CN103235905A - DUDP real-time data protection method - Google Patents

DUDP real-time data protection method Download PDF

Info

Publication number
CN103235905A
CN103235905A CN2013101510026A CN201310151002A CN103235905A CN 103235905 A CN103235905 A CN 103235905A CN 2013101510026 A CN2013101510026 A CN 2013101510026A CN 201310151002 A CN201310151002 A CN 201310151002A CN 103235905 A CN103235905 A CN 103235905A
Authority
CN
China
Prior art keywords
data
user
clouds
subscriber computer
dudp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101510026A
Other languages
Chinese (zh)
Inventor
杜佳
唐偕文
王嘉琨
何然
匡扶
苟良明
王艺浩
张登荣
蒙小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU FAKE-PRODUCT DISAPPERANCE TECHNOLOGY Co Ltd
Original Assignee
CHENGDU FAKE-PRODUCT DISAPPERANCE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU FAKE-PRODUCT DISAPPERANCE TECHNOLOGY Co Ltd filed Critical CHENGDU FAKE-PRODUCT DISAPPERANCE TECHNOLOGY Co Ltd
Priority to CN2013101510026A priority Critical patent/CN103235905A/en
Publication of CN103235905A publication Critical patent/CN103235905A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a DUDP real-time data protection method. By the aid of kernel virtual driving and cloud computing, a virtual file system is mounted on a computer, data are transmitted to a cloud end, data storage safety is ensured for a user, the data are protected in real time, the important data of the user are stored at the cloud end, and version management and disaster recovery of the important data are realized.

Description

The guard method of DUDP real time data
Technical field
The present invention relates to data protection, cloud computing field, particularly design data protection Kernel Technology.
Background technology
The computer user adopts usually data and directly uses symmetric cryptographic algorithm at present, to file encryption and disc driver encipherment protection and transparent encryption.These data protection means all are to be encrypted as the basis; their common feature is that speed is fast; with strong points; and information storage is flexible; but shortcoming is the file that is protected still might be stolen; by the dictionary means certain probability Brute Force is arranged, and under the situation of system crash and disk failure, cause loss of data.
Summary of the invention
Purpose of the present invention solves the storage of subscriber data safety problem exactly, and data are carried out real-time guard, and user's significant data is carried out the high in the clouds storage, and version management and disaster recovery.
The specific implementation method: a kind of data guard method of computing machine, it is characterized in that computer data is carried out real-time guard and has data version management and the high in the clouds disaster recovery capability, may further comprise the steps:
A loads inner nuclear layer and drives on subscriber computer, carry virtual unit system module is on the subscriber computer physical equipment, make all disk operating of user be caught by virtual unit, the process that only has lawful authority simultaneously can have access to the file of virtual unit.
B virtual unit system module does not use subscriber computer physical hard disk space, but directly the read-write requests of application program is sent to high in the clouds.
C high in the clouds is after the request that writes that receives subscriber computer, be optimized according to user place network node, it converts the request of data of server this locality of the nearest node of user to, write the physical storage medium of server again, read according to user's request of reading simultaneously, read respective data transfer reuse family local computer.
The D subscriber computer is under the situation that network interrupts, and file can temporarily write local physical storage medium, carries out real-time guard according to the process feature of current accessed file, it is characterized by the SHA1 cryptographic hash.
2, a kind of DUDP data guard method according to claim 1; it is characterized in that; in the described steps A: the process of user file and access file is protected; have only the data of the correct legal process of effect cryptographic hash in can accesses virtual equipment, and concrete bottom operation is sightless for consumer process.
3, a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step B: in the digitizing environment, virtual system uses network that the data that will write local disk in the internal memory and program are read data in real time, imports high in the clouds in real time into.
4, a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step C: distributed structure/architecture is adopted in high in the clouds; user machine system can be connected to fastest network node automatically; its disk writes actual the writing that request is converted into the server physical storage medium automatically, and writes according to time sequencing.Under the needs situation, retrace automatically, disaster recovery are to some states before.High in the clouds at one's leisure between can according to the user often the network node of visit carry out data-optimizedly, guarantee that all the time user's reading speed reaches best.
5, a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step D: subscriber computer is when running into long-time or accidental network interruption; for the continuity that guarantees that subscriber computer uses; data can be by temporary in the physical hard disk space of subscriber computer, and in the legitimacy of the strict checking data visit of inner nuclear layer process, implements protection and the process that prevents is injected; in case network connection is recovered, data are understood automatically and carry out synchronously in high in the clouds.
Beneficial effect of the present invention is:
Significant data leaves high in the clouds in, even subscriber computer is stolen or hacker attacks, all is difficult to steal data, gives the user real-time guard.
Description of drawings
Fig. 1 is DUDP real time data guard method synoptic diagram.A is high in the clouds comprehensive server cluster among the figure, and B is the storage server cluster, and C is subscriber computer among the figure, and D opens file for the user is current among the figure, and E is the virtual unit system module among the figure, and F is the subscriber computer storage medium.
Embodiment
Embodiment one: comprise following step:
A. build the cloud service platform.
B. subscriber computer carry virtual unit system module.
C. virtual device modules and cloud service platform are mutual.
In the present embodiment, steps A uses the server with independent IP as master server (as the A of Fig. 1), many platform independent IP department server is deployed on the each department network node, simultaneously every station server all the deployment-specific data storage server ((as the B of Fig. 1), the service-strong Transmission Control Protocol communicates between the server.
In the present embodiment, step B uses the virtual file Driving technique, catches All Files and writes read operation, and therefrom carry out data screening (as the E of Fig. 1).Screening rule is: the process of having only filename and SHA1 cryptographic hash all to meet is hunted down, and the request of all-access file is converted into network packet, is transferred to (as the A of Fig. 1) cloud service platform.
In the present embodiment, among the step C, the Cloud Server platform receives after the packet that operation is handled and filed to All Files, and its principle is: 1. create new file operation meeting server retain unique file ID sign as: 0x00000001 writes corresponding data simultaneously and reads corresponding data.2 when change takes place in file, can create new file again, and the file ID before storing, and so just version is before arrived in retrace arbitrarily.

Claims (5)

1. the data guard method of a computing machine is characterized in that computer data is carried out real-time guard and has data version management and the high in the clouds disaster recovery capability, may further comprise the steps:
A loads inner nuclear layer and drives on subscriber computer, carry virtual unit system module is on the subscriber computer physical equipment, make all disk behaviour of user be caught by virtual unit earlier, the process that only has lawful authority simultaneously can have access to the file of virtual unit.
B virtual unit system module does not use subscriber computer physical hard disk space, but directly the read-write requests of application program is sent to high in the clouds.
C high in the clouds is after the request that writes that receives subscriber computer, be optimized according to user place network node, it converts the request of data of server this locality of the nearest node of user to, write the physical storage medium of server again, read according to user's request of reading simultaneously, read respective data transfer reuse family local computer.
The D subscriber computer is under the situation that network interrupts, and file can temporarily write local physical storage medium, carries out real-time guard according to the process feature of current accessed file, it is characterized by the SHA1 cryptographic hash.
2. a kind of DUDP data guard method according to claim 1; it is characterized in that; in the described steps A: the process of user file and access file is protected; have only the data of the correct legal process of effect cryptographic hash in can accesses virtual equipment, and concrete bottom operation is sightless for consumer process.
3. a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step B: in the digitizing environment, virtual system uses network that the data that will write local disk in the internal memory and program are read data in real time, imports high in the clouds in real time into.
4. a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step C: distributed structure/architecture is adopted in high in the clouds; user machine system can be connected to fastest network node automatically; its disk writes actual the writing that request is converted into the server physical storage medium automatically, and writes according to time sequencing.Under the needs situation, retrace automatically, disaster recovery are to some states before.High in the clouds at one's leisure between can according to the user often the network node of visit carry out data-optimizedly, guarantee that all the time user's reading speed reaches best.
5. a kind of DUDP data guard method according to claim 1; it is characterized in that; among the described step D: subscriber computer is when running into long-time or accidental network interruption; for the continuity that guarantees that subscriber computer uses; data can be by temporary in the physical hard disk space of subscriber computer, and in the legitimacy of the strict checking data visit of inner nuclear layer process, implements protection and the process that prevents is injected; in case network connection is recovered, data are understood automatically and carry out synchronously in high in the clouds.
CN2013101510026A 2013-04-27 2013-04-27 DUDP real-time data protection method Pending CN103235905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101510026A CN103235905A (en) 2013-04-27 2013-04-27 DUDP real-time data protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101510026A CN103235905A (en) 2013-04-27 2013-04-27 DUDP real-time data protection method

Publications (1)

Publication Number Publication Date
CN103235905A true CN103235905A (en) 2013-08-07

Family

ID=48883945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101510026A Pending CN103235905A (en) 2013-04-27 2013-04-27 DUDP real-time data protection method

Country Status (1)

Country Link
CN (1) CN103235905A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408086A (en) * 2014-11-07 2015-03-11 北京奇虎科技有限公司 System and method for overall processing of data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763225A (en) * 2010-01-22 2010-06-30 蓝盾信息安全技术股份有限公司 System and method for protecting virtual disk files
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN102035884A (en) * 2010-12-03 2011-04-27 华中科技大学 Cloud storage system and data deployment method thereof
CN102214127A (en) * 2010-11-15 2011-10-12 上海安纵信息科技有限公司 Method for intensively storing and backing up data based on operating system virtualization theory
US20110264786A1 (en) * 2010-03-17 2011-10-27 Zerto Ltd. Methods and apparatus for providing hypervisor level data services for server virtualization
CN102523270A (en) * 2011-12-09 2012-06-27 成都东方盛行电子有限责任公司 Method for realizing cloud storage
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
CN102932326A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Safety cloud computing system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763225A (en) * 2010-01-22 2010-06-30 蓝盾信息安全技术股份有限公司 System and method for protecting virtual disk files
US20110264786A1 (en) * 2010-03-17 2011-10-27 Zerto Ltd. Methods and apparatus for providing hypervisor level data services for server virtualization
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN102214127A (en) * 2010-11-15 2011-10-12 上海安纵信息科技有限公司 Method for intensively storing and backing up data based on operating system virtualization theory
CN102035884A (en) * 2010-12-03 2011-04-27 华中科技大学 Cloud storage system and data deployment method thereof
CN102523270A (en) * 2011-12-09 2012-06-27 成都东方盛行电子有限责任公司 Method for realizing cloud storage
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
CN102932326A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Safety cloud computing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408086A (en) * 2014-11-07 2015-03-11 北京奇虎科技有限公司 System and method for overall processing of data
CN104408086B (en) * 2014-11-07 2018-02-06 北京奇虎科技有限公司 Data Global treatment system and method

Similar Documents

Publication Publication Date Title
US10887086B1 (en) Protecting data in a storage system
US20220222184A1 (en) Providing End-To-End Encryption For Data Stored In A Storage System
US10140370B1 (en) Systems and methods for maintaining encrypted search indexes on third-party storage systems
CN110062034B (en) Block chain large file secure storage method and system
US9516016B2 (en) Storage array password management
CN103929500A (en) Method for data fragmentation of distributed storage system
CN104160407B (en) Using storage control EBI guaranteeing the data transmission security between storage device and main frame
US11139959B2 (en) Stream ciphers for digital storage encryption
US20100161926A1 (en) Data protection by segmented storage
CN102945355A (en) Sector map-based rapid data encryption policy compliance
US10089245B2 (en) Management of encryption keys for multi-mode network storage device
CN102457555A (en) Security system and method for distributed storage
US11431488B1 (en) Protecting local key generation using a remote key management service
CN102855452A (en) Method for following quick data encryption strategy based on encryption piece
CN101983379A (en) Disk drive data encryption
CN107590395B (en) Multilayer data encryption method, device, equipment and system suitable for cloud environment
US9288042B1 (en) Securely and redundantly storing encryption credentials system and method
US20230080528A1 (en) Smart data protection
US20210110055A1 (en) Data Deletion for a Multi-Tenant Environment
US10469457B1 (en) Systems and methods for securely sharing cloud-service credentials within a network of computing devices
CN103235905A (en) DUDP real-time data protection method
CN106155921B (en) A kind of information processing method and electronic equipment
Cheng et al. A practical cross-datacenter fault-tolerance algorithm in the cloud storage system
JP6107286B2 (en) Distributed storage system, node, data management method, and program
CN117234427B (en) Data reading and writing method, device, equipment, system, storage medium and storage system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Chengdu The Fake-Product Disapperance Technology Co., Ltd.

Document name: the First Notification of an Office Action

WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130807

WD01 Invention patent application deemed withdrawn after publication