CN112347119A - Data storage method and device applied to auditing system and computer equipment - Google Patents

Data storage method and device applied to auditing system and computer equipment Download PDF

Info

Publication number
CN112347119A
CN112347119A CN202010984519.3A CN202010984519A CN112347119A CN 112347119 A CN112347119 A CN 112347119A CN 202010984519 A CN202010984519 A CN 202010984519A CN 112347119 A CN112347119 A CN 112347119A
Authority
CN
China
Prior art keywords
database
hash value
access
user
result set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010984519.3A
Other languages
Chinese (zh)
Inventor
李绍平
龙文洁
莫金友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Anheng Information Security Technology Co Ltd
Original Assignee
Hangzhou Anheng Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Anheng Information Security Technology Co Ltd filed Critical Hangzhou Anheng Information Security Technology Co Ltd
Priority to CN202010984519.3A priority Critical patent/CN112347119A/en
Publication of CN112347119A publication Critical patent/CN112347119A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • G06F16/2448Query languages for particular applications; for extensibility, e.g. user defined types
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a data storage method, a data storage device and computer equipment applied to an auditing system, wherein the data storage method applied to the auditing system comprises the following steps: by acquiring a database operation logic statement, an access parameter and a return result set of an access user, generating an operation hash value according to the database operation logic statement, storing the database operation logic statement and the operation hash value in a user operation memory base, generating a result hash value according to the return result set, storing the return result set and the result hash value in a return result set memory base, and storing the access parameter, the operation hash value and the result hash value in an operation track database, the problem that the database auditing system in application in the related art stores a large amount of database operations, which causes the performance reduction of the database auditing system is solved, and the storage utilization rate and the performance of the database auditing system are improved.

Description

Data storage method and device applied to auditing system and computer equipment
Technical Field
The application relates to the field of database auditing systems, in particular to a data storage method and device applied to an auditing system and computer equipment.
Background
Database auditing is one of database security technologies, and the database security technologies mainly comprise: the system comprises a database missing scanning system, a database encryption system, a database firewall system, a data desensitization system and a database security audit system. Database auditing can record database activities on a network in real time, perform compliance management of fine-grained auditing on database operations, alarm risk behaviors suffered by the database, and block attack behaviors. The method is used for helping the user generate a compliance report and accident tracing source after the user visits the database through recording, analyzing and reporting the behavior of the user visiting the database, and meanwhile, network behavior records of the internal database and the external database are enhanced, and the safety of data assets is improved.
In the related technology, along with the improvement of the information value and the accessibility of the database and the characteristics of large database access data volume and operation repeatability, a large amount of database operations are stored in the application of the database auditing system, so that the performance of the database auditing system is reduced.
At present, no effective solution is provided for the problem that the database auditing system in the application of the related technology stores a large amount of database operations, which results in the performance reduction of the database auditing system.
Disclosure of Invention
The embodiment of the application provides a data storage method and device applied to an auditing system and computer equipment, and aims to at least solve the problem that the performance of a database auditing system is reduced due to the fact that a database auditing system in application in related technologies stores a large amount of database operations.
In a first aspect, an embodiment of the present application provides a data storage method applied to an auditing system, where the method includes:
acquiring a database operation logic statement, an access parameter and a return result set of an access user;
generating an operation hash value according to the database operation logic statement, and storing the database operation logic statement and the operation hash value in a user operation memory library;
generating a result hash value according to the returned result set, and storing the returned result set and the result hash value in a returned result set memory base;
storing the access parameter, the operation hash value, and the result hash value in an operation trajectory database.
In some embodiments, obtaining the database operation logic statement of the accessing user comprises:
acquiring a database operation request of the access user;
and converting the database operation request into a database operation logic statement.
In some embodiments, obtaining the database operation request and the access parameter of the accessing user comprises:
obtaining the access flow of the access user;
and determining the database operation request and the access parameter of the access user according to the access flow.
In some embodiments, access traffic of the accessing user is obtained; determining the database operation request and the access parameter of the access user according to the access flow comprises the following steps:
determining the access flow of the access user through the access flow of a mirror database;
and carrying out flow analysis on the access flow, and determining the database operation request and the access parameter of the access user.
In some of these embodiments, the method further comprises:
acquiring an input access parameter;
calling an operation hash value and a result hash value which are matched with the input access parameters from the operation track database;
according to the called operation hash value, obtaining a database operation logic statement matched with the called operation hash value from the user operation memory bank, and determining a database operation request corresponding to the called operation hash value according to the database operation logic statement;
and acquiring a returned result set matched with the called result hash value from the returned result set memory library according to the called result hash value.
In some embodiments, the access parameter of the accessing user comprises at least one item, and the input access parameter comprises at least one item.
In some embodiments, the operation hash value is set as a primary key in the user operation repository, and the result hash value is set as a primary key in the returned result set repository.
In a second aspect, an embodiment of the present application provides a data storage apparatus applied to an auditing system, where the apparatus includes: the device comprises an acquisition module, a generation module and a storage module;
the acquisition module is used for acquiring database operation logic statements, access parameters and a return result set of an access user;
the generating module is used for generating an operation hash value according to the database operation logic statement, storing the database operation logic statement and the operation hash value in a user operation memory library, generating a result hash value according to the returned result set, and storing the returned result set and the result hash value in a returned result set memory library;
the storage module is used for storing the access parameters, the operation hash values and the result hash values in an operation track database.
In a third aspect, the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the processor implements the data storage method applied to the auditing system as described above.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the data storage method applied to an auditing system as described above.
Compared with the related art, the data storage method applied to the auditing system provided by the embodiment of the application, by obtaining the database operation logic statement of the accessing user, the access parameter and the return result set, generating an operation hash value according to the database operation logic statement, and storing the database operation logic statement and the operation hash value in a user operation memory base, generating a result hash value according to the returned result set, storing the returned result set and the result hash value in a returned result set memory base, storing the access parameters, the operation hash values and the result hash values in an operation trace database, the problem that the performance of the database auditing system is reduced due to the fact that a database auditing system stores a large amount of database operations in related technology is solved, and the storage utilization rate and the performance of the database auditing system are improved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a first flowchart of a data storage method applied to an auditing system according to an embodiment of the application;
FIG. 2 is a flow chart of a method for obtaining database operation logic statements of an accessing user according to an embodiment of the application;
FIG. 3 is a flowchart of a first method for obtaining database operation requests and access parameters of an accessing user according to an embodiment of the present application;
FIG. 4 is a flowchart of a method for obtaining database operation requests and access parameters of an accessing user according to an embodiment of the present application;
FIG. 5 is a second flowchart of a data storage method applied to an auditing system according to an embodiment of the application;
FIG. 6 is a block diagram of a data storage device applied to an auditing system according to an embodiment of the present application;
fig. 7 is a schematic diagram of an internal structure of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The term "plurality" as referred to herein means two or more.
The data storage method applied to the auditing system is applied to a database auditing system, and is characterized in that a database operation logic statement and an operation hash value corresponding to the database operation logic statement are stored in a user operation memory base, a return result set and a result hash value corresponding to the return result set are stored in a return result set memory base, and access parameters, the operation hash value and the result hash value are stored in an operation track database, so that the storage space of the spatial database auditing system is saved, the problem of performance reduction of the database auditing system caused by a large amount of database operations stored in the database auditing system applied in the related technology is solved, and the storage utilization rate and the performance of the database auditing system are improved.
The present embodiment provides a data storage method applied to an auditing system, and fig. 1 is a first flowchart of a data storage method applied to an auditing system according to an embodiment of the present application, and as shown in fig. 1, the method includes the following steps:
step S101, obtaining database operation logic statements, access parameters and a return result set of an access user;
it should be noted that the database operation refers to a series of operations performed on data in a database, including reading data, writing data, updating or modifying data, deleting data, and the like, and a database operation logic statement is a database operation for an access user, which extracts words in SQL statement logic and finally organizes the words into a database operation logic statement, Structured Query Language (SQL), which is a database Query and programming Language for accessing data and querying, updating, and managing a relational database system.
Step S102, generating an operation hash value according to the database operation logic statement, and storing the database operation logic statement and the operation hash value in a user operation memory bank;
on one hand, as the database access characteristics are large data volume and operation repeatability, a large amount of repeated database operation request records of an access user are stored in a traditional database audit system or a database audit product, and the database logic statement of the access user realizes reduction and storage of the large amount of repeated database operation request records of the access user;
on the other hand, an operation hash value generated from a database logical statement is a method of creating a small digital "fingerprint" from any kind of data, that is, an input of arbitrary length (also called pre-map-image) is converted into an output of fixed length through a hash algorithm, that is, a hash value, and the conversion of the hash value is a compression map; it should be noted that the user operation memory includes, but is not limited to, a database logical statement and an operation hash value.
Step S103, generating a result hash value according to the returned result set, and storing the returned result set and the result hash value in a returned result set memory base;
the returned result set is a response generated by the database according to the database operation request of the access user; it should be noted that the returned result set memory base includes, but is not limited to, the returned result set and the result hash value.
Step S104, storing the access parameters, the operation hash values and the result hash values in an operation track database;
the access parameters, the operation hash values and the result hash values are stored in the operation track database, so that the operation hash values and the result hash values in the operation track database can be called by accessing the parameters in the later period when the operation records of the user are traced and the result set records are returned, meanwhile, the matched user operation in the user operation memory base can be further obtained according to the operation hash values, and the matched return result set in the return result set memory base can be obtained according to the result hash values.
Through the above steps S101 to S104, by utilizing the access characteristics of large data volume and repetitive operation of the database, the database logic statement of the access user and the operation hash value corresponding to the database logic statement are stored in the user operation memory library, the returned result set and the result hash value corresponding to the returned result set are stored in the returned result set memory library, the return stores the access parameters, the operation hash values and the result hash values in an operation trace database, compared with the traditional database auditing system which stores a large number of repeated database operation request records of access users, and the repeated returned result sets corresponding to the repeated database operation request records reduce the storage amount of the database auditing system in the aspects of user operation records and returned result sets, and improve the storage utilization rate and the performance of the database auditing system.
In some embodiments, fig. 2 is a flowchart of a method for obtaining a database operation logic statement of an accessing user according to an embodiment of the present application, and as shown in fig. 2, the method includes the following steps:
step S201, obtaining a database operation request of an access user; the obtained database operation request of the access user can be repeated database operation requests of the access user at different time points.
Step S202, converting the database operation request into a database operation logic statement;
the obtained database operation request is converted into a database operation logic statement, namely words in the database operation request and SQL statement logic are extracted and finally organized into the database operation logic statement, so that repeated database operation requests of an access user are converted into the database operation logic statement, and the database operation logic statement is stored instead of the repeated database operation requests of the access user, so that the storage space of the database auditing system is greatly saved.
In some embodiments, fig. 3 is a flowchart illustrating a first method for obtaining a database operation request and an access parameter of an access user according to an embodiment of the present application, as shown in fig. 3, where the method includes the following steps:
step S301, obtaining access flow of an access user;
step S302, according to the access flow, determining a database operation request and access parameters of an access user;
through the steps S301 to S302, the database operation request and the access parameter of the access user are obtained by obtaining the access traffic of the access user to the database, so that the actual access operation request and the actual access parameter of the access user can be conveniently and effectively obtained.
In some embodiments, fig. 4 is a flowchart illustrating a second method for obtaining a database operation request and an access parameter of an access user according to an embodiment of the present application, where as shown in fig. 4, the method includes the following steps:
step S401, determining the access flow of an access user through the access flow of a mirror database;
the mirror database is generated through database mirroring, the database mirroring is that the DBMS automatically copies the whole database or key data in the database to another disk according to the DBA requirement, and when the main database is updated, the DBMS automatically copies the updated data, namely, the DBMS automatically ensures the consistency of mirrored data and the main data.
Step S402, flow analysis is carried out on the access flow, and the database operation request and the access parameters of the access user are determined.
Through steps S401 to S402, considering that monitoring of the access traffic of the database is generally implemented by mirroring in the actual operation of the database, determining the access traffic of the access user by mirroring the database is more convenient and conforms to monitoring of the access traffic in the actual operation of the database.
The present embodiment provides a data storage method applied to an auditing system, and fig. 5 is a flowchart of a data storage method applied to an auditing system according to an embodiment of the present application, and as shown in fig. 5, the method further includes the following steps:
step S501, acquiring input access parameters, and calling an operation hash value and a result hash value matched with the input access parameters from an operation track database; the input access parameter may be one item or a combination of items.
Step S502, according to the called operation hash value, a database operation logic statement matched with the called operation hash value is obtained from a user operation memory base, and a database operation request corresponding to the called operation hash value is determined according to the database operation logic statement;
in step S503, a return result set matching the retrieved result hash value is acquired from the return result set memory base according to the retrieved result hash value.
Through steps S501 to S503, firstly, according to the input access parameter, an operation hash value and a result hash value matched with the input access parameter are obtained from the operation track database; secondly, a database operation logic statement matched with the called operation hash value can be obtained from the user operation memory base according to the operation hash value, a corresponding database operation request is further obtained, a return result set matched with the called result hash value is obtained from the return result set memory base according to the result hash value, a database operation request and a return result set corresponding to the input access parameter are finally obtained, and the database operation request and the return result set of the access user are traced.
In some embodiments, the access parameter of the access user comprises at least one item, and the input access parameter comprises at least one item; wherein the access parameter may be at least one of: request time, response time, request parameters, return results, source IP, user and source port; the access parameter may be at least one of: the method comprises the steps of requesting time, responding time, requesting parameters, returning results, a source IP, a user and a source port, and considering that input access parameters can be multi-dimensional combinations, and further database operation records can be traced through multiple dimensions, for example, input can be multi-dimensional combinations formed by responding time, the source IP and the user.
In some embodiments, the operation hash value is set as a primary key in the user operation memory bank, and the result hash value is set as a primary key in the returned result set memory bank; it should be noted that the primary key of the database refers to a combination of one or more columns, the value of which can uniquely identify each row in the table, and through which the physical integrity of the table can be enforced, the primary key is mainly used for association with the foreign key of other tables, and modification and deletion of the record; therefore, in the embodiment of the application, the operation hash value in the user operation memory base is set as the primary key, and the result hash value in the returned result set memory base is set as the primary key, so that the audit result of the database audit system can be quickly associated during tracing, and the efficiency is high.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
The present embodiment further provides a data storage device applied to an auditing system, where the data storage device is used to implement the foregoing embodiments and preferred embodiments, and the description of the data storage device that has been already made is omitted. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
In some embodiments, fig. 6 is a block diagram of a data storage device applied to an auditing system according to an embodiment of the present application, and as shown in fig. 6, the data storage device includes: an acquisition module 61, a generation module 62 and a storage module 63;
the obtaining module 61 is configured to obtain a database operation logic statement, an access parameter, and a return result set of an access user;
a generating module 62, configured to generate an operation hash value according to the database operation logical statement, store the database operation logical statement and the operation hash value in the user operation memory library, generate a result hash value according to the returned result set, and store the returned result set and the result hash value in the returned result set memory library;
and a storage module 63, configured to store the access parameter, the operation hash value, and the result hash value in the operation track database.
By the data storage device applied to the auditing system, the database logic statement of an accessing user and the operation hash value corresponding to the database logic statement are stored in the user operation memory bank, the return result set and the result hash value corresponding to the return result set are stored in the return result set memory bank by utilizing the access characteristics of large data volume and repetitive operation of the database, the return stores the access parameters, the operation hash values and the result hash values in an operation trace database, compared with the traditional database auditing system which stores a large number of repeated database operation request records of access users, and the repeated returned result sets corresponding to the repeated database operation request records reduce the storage amount of the database auditing system in the aspects of user operation records and returned result sets, and improve the storage utilization rate and the performance of the database auditing system.
In some embodiments, the obtaining module 61, the generating module 62, and the storing module 63 are further configured to implement the steps in the data storing method applied to the auditing system provided in each of the embodiments, and are not described herein again.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
In one embodiment, a computer device is provided, which may be a terminal. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by a processor implements a data storage method for use in an auditing system. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
In an embodiment, fig. 7 is a schematic diagram of an internal structure of a computer device according to an embodiment of the present application, and as shown in fig. 7, a computer device is provided, where the computer device may be a server, and the internal structure diagram may be as shown in fig. 7. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by a processor implements a data storage method for use in an auditing system.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the steps of the data storage method applied to the auditing system provided by the above embodiments are implemented.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the data storage method applied to the auditing system provided by the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A data storage method applied to an auditing system, characterized in that the method comprises the following steps:
acquiring a database operation logic statement, an access parameter and a return result set of an access user;
generating an operation hash value according to the database operation logic statement, and storing the database operation logic statement and the operation hash value in a user operation memory library;
generating a result hash value according to the returned result set, and storing the returned result set and the result hash value in a returned result set memory base;
storing the access parameter, the operation hash value, and the result hash value in an operation trajectory database.
2. The data storage method of claim 1, wherein obtaining the database operation logic statement of the accessing user comprises:
acquiring a database operation request of the access user;
and converting the database operation request into a database operation logic statement.
3. The data storage method of claim 1, wherein obtaining the database operation request and the access parameter of the accessing user comprises:
obtaining the access flow of the access user;
and determining the database operation request and the access parameter of the access user according to the access flow.
4. The data storage method according to claim 3, wherein the access flow of the access user is obtained; determining the database operation request and the access parameter of the access user according to the access flow comprises the following steps:
determining the access flow of the access user through the access flow of a mirror database;
and carrying out flow analysis on the access flow, and determining the database operation request and the access parameter of the access user.
5. The data storage method of claim 1, wherein the method further comprises:
acquiring an input access parameter;
calling an operation hash value and a result hash value which are matched with the input access parameters from the operation track database;
according to the called operation hash value, obtaining a database operation logic statement matched with the called operation hash value from the user operation memory bank, and determining a database operation request corresponding to the called operation hash value according to the database operation logic statement;
and acquiring a returned result set matched with the called result hash value from the returned result set memory library according to the called result hash value.
6. The data storage method according to any one of claims 1 to 5, wherein the access parameter of the access user comprises at least one item, and the input access parameter comprises at least one item.
7. The data storage method according to claim 1, wherein the operation hash value is set as a primary key in the user operation memory, and the result hash value is set as a primary key in the returned result set memory.
8. A data storage device for use in an auditing system, the device comprising: the device comprises an acquisition module, a generation module and a storage module;
the acquisition module is used for acquiring database operation logic statements, access parameters and a return result set of an access user;
the generating module is used for generating an operation hash value according to the database operation logic statement, storing the database operation logic statement and the operation hash value in a user operation memory library, generating a result hash value according to the returned result set, and storing the returned result set and the result hash value in a returned result set memory library;
the storage module is used for storing the access parameters, the operation hash values and the result hash values in an operation track database.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202010984519.3A 2020-09-18 2020-09-18 Data storage method and device applied to auditing system and computer equipment Withdrawn CN112347119A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010984519.3A CN112347119A (en) 2020-09-18 2020-09-18 Data storage method and device applied to auditing system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010984519.3A CN112347119A (en) 2020-09-18 2020-09-18 Data storage method and device applied to auditing system and computer equipment

Publications (1)

Publication Number Publication Date
CN112347119A true CN112347119A (en) 2021-02-09

Family

ID=74357943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010984519.3A Withdrawn CN112347119A (en) 2020-09-18 2020-09-18 Data storage method and device applied to auditing system and computer equipment

Country Status (1)

Country Link
CN (1) CN112347119A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
CN111177272A (en) * 2019-12-31 2020-05-19 杭州趣链科技有限公司 Block chain-based big data credible auditing method
CN111241104A (en) * 2020-01-14 2020-06-05 腾讯科技(深圳)有限公司 Operation auditing method and device, electronic equipment and computer-readable storage medium
CN111274276A (en) * 2020-01-14 2020-06-12 腾讯科技(深圳)有限公司 Operation auditing method and device, electronic equipment and computer-readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
CN111177272A (en) * 2019-12-31 2020-05-19 杭州趣链科技有限公司 Block chain-based big data credible auditing method
CN111241104A (en) * 2020-01-14 2020-06-05 腾讯科技(深圳)有限公司 Operation auditing method and device, electronic equipment and computer-readable storage medium
CN111274276A (en) * 2020-01-14 2020-06-12 腾讯科技(深圳)有限公司 Operation auditing method and device, electronic equipment and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN109558440B (en) Data batch processing method and device, computer equipment and storage medium
CN109033123B (en) Big data-based query method and device, computer equipment and storage medium
CN108197200B (en) Log tracking method and device, computer equipment and storage medium
WO2020181839A1 (en) Page data testing method, apparatus, computer device, and storage medium
CN111563368A (en) Report generation method and device, computer equipment and storage medium
US20170161306A1 (en) Method and apparatus for data quality management and control
CN110569222B (en) Link tracking method and device, computer equipment and readable storage medium
CN106776795B (en) Data writing method and device based on Hbase database
CN112395157A (en) Audit log obtaining method and device, computer equipment and storage medium
CN112506481A (en) Service data interaction method and device, computer equipment and storage medium
CN111104406A (en) Hierarchical service data storage method and device, computer equipment and storage medium
Carata et al. A Primer on Provenance: Better understanding of data requires tracking its history and context.
CN112434027A (en) Indexing method and device for multi-dimensional data, computer equipment and storage medium
CN113127848A (en) Storage method of permission system data and related equipment
CN110866011B (en) Data table synchronization method and device, computer equipment and storage medium
CN115357590A (en) Recording method and device for data change, electronic device and storage medium
CN109542764B (en) Webpage automatic testing method and device, computer equipment and storage medium
de Jong et al. Algorithms for efficiently computing structural anonymity in complex networks
CN109840250B (en) Method, device, equipment and storage medium for managing access authority of intermediate field
CN112347119A (en) Data storage method and device applied to auditing system and computer equipment
CN115544007A (en) Label preprocessing method and device, computer equipment and storage medium
US20220092194A1 (en) Smart Direct Access
CN112788021A (en) Cloud data-based digital city management data sharing system for identity verification method
CN112835886A (en) Data table field adding method and device
CN112528339A (en) Data desensitization method based on Cach é database and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210209