted
It removes.
Optionally, the data-erasure method further include: setting timeouts, the metadata store in the object
It is read after reaching the timeouts.
Optionally, the data-erasure method further include: when being stored with multiple metadata in the object, according to
Storage time successively successively sequentially reads multiple metadata, and only reads one stored at first first number every time
According to.
Optionally, when there is metadata to be accessed, should be deleted but be performed not yet in the object is stored
Other described metadata of delete operation are marked as inaccessible.
Optionally, the object is saved in a manner of disaster tolerance, copies strange land data according to local data.
Optionally, described to preserve copy in object existing for trunking mode, the metadata refers to the metadata
Show the storage position of the copy.
Optionally, the fragment data of the file, which refers to, carries out Fragmentation data obtained to the file
Packet, the data packet at least two.
Optionally, the metadata indicates the storage location and file name of the fragment data.
Optionally, the file is image file, and the object is server.
According to a second aspect of the embodiments of the present invention, a kind of data deletion apparatus is provided, comprising:
Receiving module includes instruction in the data removal request for receiving the data removal request of client transmission
The identification information of file to be deleted;
Memory module exists for storing the metadata of the corresponding file of the identification information to trunking mode
Object in, Xiang Suoshu client, which returns, deletes successful information;
Parsing module, for the document analysis to be gone out fragment data according to the metadata read out, by all institutes
Fragment data is stated to be deleted one by one;
Metadata removing module, it is described for will be stored in after all fragment datas of the file are deleted
The metadata in object is deleted.
Optionally, the data deletion apparatus further include: time limit setting module, for setting timeouts, the member number
It is read after reaching the timeouts according to storage in the object.
Optionally, the data deletion apparatus further include: read module, for multiple described when being stored in the object
When metadata, multiple metadata are successively successively sequentially read according to storage time, and only read store at first every time
One metadata.
Optionally, when there is metadata to be accessed, should be deleted but be performed not yet in the object is stored
Other described metadata tokens of delete operation are inaccessible.
Optionally, the object is saved in a manner of disaster tolerance, copies strange land data according to local data.
Optionally, described to preserve copy in object existing for trunking mode, the metadata refers to the metadata
Show the storage position of the copy.
Optionally, the file is image file, and the object is server.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to executing data-erasure method described in above-mentioned any one.
According to a fourth aspect of the embodiments of the present invention, a kind of computer readable storage medium is provided, which is characterized in that described
Computer-readable recording medium storage has computer instruction, and the computer instruction, which is performed, realizes above-mentioned data deletion side
Method.
The technical solution that embodiments herein provides can include the following benefits:
The data-erasure method by receive client transmission data removal request after, by the member of corresponding file
Data are added to carry out the preservation of metadata in object existing for trunking mode, are then returned and are deleted successfully to client
Information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, deletes fragment data one by one,
Fragment data just carries out the deletion of metadata after deleting completely.Enable characterize data removal request metadata in time safely
It saves, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if deleting in execution
Accidentally quit when except operation, due to the presence of metadata, client still can execute the delete operation of fragment data again;And
It is just returned to user after Preservation Metadata and deletes successful information, carried out asynchronous deletion later, current money will not be occupied
Source, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
The technical solution that another embodiment of the application provides can include the following benefits:
Timeouts are set, start to execute delete operation after the meta-data preservation regular hour, it is ensured that data
It deletes and completes in time, metadata is substituted in time, excessive memory space will not be occupied;And according to different metadata
The chronological order being stored in object reads metadata, and the metadata first saved is allowed to first carry out delete operation, guarantees
All delete operations can be completed systematically, in addition, having not been performed the metadata of delete operation, be marked as to visit
It asks, maloperation can be prevented, avoid deleting chaotic.
The technical solution that another embodiment of the application provides can include the following benefits:
Meta-data preservation stores in entity object, and with trunking mode, so that the preservation of metadata is relatively reliable, is deleting
Except break down when, data can be restored in time, continue to delete, object is saved in a manner of disaster tolerance, be by metadata strange land into
Row backup further ensures that file is deleted complete even if local metadata damage, can also restore in time according to strange land data
Whole property.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The application can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart of data-erasure method shown according to an exemplary embodiment;
Fig. 2 is the flow chart of the data-erasure method shown according to an exemplary embodiment summarized;
Fig. 3 is the schematic diagram that data store in data-erasure method shown according to an exemplary embodiment;
Fig. 4 is the schematic diagram of data deletion apparatus shown according to an exemplary embodiment;
Fig. 5 is the schematic diagram of the data deletion apparatus shown according to an exemplary embodiment summarized;
Fig. 6 is a kind of block diagram of electronic equipment for executing data-erasure method shown according to an exemplary embodiment;
Fig. 7 is a kind of frame of data deletion apparatus for executing data-erasure method shown according to an exemplary embodiment
Figure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the application.
Fig. 1 is the flow chart of data-erasure method shown according to an exemplary embodiment, specifically includes following steps.
In step s101, the data removal request that client is sent is received, includes to indicate wait delete in data removal request
The identification information of the file removed.
In distributed memory system, when needing to carry out data deletion, user can be received first and is sent by client
Data removal request, corresponding file or data are deleted according to data removal request.It include instruction in data removal request
The identification information of file to be deleted, different files or data correspond to different identification informations, can be fast by this identification information
Speed navigates to the file to be deleted, thereby executing delete operation.
In step s 102, the metadata of the corresponding file of identification information is stored to object existing for trunking mode
In, it is returned to client and deletes successful information.
File mentioned above is, for example, image file, and mirror image is a kind of document form, and the format of image file is a kind of
Disk image format file-based, image file is similar with ZIP compressed package, it is by a series of specific files according to certain
Format is fabricated to single file, with facilitate user download and use, common image file format have ISO, BIN, IMG,
TAO,DAO,CIF,FCD.It may include many information in image file, such as system file, guidance file, partition table are believed
Breath etc., such image file can include all information of even one piece hard disk of a subregion.Image file includes first number
According to and fragment data, metadata be mainly describe data attribute information, for support as instruction storage location, historical data,
The functions such as resource lookup, file record, so metadata can indicate the storage location of fragment data.
In the present embodiment, after the data removal request for obtaining user, by the corresponding first number of the image file that need to be deleted
According to being stored into the object of one group of cluster, object is, for example, server, includes at least two-server in cluster.Metadata is deposited
It after storage is into server, i.e., is returned to client used by a user and deletes successful information, for the next item down behaviour can be executed
Make.Due to only deleting meta-data preservation successfully in server, that is, feedback user, the data of energy quick response user are deleted
Request.Then asynchronous delete processing is carried out to data again, effectively shortens the waiting time of client.And it saves to be deleted
The metadata of image file is to entity object, it can be ensured that delete operation is not lost, to realize complete delete.
In step s 103, document analysis is gone out by fragment data according to the metadata read out, by all fragment datas by
One is deleted.
The metadata saved is read, image file to be deleted is parsed by fragment data according to the metadata read out,
The corresponding fragment data of image file is found according to metadata, is then deleted one by one, the different of image file is thus completed
Step is deleted.The fragment data of file, which refers to, carries out Fragmentation data packet obtained to image file, and data packet is at least two
It is a.Metadata can indicate the storage location and corresponding file name of fragment data.
It is returned to user after deleting successful information, the asynchronous metadata for reading characterize data removal request in backstage, then
The fragment data that image file is parsed according to the metadata read out deletes all fragment datas, can hinder to avoid user terminal
Plug too long, the request of quick response user, while fragment data is deleted according to metadata, the deletion data also guaranteed it is consistent
Property and integrality.
In step S104, after all fragment datas of file are deleted, the metadata being stored in object is deleted.
It, at this time can be by the metadata of preservation after the corresponding all fragment datas of image file are deleted successfully one by one
It deletes, indicates the completion completely deleted an of image file, also illustrate that the complete execution of a data operation requests.At one
In embodiment, since metadata stores in the cluster, storage is safe and reliable, and information is not easy to lose, it is possible to repeat root
Document analysis is gone out to the operation of fragment data according to metadata, then deletes the fragment data parsed, until image file
When all fragment datas are sky, indicate that all fragment datas are clean to delete.For example, at least executing twice, second
Parsing operation can regard judgement operation as, judge whether all fragment datas are deleted, if clean there are also not deleting
, then once deleted, metadata is just deleted after all fragment datas are deleted successfully.It is performed a plurality of times according to metadata
Document analysis is gone out to the operation of fragment data, can to avoid when executing delete operation accidentally quit bring delete it is incomplete
Phenomenon, in addition, according to the data-erasure method of the present embodiment, it is next even if occurring the case where accidentally quit during deletion
It is secondary to enter in application, since metadata is also in store, so can also continue to execute deleting for the corresponding image file of the metadata
Except operation, guarantee to need the image file deleted that can completely delete.
In the present embodiment, metadata is stored in in object existing for trunking mode, and cluster refers to one group of service
Device runs one or more application programs, at least has two-server, and config failure switches between them, if a service
Device failure, by the processing of another server adapter tube application program.So the preservation of metadata has recovery capability, in time
There is the case where accidentally quit, can also restore in time, guarantees the integrality deleted.
In one embodiment, object is saved in a manner of disaster tolerance, copies strange land data according to local data.Data disaster tolerance
Refer to the data system for establishing a strange land, which is a local crucial available duplication using data.In local data
And entire application system, when there is disaster, system at least preserves the data of a available key business in strange land.The data
It can be the complete real-time duplication with local creation data, can also slightly fall behind than local data, but be centainly available.It adopts
Major technique is data backup and Data Replication Technology in Mobile.Object is saved in a manner of disaster tolerance, it can be ensured that and metadata is not lost,
It could also say that and guarantee that data removal request is not lost, achieve the effect that completely to delete image file, it is ensured that the consistency of data.
Meta-data preservation stores in entity object, and with trunking mode, so that the preservation of metadata is relatively reliable, is deleting
Except break down when, data can be restored in time, continue to delete, object is saved in a manner of disaster tolerance, be by metadata strange land into
Row backup further ensures that file is deleted complete even if local metadata damage, can also restore in time according to strange land data
Whole property.
In another embodiment, metadata preserves copy, metadata instruction in object existing for trunking mode
The storage position of copy.Metadata can save other a copy, metadata can indicate when storage is into server
The storage location of copy also further ensures the secure storage of metadata convenient for searching and restoring.
The data-erasure method by receive client transmission data removal request after, by the member of corresponding file
Data are added to carry out the preservation of metadata in object existing for trunking mode, are then returned and are deleted successfully to client
Information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, deletes fragment data one by one,
Fragment data just carries out the deletion of metadata after deleting completely.Enable characterize data removal request metadata in time safely
It saves, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if deleting in execution
Accidentally quit when except operation, due to the presence of metadata, client still can execute the delete operation of fragment data again;And
It is just returned to user after Preservation Metadata and deletes successful information, carried out asynchronous deletion later, current money will not be occupied
Source, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
Fig. 2 is the flow chart of the data-erasure method shown according to an exemplary embodiment summarized, is specifically included following
Step.
In step s 201, the data removal request that client is sent is received, includes to indicate wait delete in data removal request
The identification information of the file removed.
In step S202, the metadata of the corresponding file of identification information is stored to object existing for trunking mode
In, it is returned to client and deletes successful information.
In step S203, set timeouts, metadata stores in object reach timeouts after be read.
In step S204, when being stored with multiple metadata in object, according to storage time, successively successively sequence is read
Multiple metadata, and the metadata stored at first is only read every time.
In step S205, reads metadata and document analysis is gone out by fragment data according to metadata, by all fragment numbers
According to being deleted one by one.
In step S206, after all fragment datas of file are deleted, the metadata being stored in object is deleted.
The step of the present embodiment is the prioritization scheme of Fig. 1 embodiment, step S201-S202 and step S205-S206 and Fig. 1
S101-S104 is identical, and which is not described herein again.
In step S203, set timeouts, metadata stores in object reach timeouts after be read.
Fig. 1 embodiment describes quick, the complete delet method of image file, and the present embodiment is to erasing time and to delete
The further explanation carried out except sequence.In the present embodiment, timeouts, i.e. one section of regular time can be set, e.g.
It ten minutes, is just read ten minutes later when the storage of metadata in the server reaches, that is, starts the reading behaviour for carrying out metadata
Make, starts asynchronous deletion.Although image file is also to user feedback deletion successful information after Preservation Metadata
It is to need to carry out backstage deletion, a timeouts is set, it is ensured that the deletion of image file carries out automatically, and can stay
There is the regular hour that processor is made to execute other tasks.Specifically, it is corresponding that metadata can be read when reaching timeouts
Image file information, parse fragment data, then deleted one by one, first number of preservation is deleted after deletion
According to.
In step S204, when being stored with multiple metadata in object, according to storage time, successively successively sequence is read
Multiple metadata, and the metadata stored at first is only read every time.
User is when carrying out the deletion of image file, it may be necessary to which the deletion for carrying out multiple and different image files then can
Multiple data removal requests are generated, multiple metadata will be saved in object, if deleted simultaneously, may cause deletion
Confusion, so that deletion is imperfect, and if deletion sequentially, does not select a metadata arbitrarily and parsed and deleted, it can
The metadata stored at first can be caused not to be deleted always, thus in the present embodiment according to the sequencing of storage time successively into
Row is deleted.
In the present embodiment, when being stored with multiple metadata in object because user send to different image files
Data removal request have sequencing, that identical element data in the server storage be also have sequencing, first deposit
The metadata of storage should preferentially carry out delete operation, so successively successively sequence reads the metadata stored according to storage time,
And the metadata stored at first is only read every time, the deletion task an of image file is executed, then execute next.
In one embodiment, in a upper image file when executing delete operation, other image files should be located
In static condition, as long as so quilt not yet should be deleted still by being stored in object when there is a metadata to be accessed
Other metadata of execution delete operation should be marked as inaccessible.When reaching timeouts, start to read at first
One metadata of storage, if storing multiple metadata in succession, in fact it could happen that reach super in the metadata that second stores
It constantly prescribes a time limit, the delete operation of first metadata does not complete also, not can be carried out the access of second metadata at this time, can only wait
After can just read second metadata after the completion of the deletion of first metadata.So the starting of timeouts can will be set
It sets after a upper metadata is deleted successfully.
In the present embodiment, each delete operation can only execute the deletion of the corresponding image file of a metadata, repeatedly read
The metadata is taken, fragment data is parsed, then seriatim sends delete command, all fragment datas is waited to delete completion
It deletes metadata again afterwards, just executes the delete operation of the corresponding image file of next metadata later, guarantee delete operation
Stablize and executes.
The data-erasure method of the present embodiment sets timeouts, starts to execute after the meta-data preservation regular hour
Delete operation, it is ensured that the deletion of data is completed in time, and metadata is substituted in time, and it is empty will not to occupy excessive storage
Between;And metadata is read according to the chronological order in different metadata deposit objects, so that the metadata first saved
Delete operation can be first carried out, guarantees that all delete operations can be completed systematically, in addition, having not been performed delete operation
Metadata, be marked as inaccessible, maloperation can be prevented, avoid deleting chaotic.
Fig. 3 is the schematic diagram that data store in data-erasure method shown according to an exemplary embodiment.
As shown in figure 3, client 310 and meta data server 320 pass through metadata interface interaction, client 310 and number
According to server 330 by object interface interaction, the client-server service mode of networking is realized.Client 310 is responsible for upward
Layer application program provides file access services, and server is responsible for storage of the file on hard disk.
The storage management of file system is divided into the metadata management of file system and the fragment data management of file system, member
Metadata is stored in data server 320, fragment data is stored in data server 330, and meta data server 320 and data take
Data interaction may be implemented between business device 330.
Meta data server 320 is extended to multiple, i.e., exists with trunking mode, illustrated for two here.Data
The hard disk user of server 330 stores fragment data, and data server 330 is also extended to multiple.For example, there is 10 metadata
Server 320, each server have 5 hard disks, and file is to be distributed in different server by blocks of files (about 1MB or 4MB)
Different hard disks on, in addition, because there is the possibility of failure in any one server or hard disk, so, each file has one
A or multiple copies.
It include hard disk in each server, user stores data, and the hard disk of meta data server 320 is for storing member
Data are equivalent to catalogue, and the storage location of fragment data can be navigated to by the catalogue.The distribution situation of file is stored in member
In data server 320, and by the management of meta data server 320, i.e. meta data server 320 is responsible for file in data service
Storage and distribution on device 330, and adjustment (as increased, reducing, migrate), client 310 is known by meta data server 320
Distribution of the fragment data on data server 330.
It is stored with trunking mode, and preserves copy, then when one on one server of system discovery or server is hard
When disk fails, it can indicate that meta data server again backs up the data on the disabling devices, guarantee the reliability of file, and be
System self-healing is automatically, not need the participation of administrator.Thus the storage and interaction of data are completed.
Fig. 4 is the schematic diagram of data deletion apparatus shown according to an exemplary embodiment.The data deletion apparatus 400 packet
Include receiving module 401, memory module 402, parsing module 403 and metadata removing module 404.
Receiving module 401 is used to receive the data removal request of client transmission, in data removal request comprising instruction to
The identification information of the file of deletion;
Memory module 402 is for storing the metadata of the corresponding file of identification information to object existing for trunking mode
In, it is returned to client and deletes successful information;
Parsing module 403 is used to that document analysis to be gone out fragment data according to the metadata read out, by all fragment datas
It is deleted one by one;
Metadata removing module 404 is used for after all fragment datas of file are deleted, the member that will be stored in object
Data are deleted.
In one embodiment, file is image file, and object is server.Object is saved in a manner of disaster tolerance, Ke Yigen
Strange land data are copied according to local data.Metadata preserves copy, metadata instruction in object existing for trunking mode
The storage position of copy, it is possible thereby to guarantee the complete deletion of image file.
The data deletion apparatus of the present embodiment by receive client transmission data removal request after, will be corresponding
The metadata of file is added to carry out the preservation of metadata in object existing for trunking mode, is then deleted to client return
Except successful information, later again it is asynchronous carry out file delete operation, fragment data is parsed by metadata, one by one delete point
Sheet data, fragment data just carry out the deletion of metadata after deleting completely.Enable characterize data removal request metadata and
When safely save, until all fragment datas just delete metadata after the completion of deleting, it is ensured that file can be deleted completely, even if
The accidentally quit when executing delete operation, due to the presence of metadata, client still can execute the deletion of fragment data again
Operation;And just returned to user after Preservation Metadata and delete successful information, asynchronous deletion is carried out later, will not be occupied
Current resource, energy quick response data removal request are guaranteeing to guarantee completely to delete while quickly deletion.
Fig. 5 is the schematic diagram of the data deletion apparatus shown according to another exemplary embodiment.
Fig. 5 is the optimization to the embodiment of Fig. 4, and it includes receiving module 401, memory module which, which removes,
402, outside parsing module 403 and metadata removing module 404 further include: time limit setting module 501 and read module 502.
Time limit setting module 501 for setting timeouts, metadata stores in object reach timeouts after read
It takes.
Read module 502 is used for when being stored with multiple metadata in object, and according to storage time, successively successively sequence is read
Multiple metadata are taken, and only read the metadata stored at first every time.When there is metadata to be accessed, it is stored in object
In should be deleted but be performed not yet delete operation other metadata be marked as it is inaccessible.
The data deletion apparatus of the present embodiment sets timeouts, starts to execute after the meta-data preservation regular hour and delete
Except operation, it is ensured that the deletion of data is completed in time, and metadata is enabled to substitute in time, and it is empty will not to occupy excessive storage
Between;And metadata is read according to the chronological order in different metadata deposit objects, so that the metadata first saved
Delete operation can be first carried out, guarantees that all delete operations can be completed systematically, in addition, having not been performed delete operation
Metadata, be marked as inaccessible, maloperation can be prevented, avoid deleting chaotic.
About the data deletion apparatus in above-described embodiment, since the function of wherein modules has been deleted in above-mentioned data
Except being described in detail in the embodiment of method, relatively simple description has thus been carried out.
Fig. 6 is a kind of electronic equipment 1200 for above-mentioned data-erasure method shown according to an exemplary embodiment
Block diagram.For example, electronic equipment 1200 can be mobile phone, computer, digital broadcasting terminal, messaging device, game control
Platform processed, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig. 6, electronic equipment 1200 may include following one or more components: processing component 1202, memory
1204, electric power assembly 1206, multimedia component 1208, audio component 1210, the interface 1212 of input/output (I/O), sensor
Component 1214 and communication component 1216.
The integrated operation of the usual controlling electronic devices 1200 of processing component 1202, such as with display, call, data are logical
Letter, camera operation and record operate associated operation.Processing component 1202 may include one or more processors 1220
It executes instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1202 may include one or more
Module, convenient for the interaction between processing component 1202 and other assemblies.For example, processing component 1202 may include multimedia mould
Block, to facilitate the interaction between multimedia component 1208 and processing component 1202.
Memory 1204 is configured as storing various types of data to support the operation in electronic equipment 1200.These numbers
According to example include any application or method for being operated on electronic equipment 1200 instruction, contact data, electricity
Talk about book data, message, picture, video etc..Memory 1204 can be by any kind of volatibility or non-volatile memory device
Or their combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory
(EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory
(ROM), magnetic memory, flash memory, disk or CD.
Power supply module 1206 provides electric power for the various assemblies of electronic equipment 1200.Power supply module 1206 may include power supply
Management system, one or more power supplys and other with for electronic equipment 1200 generate, manage, and distribute associated group of electric power
Part.
Multimedia component 1208 includes the screen of one output interface of offer between the electronic equipment 1200 and user
Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching
Panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touchings
Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning
The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.In some embodiments
In, multimedia component 1208 includes a front camera and/or rear camera.When electronic equipment 1200 is in operation mould
Formula, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multi-medium data.
Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom energy
Power.
Audio component 1210 is configured as output and/or input audio signal.For example, audio component 1210 includes a wheat
Gram wind (MIC), when electronic equipment 1200 is in operation mode, when such as call mode, recording mode, and voice recognition mode, Mike
Wind is configured as receiving external audio signal.The received audio signal can be further stored in memory 1204 or via
Communication component 1216 is sent.In some embodiments, audio component 1210 further includes a loudspeaker, for exporting audio letter
Number.
I/O interface 1212 provides interface, above-mentioned peripheral interface module between processing component 1202 and peripheral interface module
It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and
Locking press button.
Sensor module 1214 includes one or more sensors, for providing the shape of various aspects for electronic equipment 1200
State assessment.For example, sensor module 1214 can detecte the state that opens/closes of electronic equipment 1200, component it is relatively fixed
Position, such as the component are the display and keypad of device 1200, and sensor module 1214 can also detect electronic equipment
1200 or 1,200 1 components of electronic equipment position change, the existence or non-existence that user contacts with electronic equipment 1200, electricity
The temperature change in sub- 1200 orientation of equipment or acceleration/deceleration and electronic equipment 1200.Sensor module 1214 may include approaching
Sensor is configured to detect the presence of nearby objects without any physical contact.Sensor module 1214 may be used also
To include optical sensor, such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, the biography
Sensor component 1214 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensing
Device.
Communication component 1216 is configured to facilitate the logical of wired or wireless way between electronic equipment 1200 and other equipment
Letter.Electronic equipment 1200 can access the wireless network based on communication standard, such as WiFi, carrier network (such as 2G, 3G, 4G or
5G) or their combination.In one exemplary embodiment, communication component 1216 is received via broadcast channel from external wide
The broadcast singal or broadcast related information of broadcast management system.In one exemplary embodiment, the communication component 1216 also wraps
Near-field communication (NFC) module is included, to promote short range communication.For example, it can be based on radio frequency identification (RFID) technology in NFC module, it is red
Outer data association (IrDA) technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, electronic equipment 1200 can by one or more application specific integrated circuit (ASIC),
Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array
It arranges (FPGA), controller, microcontroller, microprocessor or other electronic components to realize, for executing above-mentioned data-erasure method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 1204 of instruction, above-metioned instruction can be executed by the processor 1220 of electronic equipment 1200 to complete above-mentioned side
Method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, magnetic
Band, floppy disk and optical data storage devices etc..
Fig. 7 is a kind of data deletion apparatus for above-mentioned data-erasure method shown according to an exemplary embodiment
1300 block diagram.For example, device 1300 may be provided as a server.Referring to Fig. 7, device 1300 includes processing component
1322, it further comprise one or more processors, and the memory resource as representated by memory 1332, for storing
It can be by the instruction of the execution of processing component 1322, such as application program.The application program stored in memory 1332 may include
It is one or more each correspond to one group of instruction module.In addition, processing component 1322 is configured as executing instruction,
To execute above-mentioned data-erasure method.
Device 1300 can also include that a power supply module 1326 be configured as the power management of executive device 1300, and one
Wired or wireless network interface 1350 is configured as device 1300 being connected to network and input and output (I/O) interface
1358.Device 1300 can be operated based on the operating system for being stored in memory 1332, such as Windows ServerTM, Mac
OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the application
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or
Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following
Claim is pointed out.
It should be understood that the application is not limited to the precise structure that has been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.Scope of the present application is only limited by the accompanying claims.
Claims (10)
1. a kind of data-erasure method, which is characterized in that be applied in distributed memory system, comprising:
Receive the data removal request that client is sent, the mark comprising instruction file to be deleted in the data removal request
Information;
The metadata of the corresponding file of the identification information is stored into object existing for trunking mode, to the visitor
Family end, which returns, deletes successful information;
The document analysis is gone out into fragment data according to the metadata read out, all fragment datas are carried out one by one
It deletes;
After all fragment datas of the file are deleted, metadata deletion in the object will be saved.
2. data-erasure method according to claim 1, which is characterized in that further include:
Set timeouts, the metadata stores in the object reach the timeouts after be read.
3. data-erasure method according to claim 1, which is characterized in that further include:
When being stored with multiple metadata in the object, multiple members are successively successively sequentially read according to storage time
Data, and the metadata stored at first is only read every time.
4. data-erasure method according to claim 3, which is characterized in that when there is metadata to be accessed, be stored in institute
State in object should be deleted but be performed not yet delete operation other described metadata be marked as it is inaccessible.
5. data-erasure method according to claim 1, which is characterized in that the object is saved in a manner of disaster tolerance, according to
Local data copies strange land data.
6. data-erasure method according to claim 1, which is characterized in that the metadata is deposited described with trunking mode
Object in preserve copy, the metadata indicates the storage position of the copy.
7. data-erasure method according to claim 1, which is characterized in that the file is image file, the object
For server.
8. a kind of data deletion apparatus characterized by comprising
Receiving module includes to indicate wait delete in the data removal request for receiving the data removal request of client transmission
The identification information of the file removed;
Memory module, for storing the metadata of the corresponding file of the identification information to right existing for trunking mode
As in, Xiang Suoshu client, which returns, deletes successful information;
Parsing module, for the document analysis to be gone out fragment data according to the metadata read out, by all described points
Sheet data is deleted one by one;
Metadata removing module, for the object will to be stored in after all fragment datas of the file are deleted
In the metadata delete.
9. a kind of electronic equipment characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to executing data-erasure method described in the claims 1-7 any one.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to
It enables, the computer instruction, which is performed, realizes data-erasure method as described in any one of claim 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910194472.8A CN109976668A (en) | 2019-03-14 | 2019-03-14 | Data-erasure method, data deletion apparatus and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910194472.8A CN109976668A (en) | 2019-03-14 | 2019-03-14 | Data-erasure method, data deletion apparatus and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109976668A true CN109976668A (en) | 2019-07-05 |
Family
ID=67079007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910194472.8A Pending CN109976668A (en) | 2019-03-14 | 2019-03-14 | Data-erasure method, data deletion apparatus and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109976668A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110515553A (en) * | 2019-08-22 | 2019-11-29 | 苏州浪潮智能科技有限公司 | A kind of volume delet method and equipment |
CN110569219A (en) * | 2019-09-02 | 2019-12-13 | 深信服科技股份有限公司 | Fragment garbage processing method, user equipment, storage medium and device |
CN110888844A (en) * | 2019-11-22 | 2020-03-17 | 浪潮电子信息产业股份有限公司 | Data deleting method, system, equipment and computer readable storage medium |
CN111026751A (en) * | 2019-11-22 | 2020-04-17 | 北京金山云网络技术有限公司 | Processing method, device and system of distributed table and electronic equipment |
CN111596864A (en) * | 2020-05-22 | 2020-08-28 | 柏科数据技术(深圳)股份有限公司 | Method, device, server and storage medium for data delayed deletion |
CN112181911A (en) * | 2020-09-27 | 2021-01-05 | 广州三星通信技术研究有限公司 | File deletion method and equipment |
WO2021083005A1 (en) * | 2019-10-28 | 2021-05-06 | 中兴通讯股份有限公司 | Batch deletion method and apparatus for cache contents, device and readable storage medium |
CN113590605A (en) * | 2021-08-09 | 2021-11-02 | 北京达佳互联信息技术有限公司 | Data processing method and device, electronic equipment and storage medium |
WO2024021492A1 (en) * | 2022-07-29 | 2024-02-01 | 天翼云科技有限公司 | Data recycling method and apparatus, electronic device, and storage medium |
WO2024078107A1 (en) * | 2022-10-12 | 2024-04-18 | 北京奥星贝斯科技有限公司 | Database service execution method and apparatus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580437A (en) * | 2014-12-30 | 2015-04-29 | 创新科存储技术(深圳)有限公司 | Cloud storage client and high-efficiency data access method thereof |
CN104731516A (en) * | 2013-12-18 | 2015-06-24 | 腾讯科技(深圳)有限公司 | Method and device for accessing files and distributed storage system |
CN105630808A (en) * | 2014-10-31 | 2016-06-01 | 北京奇虎科技有限公司 | Distributed file system based file reading and writing method and node server |
CN105677250A (en) * | 2016-01-04 | 2016-06-15 | 北京百度网讯科技有限公司 | Method and device for updating object data in object storage system |
CN105718484A (en) * | 2014-12-04 | 2016-06-29 | 中兴通讯股份有限公司 | File writing method, file reading method, file deletion method, file query method and client |
-
2019
- 2019-03-14 CN CN201910194472.8A patent/CN109976668A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104731516A (en) * | 2013-12-18 | 2015-06-24 | 腾讯科技(深圳)有限公司 | Method and device for accessing files and distributed storage system |
CN105630808A (en) * | 2014-10-31 | 2016-06-01 | 北京奇虎科技有限公司 | Distributed file system based file reading and writing method and node server |
CN105718484A (en) * | 2014-12-04 | 2016-06-29 | 中兴通讯股份有限公司 | File writing method, file reading method, file deletion method, file query method and client |
CN104580437A (en) * | 2014-12-30 | 2015-04-29 | 创新科存储技术(深圳)有限公司 | Cloud storage client and high-efficiency data access method thereof |
CN105677250A (en) * | 2016-01-04 | 2016-06-15 | 北京百度网讯科技有限公司 | Method and device for updating object data in object storage system |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110515553A (en) * | 2019-08-22 | 2019-11-29 | 苏州浪潮智能科技有限公司 | A kind of volume delet method and equipment |
CN110569219A (en) * | 2019-09-02 | 2019-12-13 | 深信服科技股份有限公司 | Fragment garbage processing method, user equipment, storage medium and device |
CN110569219B (en) * | 2019-09-02 | 2023-05-12 | 深信服科技股份有限公司 | Method, user equipment, storage medium and device for processing fragmented garbage |
WO2021083005A1 (en) * | 2019-10-28 | 2021-05-06 | 中兴通讯股份有限公司 | Batch deletion method and apparatus for cache contents, device and readable storage medium |
CN111026751A (en) * | 2019-11-22 | 2020-04-17 | 北京金山云网络技术有限公司 | Processing method, device and system of distributed table and electronic equipment |
WO2021098260A1 (en) * | 2019-11-22 | 2021-05-27 | 浪潮电子信息产业股份有限公司 | Data deletion method, system and device, and computer readable storage medium |
CN110888844B (en) * | 2019-11-22 | 2023-03-21 | 浪潮电子信息产业股份有限公司 | Data deleting method, system, equipment and computer readable storage medium |
CN110888844A (en) * | 2019-11-22 | 2020-03-17 | 浪潮电子信息产业股份有限公司 | Data deleting method, system, equipment and computer readable storage medium |
CN111026751B (en) * | 2019-11-22 | 2024-02-09 | 北京金山云网络技术有限公司 | Distributed form processing method, device and system and electronic equipment |
CN111596864A (en) * | 2020-05-22 | 2020-08-28 | 柏科数据技术(深圳)股份有限公司 | Method, device, server and storage medium for data delayed deletion |
CN112181911A (en) * | 2020-09-27 | 2021-01-05 | 广州三星通信技术研究有限公司 | File deletion method and equipment |
CN113590605A (en) * | 2021-08-09 | 2021-11-02 | 北京达佳互联信息技术有限公司 | Data processing method and device, electronic equipment and storage medium |
CN113590605B (en) * | 2021-08-09 | 2024-01-05 | 北京达佳互联信息技术有限公司 | Data processing method, device, electronic equipment and storage medium |
WO2024021492A1 (en) * | 2022-07-29 | 2024-02-01 | 天翼云科技有限公司 | Data recycling method and apparatus, electronic device, and storage medium |
WO2024078107A1 (en) * | 2022-10-12 | 2024-04-18 | 北京奥星贝斯科技有限公司 | Database service execution method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109976668A (en) | Data-erasure method, data deletion apparatus and computer readable storage medium | |
US11275489B2 (en) | Method and apparatus for uploading photographed file | |
US10235444B2 (en) | Systems and methods for providing a user with a set of interactivity features locally on a user device | |
AU2014369911B2 (en) | Providing access to a cloud based content management system on a mobile device | |
JP2017531330A (en) | Picture processing method and apparatus | |
CN109359091B (en) | File management method, device, terminal and computer readable storage medium | |
CN105095025B (en) | Restore the method and device of deleted document in ext file system | |
CN105204959A (en) | Method and device for restoring deleted files in ext file system | |
KR20170097980A (en) | Method for sharing content group of electronic device and electronic device thereof | |
CN106231152B (en) | Transmit the method and device of picture | |
CN109684406A (en) | Method, apparatus, equipment and the storage medium of redis cluster backup data across computer room | |
JP7139444B2 (en) | Method, device, device, storage medium, and program for obtaining sample | |
CN109885255A (en) | Memory space method for sorting and device | |
CN108573034A (en) | Data back up method, device, computer equipment and readable storage medium storing program for executing | |
CN110309100B (en) | Snapshot object generation method and device | |
US20210133505A1 (en) | Method, device, and storage medium for retrieving samples | |
US11368531B2 (en) | Method and apparatus for file management | |
CN107231283A (en) | Information management method and device, message pre-head method and device | |
CN104933085B (en) | Update method, terminal and the server of e-book | |
WO2021259197A1 (en) | File processing method and apparatus, storage medium, and terminal | |
CN105808677A (en) | Picture deleting method and device and electronic equipment | |
CN102932513B (en) | A kind of business card maintaining method, device and equipment | |
CN114546992A (en) | Database migration method and device, storage medium and electronic equipment | |
CN110727808A (en) | Image processing method and device and terminal equipment | |
CN107483605A (en) | Document down loading method and device, storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |