CN115348260B - Information processing method, device, equipment and medium based on campus information security - Google Patents

Information processing method, device, equipment and medium based on campus information security Download PDF

Info

Publication number
CN115348260B
CN115348260B CN202211276349.9A CN202211276349A CN115348260B CN 115348260 B CN115348260 B CN 115348260B CN 202211276349 A CN202211276349 A CN 202211276349A CN 115348260 B CN115348260 B CN 115348260B
Authority
CN
China
Prior art keywords
storage server
storage
campus
file
campus user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211276349.9A
Other languages
Chinese (zh)
Other versions
CN115348260A (en
Inventor
杨欣泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongyang Xunteng Technology Development Co ltd
Original Assignee
Beijing Hongyang Xunteng Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hongyang Xunteng Technology Development Co ltd filed Critical Beijing Hongyang Xunteng Technology Development Co ltd
Priority to CN202211276349.9A priority Critical patent/CN115348260B/en
Publication of CN115348260A publication Critical patent/CN115348260A/en
Application granted granted Critical
Publication of CN115348260B publication Critical patent/CN115348260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the disclosure discloses an information processing method, an information processing device, information processing equipment and an information processing medium based on campus information security. One embodiment of the method comprises: responding to unsuccessfully storing the campus user file into a storage server, generating storage failure information, and adding the storage failure information into a storage failure information group of the storage server within a preset time period to obtain an updated storage failure information group; determining a storage failure information group of each storage server in a preset storage server cluster in a preset time period; storing the school garden user file into a target storage server; and in response to the fact that the campus user files are successfully stored in the target storage server and the fact that the file types corresponding to the campus user files are high-frequency file types, storing the campus user files in at least one cache associated with the target storage server. The embodiment can improve the reading speed when reading the file of the high-frequency file type.

Description

Information processing method, device, equipment and medium based on campus information security
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to an information processing method, device, equipment and medium based on campus information security.
Background
At present, in order to ensure the security of important campus information, the method generally adopted is as follows: and encrypting the campus information, and then storing the campus information into a set storage server.
However, the following technical problems generally exist in the above manner:
firstly, the campus information is too much, and the campus information is not classified and stored, so that the storage space of a storage server is insufficient;
secondly, the set storage server is single, and when the storage server is abnormal, the campus information cannot be stored in time;
thirdly, as the stored campus information is more, the database is often directly accessed when the information is queried, and the database is easily jammed due to multi-thread operation when the information is stored in the database, so that the query speed is low and the query time is long.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose an information processing method, apparatus, electronic device, computer readable medium and program product based on campus information security to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide an information processing method based on campus information security, the method including: in response to receiving a campus user file write-in request, receiving a campus user file corresponding to the campus user file write-in request and write-in configuration information corresponding to the campus user file; determining a storage server corresponding to the write-in configuration information, and locking the storage server; in response to determining that the storage server is successfully locked, storing the campus user file in the storage server; responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group; in response to the fact that the number of the update storage failure information included in the update storage failure information group is larger than or equal to a preset threshold value, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period to obtain a storage failure information group set; determining a target storage server according to the storage failure information group set, and storing the campus user files into the target storage server; and in response to determining that the campus user files are successfully stored in the target storage server and determining that the file type corresponding to the campus user files is a high-frequency file type, storing the campus user files in at least one cache associated with the target storage server.
In a second aspect, some embodiments of the present disclosure provide an information processing apparatus based on campus information security, the apparatus including: the receiving unit is configured to respond to a received campus user file writing request, and receive a campus user file corresponding to the campus user file writing request and writing configuration information corresponding to the campus user file; a first determining unit configured to determine a storage server corresponding to the write configuration information, and perform locking processing on the storage server; a first storage unit configured to store the campus user files in the storage server in response to determining that the storage server is successfully locked; the adding unit is configured to respond to the fact that the campus user files are not successfully stored in the storage server, generate storage failure information, and add the storage failure information to a storage failure information group of the storage server within a preset time period to obtain an updated storage failure information group; a second determining unit, configured to determine, in response to determining that the number of update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, a storage failure information group of each storage server in a preset storage server cluster in the preset time period, to obtain a storage failure information group set; a third determining unit, configured to determine a target storage server according to the storage failure information group set, and store the campus user file in the target storage server; and the second storage unit is configured to store the campus user files into at least one cache associated with the target storage server in response to determining that the campus user files are successfully stored into the target storage server and determining that the file types corresponding to the campus user files are high-frequency file types.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method described in any of the implementations of the first aspect.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium on which a computer program is stored, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect.
In a fifth aspect, some embodiments of the present disclosure provide a computer program product comprising a computer program that, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantages: according to the information processing method based on campus information security, the campus information can be stored in a classified mode, and the storage pressure of the storage server is reduced. Specifically, the reasons that the storage space of the storage server is insufficient are that: due to the fact that the campus information is too much, the campus information is not classified and stored, and the storage space of the storage server is insufficient. Based on this, in the information processing method based on the campus information security according to some embodiments of the present disclosure, first, in response to receiving a campus user file write request, a campus user file corresponding to the campus user file write request and write configuration information corresponding to the campus user file are received. Therefore, the campus user files can be stored according to the storage configuration information specified by the user. And secondly, determining a storage server corresponding to the write configuration information, and locking the storage server. And secondly, in response to the fact that the locking of the storage server is successful, storing the campus user file into the storage server. Thus, it is possible to prevent interference of other reading operations when storing a file. And then, responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group. Thus, the current state of the storage server can be determined, and when the storage server is abnormal, the current state can be stored in another storage server. And then, in response to determining that the number of the update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period, and obtaining a storage failure information group set. Thus, data support is provided for selecting a storage server with good quality. And then, according to the storage failure information group set, determining a target storage server, and storing the campus user file into the target storage server. Therefore, a server storage file with good quality can be selected. And finally, in response to the fact that the campus user files are successfully stored in the target storage server and the fact that the file types corresponding to the campus user files are high-frequency file types, storing the campus user files in at least one cache associated with the target storage server. Here, since a plurality of storage servers are established, the problem of insufficient storage space can be alleviated. And because the high-frequency file type file can be cached, the reading speed can be improved when the high-frequency file type file is read.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and components are not necessarily drawn to scale.
Fig. 1 is a flow diagram of some embodiments of an information processing method based on campus information security according to the present disclosure;
FIG. 2 is a schematic block diagram view of some embodiments of an information processing apparatus based on campus information security according to the present disclosure;
FIG. 3 is a schematic block diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will appreciate that references to "one or more" are intended to be exemplary and not limiting unless the context clearly indicates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a flow diagram of some embodiments of an information processing method based on campus information security according to the present disclosure. A flow 100 of some embodiments of a campus information security based information processing method according to the present disclosure is shown. The information processing method based on campus information security comprises the following steps:
step 101, in response to receiving a campus user file write request, receiving a campus user file corresponding to the campus user file write request and write configuration information corresponding to the campus user file.
In some embodiments, an executing entity (e.g., a server) of the information processing method based on campus information security may receive, in response to receiving a campus user file write request, a campus user file corresponding to the campus user file write request and write configuration information corresponding to the campus user file. Here, the write configuration information may be configuration information for storing the school property user file to a certain storage server set by the user, and may include path information directed to the storage server. The campus user file may refer to a user information file of a campus user, or may refer to a photographed video file of the campus user.
And 102, determining a storage server corresponding to the written configuration information, and locking the storage server.
In some embodiments, the execution subject may determine a storage server corresponding to the write configuration information, and lock the storage server. That is, the storage server to which the write configuration information is directed is determined. The storage server may refer to a server for storing campus user files.
And 103, in response to the fact that the locking of the storage server is determined to be successful, storing the campus user file into the storage server.
In some embodiments, the execution agent may store the campus user file to the storage server in response to determining that the storage server locking was successful.
And 104, responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group.
In some embodiments, the execution subject may generate storage failure information in response to unsuccessful storage of the campus user file in the storage server, and add the storage failure information to a storage failure information group of the storage server within a preset time period to obtain an updated storage failure information group. Here, the storage failure information may characterize that the storage server did not successfully store the campus user files. Here, the setting of the preset time period is not made.
Step 105, in response to determining that the number of the update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period, and obtaining a storage failure information group set.
In some embodiments, the execution subject may determine, in response to determining that the number of pieces of update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, a storage failure information group of each storage server in a preset storage server cluster in the preset time period, to obtain a storage failure information group set. Here, the setting of the preset threshold is not limited. In practice, the storage failure information group of each storage server in the storage server cluster in the preset time period may be acquired from the terminal device through wired connection or wireless connection, so as to obtain the storage failure information group set.
And 106, determining a target storage server according to the storage failure information group set, and storing the campus user file into the target storage server.
In some embodiments, the execution subject may determine a target storage server according to the storage failure information group set, and store the campus user file in the target storage server.
In practice, according to the storage failure information group set, the executing entity may determine the target storage server by:
the first step is that for each storage failure information group in the storage failure information group set, the number of storage failure information included in the storage failure information group is determined as the storage failure times.
And secondly, determining whether the storage failure times meeting the first target condition exist in the storage failure times. Wherein the first target condition is: the storage failure times are less than the preset threshold value.
And thirdly, in response to the fact that the storage failure times meeting the first target condition exist in the storage failure times, determining the storage failure times meeting the first target condition in the storage failure times as alternative storage failure times to obtain an alternative storage failure time array.
And fourthly, determining the storage server corresponding to each alternative storage failure time in the alternative storage failure time array as an alternative storage server to obtain an alternative storage server group.
And fifthly, determining whether the alternative storage server group has the alternative storage server meeting the second target condition. Wherein the second target condition is: and the current residual storage memory of the alternative storage server is more than or equal to the occupied memory of the campus user file.
And sixthly, in response to determining that the alternative storage server meeting the second target condition exists in the alternative storage server group, determining the alternative storage server meeting the second target condition in the alternative storage server group as the first storage server, and obtaining a first storage service group.
And seventhly, determining the first storage service with the least storage failure times in the first storage service group as a target storage server.
And eighthly, in response to the existence of the plurality of first storage services with the least storage failure times, determining the first storage service with the largest residual storage memory in the plurality of first storage services with the least storage failure times as the target storage server.
The related content in step 106 serves as an invention point of the present disclosure, thereby solving the technical problem mentioned in the background art that "the set storage server is single, and when the storage server is abnormal, the campus information cannot be stored in time. ". The factors that the campus information cannot be stored in time are as follows: the set storage server is single, and when the storage server is abnormal, the campus information cannot be stored in time. If the factors are solved, the effect of storing the campus information in time when the server is abnormal can be achieved. To achieve this effect, first, for each storage failure information group in the storage failure information group set, the number of storage failure information included in the storage failure information group is determined as the number of storage failures. Therefore, data support is provided for selecting a high-quality storage server. Next, it is determined whether there are storage failure times satisfying the first target condition among the respective storage failure times. Wherein the first target condition is: the storage failure times are less than the preset threshold value. And then, in response to determining that the storage failure times meeting the first target condition exist in the storage failure times, determining the storage failure times meeting the first target condition in the storage failure times as alternative storage failure times to obtain an alternative storage failure time array. Therefore, data support can be provided for screening out a plurality of candidate high-quality storage servers. And then, determining the storage server corresponding to each alternative storage failure time in the alternative storage failure time array as an alternative storage server to obtain an alternative storage server group. Then, whether the alternative storage server group has the alternative storage server meeting the second target condition is determined. Wherein the second target condition is: and the current residual storage memory of the alternative storage server is more than or equal to the occupied memory of the campus user file. Then, in response to determining that there is a candidate storage server satisfying the second target condition in the candidate storage server group, determining a candidate storage server satisfying the second target condition in the candidate storage server group as a first storage server, and obtaining a first storage service group. Therefore, the selected storage server can store the campus user files. And finally, determining the first storage service with the least storage failure times in the first storage service group as a target storage server. Therefore, when the storage server selected by the user is abnormal, the high-quality server can be selected in time to store the campus information.
And step 107, in response to determining that the campus user files are successfully stored in the target storage server and determining that the file type corresponding to the campus user files is a high-frequency file type, storing the campus user files in at least one cache associated with the target storage server.
In some embodiments, the execution agent may store the campus user file in at least one cache associated with the target storage server in response to determining that the campus user file is successfully stored in the target storage server and determining that a file type corresponding to the campus user file is a high frequency file type. Here, the high frequency file type may indicate that the campus user file is a file with a high access frequency. The at least one cache associated with the target storage server may refer to a cache database configured to store files of the high frequency file type.
Optionally, in response to receiving the file reading request of the campus user, determining whether a file field corresponding to the file reading request of the campus user exists in the local cache.
In some embodiments, the execution subject may determine, in response to receiving the campus user file read request, whether a file field corresponding to the campus user file read request exists in a local cache. Here, the file field may be a query field established based on a file name of the high frequency campus user file and a database name of a cache database storing the high frequency campus user file. The cache database may refer to a cache associated with the storage server. The file name of the campus user file is carried in the campus user file reading request.
Optionally, in response to determining that a file field corresponding to the campus user file read request does not exist in the local cache, determining the campus user file read request as a low-frequency campus user file read request.
In some embodiments, the execution subject may determine the campus user file read request as a low frequency campus user file read request in response to determining that a file field corresponding to the campus user file read request does not exist in a local cache.
Optionally, the low-frequency campus user file reading request is sent to a storage server corresponding to the low-frequency campus user file reading request.
In some embodiments, the execution subject may send the low-frequency campus user file reading request to a storage server corresponding to the low-frequency campus user file reading request. In practice, the corresponding storage server can be queried according to the file name carried in the file reading request of the campus user.
Optionally, in response to determining that a file field corresponding to the campus user file read request exists in the local cache, determining the campus user file read request as a high-frequency campus user file read request.
In some embodiments, the execution principal may determine the campus user file read request as a high frequency campus user file read request in response to determining that a file field corresponding to the campus user file read request exists in a local cache.
Optionally, according to the high-frequency campus user file reading request, selecting target cache database information from the cache database information set corresponding to the file field.
In some embodiments, the execution subject may select, according to the high-frequency campus user file reading request, target cache database information from the cache database information set corresponding to the file field.
In practice, the executing entity may select the target cache database information from the cache database information set corresponding to the file field by the following steps:
firstly, determining a read request hash value corresponding to the high-frequency campus user file read request. In practice, the read request hash value corresponding to the read request of the high-frequency campus user file can be determined through a hash algorithm.
And secondly, determining the hash value of the cache database corresponding to each cache database information in the cache database information set to obtain the hash value set of the cache database. The hash value of the cache database corresponding to each cache database information in the cache database information set can be determined through a hash algorithm, and the hash value set of the cache database is obtained.
And thirdly, sequencing all the cache database hash values included in the cache database hash value set to obtain a cache database hash value sequence. In practice, the hash values of the cache databases included in the cache database hash value set may be processed in a descending order to obtain a cache database hash value sequence.
And fourthly, constructing a hash value ring of the cache database according to the hash value sequence of the cache database. That is, the unique position of each of the cache database hash values included in the cache database hash value sequence in the consistent hash ring may be determined, so as to construct the cache database hash value ring.
And fifthly, determining the position of the read request hash value in the cache database hash value ring as a request position.
And sixthly, determining the hash value of the first cache database after the request position in the cache database hash value ring as the hash value of the target cache database.
And seventhly, determining the cache database information corresponding to the hash value of the target cache database as target cache database information.
Optionally, the high-frequency campus user file reading request is sent to a cache database corresponding to the target cache database information.
In some embodiments, the execution subject may send the high-frequency campus user file read request to a cache database corresponding to the target cache database information.
The related content in the above optional cases is used as an invention point of the present disclosure, thereby solving the technical problem three mentioned in the background art, that is, the stored campus information is more, when inquiring information, the database is often directly accessed, when the database is operated to store information, the database is easily jammed by multi-thread operation, which results in slow inquiry speed and long inquiry time. ". The factors that result in slow query speed and long query time are as follows: due to the fact that the number of stored campus information is large, when information is inquired, the database is often directly accessed, when information storage operation is conducted on the database, the database is prone to being jammed due to multi-thread operation, inquiry speed is low, and inquiry time is long. If the above factors are solved, the effect of shortening the query time can be achieved. In order to achieve the effect, firstly, in response to determining that a file field corresponding to the campus user file reading request exists in the local cache, the campus user file reading request is determined to be a high-frequency campus user file reading request. Therefore, when the campus user file reading request is determined to be a high-frequency campus user file reading request, the file can be inquired in an auxiliary mode by using the file field of the local cache. And secondly, determining a read request hash value corresponding to the high-frequency campus user file read request. And secondly, determining the hash value of the cache database corresponding to each cache database information in the cache database information set to obtain a cache database hash value set. Therefore, data support is provided for quickly selecting a cache database for processing file reading requests of campus users. Then, sorting all the cache database hash values included in the cache database hash value set to obtain a cache database hash value sequence; and constructing a hash value ring of the cache database according to the hash value sequence of the cache database. Then, determining the position of the read request hash value in the cache database hash value ring as a request position; and determining the first cache database hash value after the request position in the cache database hash value ring as a target cache database hash value. Thus, a cache database can be selected quickly. And then, determining the cache database information corresponding to the hash value of the target cache database as target cache database information. And finally, sending the high-frequency campus user file reading request to a cache database corresponding to the target cache database information. Therefore, direct access to the cache database is avoided, and the execution main body is used for transferring. The reason is that the files corresponding to the high-frequency requests are stored in a plurality of cache databases. Therefore, even when the access amount is high, the access pressure of the cache databases is relieved, the query speed is increased, and the query time is shortened.
Optionally, in response to determining that the file type corresponding to the campus user file is a high-frequency file type, a file field is constructed according to the file name of the campus user file.
In some embodiments, the execution agent may construct a file field according to a file name of the campus user file in response to determining that the file type corresponding to the campus user file is a high frequency file type. That is, the file name of the campus user file and the database name of each cache database storing the campus user file are combined into a file field.
Optionally, the file fields are stored in a local cache.
In some embodiments, the execution body may store the file field in a local cache.
The above embodiments of the present disclosure have the following advantages: according to the information processing method based on campus information security, the campus information can be stored in a classified mode, and storage pressure of the storage server is reduced. Specifically, the reasons for the insufficient storage space of the storage server are: due to the fact that the campus information is too much, the campus information is not classified and stored, and the storage space of the storage server is insufficient. Based on this, in the information processing method based on the campus information security according to some embodiments of the present disclosure, first, in response to receiving a campus user file write request, a campus user file corresponding to the campus user file write request and write configuration information corresponding to the campus user file are received. Therefore, the campus user files can be stored according to the storage configuration information specified by the user. And secondly, determining a storage server corresponding to the write configuration information, and locking the storage server. And secondly, in response to the fact that the locking of the storage server is successful, storing the campus user file into the storage server. Thus, it is possible to prevent interference of other reading operations when storing a file. And then, responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group. Thus, the current state of the storage server can be determined, and when the storage server is abnormal, the current state can be stored in other storage servers. And then, in response to determining that the number of the update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period, and obtaining a storage failure information group set. Thus, data support is provided for selecting a storage server with good quality. And then, according to the storage failure information group set, determining a target storage server, and storing the campus user file into the target storage server. Therefore, the server storage file with good quality can be selected. And finally, in response to the fact that the campus user files are successfully stored in the target storage server and the fact that the file types corresponding to the campus user files are high-frequency file types, storing the campus user files in at least one cache associated with the target storage server. Here, since a plurality of storage servers are established, the problem of insufficient storage space can be alleviated. And because the high-frequency file type file can be cached, the reading speed can be increased when the high-frequency file type file is read.
With further reference to fig. 2, as an implementation of the methods shown in the above figures, the present disclosure provides some embodiments of an information processing apparatus based on campus information security, which correspond to those of the method embodiments shown in fig. 1, and which can be applied in various electronic devices.
As shown in fig. 2, an information processing apparatus 200 based on campus information security of some embodiments includes: a receiving unit 201, a first determining unit 202, a first storing unit 203, an adding unit 204, a second determining unit 205, a third determining unit 206, and a second storing unit 207. The receiving unit 201 is configured to, in response to receiving a campus user file write request, receive a campus user file corresponding to the campus user file write request and write configuration information corresponding to the campus user file; a first determining unit 202, configured to determine a storage server corresponding to the write configuration information, and perform locking processing on the storage server; a first storage unit 203 configured to store the campus user files in the storage server in response to determining that the storage server is successfully locked; an adding unit 204, configured to generate storage failure information in response to unsuccessful storage of the campus user file in the storage server, and add the storage failure information to a storage failure information group of the storage server within a preset time period to obtain an updated storage failure information group; a second determining unit 205, configured to determine, in response to determining that the number of update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, a storage failure information group of each storage server in a preset storage server cluster in the preset time period, to obtain a storage failure information group set; a third determining unit 206, configured to determine a target storage server according to the storage failure information group set, and store the campus user file in the target storage server; a second storage unit 207, configured to store the campus user file into at least one cache associated with the target storage server in response to determining that the campus user file is successfully stored in the target storage server and determining that a file type corresponding to the campus user file is a high-frequency file type.
It is to be understood that the units described in the information processing apparatus 200 based on campus information security correspond to the respective steps in the method described with reference to fig. 1. Therefore, the operations, features and advantageous effects generated by the operations, features and advantageous effects described above for the method are also applicable to the information processing apparatus 200 based on campus information security and the units included therein, and are not described again here.
Referring now to FIG. 3, a block diagram of an electronic device (e.g., server) 300 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device in some embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM302, and the RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
Generally, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage devices 308 including, for example, magnetic tape, hard disk, etc.; and a communication device 309. The communication means 309 may allow the electronic device 300 to communicate wirelessly or by wire with other devices to exchange data. While fig. 3 illustrates an electronic device 300 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided. Each block shown in fig. 3 may represent one device or may represent multiple devices, as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 309, or installed from the storage device 308, or installed from the ROM 302. The computer program, when executed by the processing apparatus 301, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to receiving a campus user file write-in request, receiving a campus user file corresponding to the campus user file write-in request and write-in configuration information corresponding to the campus user file; determining a storage server corresponding to the write-in configuration information, and locking the storage server; in response to determining that the storage server is successfully locked, storing the campus user file in the storage server; responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group; in response to the fact that the number of the update storage failure information included in the update storage failure information group is larger than or equal to a preset threshold value, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period to obtain a storage failure information group set; determining a target storage server according to the storage failure information group set, and storing the campus user files into the target storage server; and in response to determining that the campus user files are successfully stored in the target storage server and determining that the file type corresponding to the campus user files is a high-frequency file type, storing the campus user files in at least one cache associated with the target storage server.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes a receiving unit, a first determining unit, a first storing unit, an adding unit, a second determining unit, a third determining unit, and a second storing unit. The names of these units do not in some cases form a limitation on the units themselves, for example, the first storage unit may also be described as "a unit that stores the campus user files in the storage server in response to determining that the storage server is successfully locked".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
Some embodiments of the present disclosure also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements any one of the above-mentioned information processing methods based on campus information security.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (7)

1. An information processing method based on campus information security comprises the following steps:
in response to receiving a campus user file writing request, receiving a campus user file corresponding to the campus user file writing request and writing configuration information corresponding to the campus user file;
determining a storage server corresponding to the write-in configuration information, and locking the storage server;
in response to determining that the storage server locking is successful, storing the campus user files in the storage server;
responding to the fact that the campus user files are not successfully stored in the storage server, generating storage failure information, and adding the storage failure information to a storage failure information group of the storage server in a preset time period to obtain an updated storage failure information group;
in response to the fact that the number of the update storage failure information included in the update storage failure information group is larger than or equal to a preset threshold value, determining a storage failure information group of each storage server in a preset storage server cluster in the preset time period to obtain a storage failure information group set;
determining a target storage server according to the storage failure information group set, and storing the campus user files into the target storage server;
and in response to determining that the campus user files are successfully stored in the target storage server and determining that the file types corresponding to the campus user files are high-frequency file types, storing the campus user files in at least one cache associated with the target storage server.
2. The method of claim 1, wherein the method further comprises:
in response to receiving a campus user file reading request, determining whether a file field corresponding to the campus user file reading request exists in a local cache;
in response to determining that no file field corresponding to the campus user file reading request exists in a local cache, determining the campus user file reading request as a low-frequency campus user file reading request;
and sending the low-frequency campus user file reading request to a storage server corresponding to the low-frequency campus user file reading request.
3. The method of claim 2, wherein the method further comprises:
in response to determining that a file field corresponding to the campus user file reading request exists in a local cache, determining the campus user file reading request as a high-frequency campus user file reading request;
selecting target cache database information from the cache database information set corresponding to the file field according to the high-frequency campus user file reading request;
and sending the high-frequency campus user file reading request to cache data corresponding to the target cache database information.
4. The method of claim 1, wherein the method further comprises:
in response to the fact that the file type corresponding to the campus user file is determined to be a high-frequency file type, file fields are built according to the file name of the campus user file;
storing the file fields in a local cache.
5. An information processing apparatus based on campus information security, comprising:
the receiving unit is configured to respond to a received campus user file writing request, and receive a campus user file corresponding to the campus user file writing request and writing configuration information corresponding to the campus user file;
the first determining unit is configured to determine a storage server corresponding to the writing configuration information and lock the storage server;
a first storage unit configured to store the campus user files in the storage server in response to determining that the storage server locking is successful;
the adding unit is configured to respond to the unsuccessfully storing of the campus user file into the storage server, generate storage failure information, and add the storage failure information into a storage failure information group of the storage server within a preset time period to obtain an updated storage failure information group;
a second determining unit, configured to determine, in response to determining that the number of update storage failure information included in the update storage failure information group is greater than or equal to a preset threshold, a storage failure information group of each storage server in a preset storage server cluster within the preset time period, resulting in a storage failure information group set;
a third determining unit configured to determine a target storage server according to the storage failure information group set, and store the campus user file in the target storage server;
the second storage unit is configured to store the campus user files into at least one cache associated with the target storage server in response to determining that the campus user files are successfully stored in the target storage server and determining that a file type corresponding to the campus user files is a high-frequency file type.
6. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-4.
7. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-4.
CN202211276349.9A 2022-10-19 2022-10-19 Information processing method, device, equipment and medium based on campus information security Active CN115348260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211276349.9A CN115348260B (en) 2022-10-19 2022-10-19 Information processing method, device, equipment and medium based on campus information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211276349.9A CN115348260B (en) 2022-10-19 2022-10-19 Information processing method, device, equipment and medium based on campus information security

Publications (2)

Publication Number Publication Date
CN115348260A CN115348260A (en) 2022-11-15
CN115348260B true CN115348260B (en) 2022-12-20

Family

ID=83957138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211276349.9A Active CN115348260B (en) 2022-10-19 2022-10-19 Information processing method, device, equipment and medium based on campus information security

Country Status (1)

Country Link
CN (1) CN115348260B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2007102536A1 (en) * 2006-03-08 2009-07-23 パナソニック株式会社 Distributed file management system
CN104008028B (en) * 2014-05-22 2017-03-15 北京大学 Intelligent mobile terminal data backup memory method and system based on many cloud storages
CN110968563B (en) * 2018-09-29 2023-11-17 华为技术有限公司 Data storage method, metadata server and client
CN114338654A (en) * 2021-12-31 2022-04-12 中国电信股份有限公司 File transmission method, storage service distribution method, device, equipment and medium

Also Published As

Publication number Publication date
CN115348260A (en) 2022-11-15

Similar Documents

Publication Publication Date Title
CN110781373B (en) List updating method and device, readable medium and electronic equipment
CN110390493B (en) Task management method and device, storage medium and electronic equipment
CN111800513B (en) Method and device for pushing information and computer readable medium of electronic equipment
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN114637703B (en) Data access device, method, readable medium and electronic equipment
CN110852720A (en) Document processing method, device, equipment and storage medium
CN114116247A (en) Redis-based message processing method, device, system, server and medium
CN111262907B (en) Service instance access method and device and electronic equipment
CN115348260B (en) Information processing method, device, equipment and medium based on campus information security
CN111241137A (en) Data processing method and device, electronic equipment and storage medium
CN110765238A (en) Data encryption query method and device
CN112507676B (en) Method and device for generating energy report, electronic equipment and computer readable medium
CN110941683B (en) Method, device, medium and electronic equipment for acquiring object attribute information in space
CN114327453A (en) Page display method, device, equipment and storage medium
CN114428925A (en) Page rendering method and device, electronic equipment and computer readable medium
CN112685075A (en) Gray scale distribution method and device, electronic equipment and computer readable medium
CN113760929A (en) Data synchronization method and device, electronic equipment and computer readable medium
CN111580890A (en) Method, apparatus, electronic device, and computer-readable medium for processing features
CN112115154A (en) Data processing and data query method, device, equipment and computer readable medium
CN111782895A (en) Retrieval processing method and device, readable medium and electronic equipment
CN112100205A (en) Data processing method, device, equipment and computer readable medium
CN116820354B (en) Data storage method, data storage device and data storage system
CN116128415B (en) Power equipment information sending method and device, electronic equipment and computer medium
CN111400322B (en) Method, apparatus, electronic device and medium for storing data
CN110545108B (en) Data processing method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant