CN103902422A - Method and device for monitoring user operation behaviors and cloud computer system - Google Patents

Method and device for monitoring user operation behaviors and cloud computer system Download PDF

Info

Publication number
CN103902422A
CN103902422A CN201210572984.1A CN201210572984A CN103902422A CN 103902422 A CN103902422 A CN 103902422A CN 201210572984 A CN201210572984 A CN 201210572984A CN 103902422 A CN103902422 A CN 103902422A
Authority
CN
China
Prior art keywords
virtual machine
snapshot
snapshot document
user
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210572984.1A
Other languages
Chinese (zh)
Other versions
CN103902422B (en
Inventor
江峰
雷葆华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201210572984.1A priority Critical patent/CN103902422B/en
Publication of CN103902422A publication Critical patent/CN103902422A/en
Application granted granted Critical
Publication of CN103902422B publication Critical patent/CN103902422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method and device for monitoring user operation behaviors and a cloud computer system. The method includes the steps that after a virtual machine is created in the cloud computer system, a monitoring request sent by a user is received, and virtual machine identification information is carried in the monitoring request; a corresponding virtual display card is obtained according to the virtual machine identification information; data of the virtual display card are snapshot and recorded according to a set time interval, and are stored in different files; duplicate removal operation is carried out on the stored files so as to delete the same snapshoot files. By means of the method and device for monitoring the user operation behaviors and the cloud computer system, real-time monitoring of the user operation behaviors can be guaranteed.

Description

Method, device and cloud computer system that user's operation behavior is monitored
Technical field
The disclosure relates to cloud computing application, especially, relates to a kind of method that user's operation behavior is monitored, device and cloud computer system.
Background technology
Intel Virtualization Technology is a kind of technology of utilizing software to carry out analog computer hardware, computing element moves on virtual basis rather than on real basis, thereby can again plan limited fixed resource according to different demands, maximize to reach resource utilization.Since Intel Virtualization Technology has obtained hardware vendor's support, the performance of this software simulation hardware has obtained huge lifting.
In Intel Virtualization Technology, physical hardware is called as PM(Physical Machine, physical machine), virtual hardware is called as VM(Virtual Machine virtual machine), the operating system of moving on virtual machine is called as GOS(Guest OS, guests' operating system), the software of managing virtual machines is called as VMM(Virtual Machine Monitor virtual machine manager).
Can dynamically adjust the performance of virtual machine by Intel Virtualization Technology.In the higher physical machine of configuration, can create multiple virtual machines with different configurations.For taking the less application of computer resource, can only distribute the virtual machine of a low configuration; And for taking the more application of computer resource, can distribute the virtual machine of a high configuration.When the load of application is while changing, can also dynamically change virtual machine be configured to satisfy the demands.
Cloud computer system based on Intel Virtualization Technology has low cost and elastomeric advantage.Aspect cost, as long as user can access network, just can connect cloud computer by multiple terminal, thereby make enterprise reduce hardware acquisition cost by the mode of purchasing low side PC.In addition, because building with the work such as safeguarding of cloud computer all transfers to service provider to complete, also for enterprise has saved follow-up human cost.Aspect elasticity, in the time of business expansion, user can apply for that more cloud computer satisfies the demands rapidly; And in the time that business is shunk, as long as reduce renting of cloud computer, there will not be the idle of hardware resource.When current cloud computer configuration does not satisfy the demands, also can change easily configuration.
In view of above-mentioned advantage, more existing companies have carried out similar service.But for the higher scene of some safety requirements, for example, the O&M of production system etc., need to monitor operator's behavior, to guarantee the safe O&M of system.In order to guarantee safe O&M, the way adopting is at present that a monitoring software is installed on GOS, but that these softwares are easy to is bypassed, especially in the time that operator has administrator right.For example, the operation that operator can this software of temporary close, thus cannot monitor in real time.In addition, because monitoring software type is various, not that every kind of monitoring software can both be supported various operating system, therefore, may there is the situation that software is incompatible.
Summary of the invention
The disclosure has proposed new technical scheme in view of at least one in above problem.
The disclosure provides a kind of method that user's operation behavior is monitored aspect one, can guarantee user's operation behavior to monitor in real time.
The disclosure provides a kind of device that user's operation behavior is monitored on the other hand at it, can guarantee user's operation behavior to monitor in real time.
The disclosure provides a kind of cloud computer system at it aspect another, can guarantee user's operation behavior to monitor in real time.
According to the disclosure, a kind of method that user's operation behavior is monitored is provided, comprising:
Created virtual machine in cloud computer system after, receive Client-initiated monitoring request, in monitoring request, carry virtual machine identification information;
Obtain corresponding virtual video card according to virtual machine identification information;
According to setting-up time interval, the data of virtual video card are carried out to snapshot record, and be saved on different files;
Preserved file is carried out to duplicate removal operation, to delete identical snapshot document.
In embodiment more of the present disclosure, the method also comprises:
Remaining snapshot document is carried out to archival compression, to form complete video monitoring file.
In embodiment more of the present disclosure, preserved file is carried out to duplicate removal operation, comprise with the step of deleting identical snapshot document:
After the data of virtual video card being carried out to snapshot record, the snapshot document of new record and the snapshot document of the last record are compared at every turn;
If the snapshot document of adjacent twice is identical, delete the snapshot document of new record.
According to the disclosure, a kind of device that user's operation behavior is monitored is also provided, comprising:
Monitoring request reception unit, for after cloud computer system has created virtual machine, receives Client-initiated monitoring request, in monitoring request, carries virtual machine identification information;
Virtual video card acquiring unit, for obtaining corresponding virtual video card according to virtual machine identification information;
Snapshot record cell, for according to setting-up time interval, the data of virtual video card being carried out to snapshot record, and is saved on different files;
File duplicate removal unit, carries out duplicate removal operation for the file to preserved, to delete identical snapshot document.
In embodiment more of the present disclosure, this device also comprises:
Archival compression unit, for remaining snapshot document is carried out to archival compression, to form complete video monitoring file.
In embodiment more of the present disclosure, file duplicate removal unit comprises:
Snapshot document is subelement relatively, for after the data of virtual video card being carried out to snapshot record at every turn, the snapshot document of new record and the snapshot document of the last record is compared;
Delete and process subelement, if identical for the snapshot document of adjacent twice, delete the snapshot document of new record.
In technical scheme of the present disclosure, because being not is arranged on GOS inside by monitoring software, and be arranged on below GOS,, directly obtain monitor data by the virtual video card being connected with virtual machine, this mode can avoid the operator with manager authority to close monitoring function, and then causes monitoring operator's behavior in real time, has reduced the security of some application scenarios.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide further understanding of the disclosure, forms the application's a part.In the accompanying drawings:
Fig. 1 is the structural representation of disclosure cloud computer system.
Fig. 2 is the schematic flow sheet of the method that user's operation behavior is monitored of an embodiment of the disclosure.
Fig. 3 is the schematic flow sheet of the method that user's operation behavior is monitored of another embodiment of the disclosure.
Fig. 4 is the structural representation of the device that user's operation behavior is monitored of an embodiment of the disclosure.
Fig. 5 is the structural representation of the device that user's operation behavior is monitored of another embodiment of the disclosure.
Fig. 6 is the structural representation of the device that user's operation behavior is monitored of the another embodiment of the disclosure.
Fig. 7 is the structural representation of the cloud computer system of an embodiment of the disclosure.
Embodiment
The disclosure is described below with reference to accompanying drawings.Be noted that following being described in is only explanatory and exemplary in essence, never as any restriction to the disclosure and application or use.Unless stated otherwise, otherwise the parts of setting forth in an embodiment and the positioned opposite of step and numeral expression formula and numerical value do not limit the scope of the present disclosure.In addition, technology well known by persons skilled in the art, method and apparatus may not be discussed in detail, but are intended in appropriate circumstances become a part for instructions.
Inventor notices, the characteristics such as the low cost of cloud computing technology, high resiliency, easily deployment, easy care are that setting up of enterprise's IT infrastructure brings great convenience, therefore, a lot of enterprises wish from the operation mode of this IT of renting service, to obtain benefit, the enterprise of monitor service for example, is provided.
Current existing monitoring software is all mounted in GOS inside, and GOS allows to be used by operator, and therefore this just exists the risk that GOS is revised by operator.For example, if operator is familiar with the use of GOS, can close this monitoring software, cause monitoring normally to carry out.In addition, also have some monitoring softwares based on GOS to use some special instruction and environment, make with other application not compatible mutually.
Based on Hypervisor(, it is a kind of intermediate software layer operating between basic physics server and operating system to the following embodiment of the disclosure, can allow multiple operating system and application to share hardware, also be known as VMM) layer technology, GOS does not know that the own virtual hardware environment moving is is intercepted and captured completely, operator is more impossible carries out any action of forbidding monitoring, there is not any compatibility issue, as shown in Figure 1 yet.
Fig. 2 is the schematic flow sheet of the method that user's operation behavior is monitored of an embodiment of the disclosure.
As shown in Figure 2, this embodiment can comprise the following steps:
S202, after having created virtual machine, receives Client-initiated monitoring request in cloud computer system, in this monitoring request, carries virtual machine identification information;
S204, according to virtual machine identification information, inquiry obtains corresponding virtual video card;
S206, carries out snapshot record according to setting-up time interval to the data in virtual video card, and each snapshot record is saved on different files;
S208, carries out duplicate removal operation to preserved different files, to delete identical snapshot document.
In this embodiment, because being not is arranged on GOS inside by monitoring software, and be arranged on below GOS,, directly obtain monitor data by the virtual video card being connected with virtual machine, this mode can avoid the operator with manager authority to close monitoring function, and then causes monitoring operator's behavior in real time, has reduced the security of some application scenarios.
After step S208, can also carry out archival compression to remaining snapshot document, to form complete video monitoring file.
In step S208, preserved file is carried out to duplicate removal operation, can comprise with the step of deleting identical snapshot document:
After the data of virtual video card being carried out to snapshot record, the snapshot document of new record and the snapshot document of the last record are compared at every turn;
If the snapshot document of adjacent twice is identical, delete the snapshot document of new record.
Fig. 3 is the schematic flow sheet of the method that user's operation behavior is monitored of another embodiment of the disclosure.
As shown in Figure 3, this embodiment can comprise the following steps:
S302, cloud computer system is received the startup cloud computer request that user sends;
S304, cloud computer system creates a corresponding virtual machine on backstage according to the user profile in request;
S306, cloud computer system is received the monitoring request that user sends, and carries virtual machine mark in this monitoring request;
S308, cloud computer system obtains the virtual video card information of designated virtual machine according to virtual machine mark;
S310, cloud computer system is carried out snapshot record to the data in the virtual video card of virtual machine, and is saved on file;
S312, performs step S210 at set intervals, obtains continuous virtual video card snapshot document;
S314, because monitored picture may not change within a period of time, two continuous width or multi-picture are the same, therefore, need carry out duplicate removal operation to the each file in listed files,, delete duplicate snapshot document that is;
S316, carries out archival compression to remaining snapshot document, forms a video file.
Next, be described in detail by an instantiation.
Step 1, that suppose that virtual machine uses is VirtualBox, receives after user starts the request of cloud computer and can create a virtual machine when cloud computer system, call instruction is as follows:
VBoxManage?createvm--name<name>[--uuid<uuid>]
Wherein, in service in cloud computer system, cloud computer system can inquire the virtual machine moving at any time, and call instruction is as follows:
VBoxManage?list[--long|-l]vms|runningvms
Step 2, in the time that cloud computer system is received Client-initiated monitoring request, carries out sectional drawing operation to the data in the virtual video card of designated virtual machine, and call instruction is as follows:
VBoxManage?controlvm<uuid>screenshotpng<file>
Constantly perform step the operation of sectional drawing in two, will obtain a series of files, and the filename of these files is all take timestamp as suffix, for example, 142-sf-134134.20120404161345.Wherein, 142-sf-134134 is the UUID(Universal Unique Identifier of virtual machine, universal unique identifier), suffix 20120404161345 represents 16: 13: 45 on the 4th April in 2012.
Step 3, in the process of sectional drawing, scans these files in real time between two, if adjacent two pictures except acquisition time difference, image content is identical, deletes the file corresponding with a rear pictures.For example, if 142-sf-134134.20120404161345 is identical with the picture recording in 142-sf-134134.20120404161354, the latter is deleted, after processing by this series of duplicate removal, can obtain a series of new sectional drawing files, in this sectional drawing file, no longer comprise the pictorial information of the identical content of redundancy.
Duplicate removal process in step 3 and above-mentioned sectional drawing process are carried out simultaneously, and file can not accumulate excessive like this.
Step 4, carries out duplicate removal sectional drawing file packing after treatment by these and forms video file, can be for watch in the future.
One of ordinary skill in the art will appreciate that, whole and the part steps that realizes said method embodiment can complete by the relevant hardware of programmed instruction, aforesaid program can be stored in a computing equipment read/write memory medium, this program is in the time carrying out, execution comprises the step of said method embodiment, and aforesaid storage medium can comprise the various media that can be program code stored such as ROM, RAM, magnetic disc and CD.
Fig. 4 is the structural representation of the device that user's operation behavior is monitored of an embodiment of the disclosure.
As shown in Figure 4, the device 40 in this embodiment can comprise monitoring request reception unit 402, virtual video card acquiring unit 404, snapshot record cell 406 and file duplicate removal unit 408.Wherein,
Monitoring request reception unit 402, for after cloud computer system has created virtual machine, receives Client-initiated monitoring request, in monitoring request, carries virtual machine identification information;
Virtual video card acquiring unit 404, for obtaining corresponding virtual video card according to virtual machine identification information;
Snapshot record cell 406, for according to setting-up time interval, the data of virtual video card being carried out to snapshot record, and is saved on different files;
File duplicate removal unit 408, carries out duplicate removal operation for the file to preserved, to delete identical snapshot document.
In this embodiment, because being not is arranged on GOS inside by monitoring software, and be arranged on below GOS,, directly obtain monitor data by the virtual video card being connected with virtual machine, this mode can avoid the operator with manager authority to close monitoring function, and then causes monitoring operator's behavior in real time, has reduced the security of some application scenarios.
Fig. 5 is the structural representation of the device that user's operation behavior is monitored of another embodiment of the disclosure.
As shown in Figure 5, compared with embodiment in Fig. 4, the device 50 in this embodiment can also comprise:
Archival compression unit 502, for remaining snapshot document is carried out to archival compression, to form complete video monitoring file.
Fig. 6 is the structural representation of the device that user's operation behavior is monitored of the another embodiment of the disclosure.
As shown in Figure 6, compared with embodiment in Fig. 4, the file duplicate removal unit 602 in the device 60 in this embodiment can comprise relatively subelement 602a and delete and process subelement 602b of snapshot document.Wherein,
Snapshot document is subelement 602a relatively, for after the data of virtual video card being carried out to snapshot record at every turn, the snapshot document of new record and the snapshot document of the last record is compared;
Delete and process subelement 602b, if identical for the snapshot document of adjacent twice, delete the snapshot document of new record.
Fig. 7 is the structural representation of the cloud computer system of an embodiment of the disclosure.
As shown in Figure 7, the system 70 in this embodiment can comprise virtual machine 702 and virtual machine manager 704, can comprise the virtual video card 704a being connected with virtual machine 702 and the device 704b that user's operation behavior is monitored in virtual machine manager 704.
Wherein, device 704b user's operation behavior being monitored can utilize previous embodiment to realize.
In this instructions, each embodiment all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment that part identical with similar between each embodiment can cross-references.For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part can be referring to the explanation of embodiment of the method part.
Disclosure above-described embodiment, in the time that user's operation behavior is monitored, not only can make user's unaware, but also the person of being managed user does not control, and can realize video monitoring truly.
Although described the disclosure with reference to exemplary embodiment, should be understood that the disclosure is not limited to above-mentioned exemplary embodiment.It will be obvious to those skilled in the art that and can under the condition that does not deviate from the scope of the present disclosure and spirit, revise above-mentioned exemplary embodiment.The scope of appended claim should be endowed the widest explanation, with the 26S Proteasome Structure and Function that comprises all such modifications and be equal to.

Claims (7)

1. a method of user's operation behavior being monitored, is characterized in that, comprising:
Created virtual machine in cloud computer system after, receive Client-initiated monitoring request, in described monitoring request, carry virtual machine identification information;
Obtain corresponding virtual video card according to described virtual machine identification information;
According to setting-up time interval, the data of described virtual video card are carried out to snapshot record, and be saved on different files;
Preserved file is carried out to duplicate removal operation, to delete identical snapshot document.
2. the method that user's operation behavior is monitored according to claim 1, is characterized in that, described method also comprises:
Remaining snapshot document is carried out to archival compression, to form complete video monitoring file.
3. the method that user's operation behavior is monitored according to claim 1, is characterized in that, described preserved file is carried out to duplicate removal operation, comprises with the step of deleting identical snapshot document:
After the data of described virtual video card being carried out to snapshot record, the snapshot document of new record and the snapshot document of the last record are compared at every turn;
If the snapshot document of adjacent twice is identical, delete the snapshot document of new record.
4. a device of user's operation behavior being monitored, is characterized in that, comprising:
Monitoring request reception unit, for after cloud computer system has created virtual machine, receives Client-initiated monitoring request, in described monitoring request, carries virtual machine identification information;
Virtual video card acquiring unit, for obtaining corresponding virtual video card according to described virtual machine identification information;
Snapshot record cell, for according to setting-up time interval, the data of described virtual video card being carried out to snapshot record, and is saved on different files;
File duplicate removal unit, carries out duplicate removal operation for the file to preserved, to delete identical snapshot document.
5. the device that user's operation behavior is monitored according to claim 4, is characterized in that, also comprises:
Archival compression unit, for remaining snapshot document is carried out to archival compression, to form complete video monitoring file.
6. the device that user's operation behavior is monitored according to claim 4, is characterized in that, described file duplicate removal unit comprises:
Snapshot document is subelement relatively, for after the data of described virtual video card being carried out to snapshot record at every turn, the snapshot document of new record and the snapshot document of the last record is compared;
Delete and process subelement, if identical for the snapshot document of adjacent twice, delete the snapshot document of new record.
7. a cloud computer system, it is characterized in that, comprise virtual machine and virtual machine manager, comprise the device that user's operation behavior is monitored described in any one in the virtual video card that is connected with described virtual machine and claim 4-6 at described virtual machine manager.
CN201210572984.1A 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system Active CN103902422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210572984.1A CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210572984.1A CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Publications (2)

Publication Number Publication Date
CN103902422A true CN103902422A (en) 2014-07-02
CN103902422B CN103902422B (en) 2017-05-10

Family

ID=50993758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210572984.1A Active CN103902422B (en) 2012-12-25 2012-12-25 Method and device for monitoring user operation behaviors and cloud computer system

Country Status (1)

Country Link
CN (1) CN103902422B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108369487A (en) * 2015-11-25 2018-08-03 华睿泰科技有限责任公司 System and method for shooting snapshot in duplicate removal Virtual File System
CN108647284A (en) * 2018-05-03 2018-10-12 网易宝有限公司 Record method and device, medium and the computing device of user behavior
CN109074692A (en) * 2016-04-11 2018-12-21 开利公司 When interacting with multiple access control apparatus, capturing behavior user is intended to
WO2021012331A1 (en) * 2019-07-24 2021-01-28 南京智能制造研究院有限公司 Edge computing system and data storage method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101334751A (en) * 2007-06-29 2008-12-31 联想(北京)有限公司 Method and device for virtual machine monitor recognizing client operating system progress
WO2009052424A2 (en) * 2007-10-19 2009-04-23 Kubisys Inc. Virtual computing environments
CN101853346A (en) * 2009-03-31 2010-10-06 甲骨文美国公司 Virtual machine snapshot and damage suppress
CN101894150A (en) * 2010-07-05 2010-11-24 优视科技有限公司 Internet web page audio/video acquisition method and system for mobile communication equipment terminal
CN102713860A (en) * 2011-12-30 2012-10-03 华为技术有限公司 User experience index monitoring method and monitoring virtual machine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101334751A (en) * 2007-06-29 2008-12-31 联想(北京)有限公司 Method and device for virtual machine monitor recognizing client operating system progress
WO2009052424A2 (en) * 2007-10-19 2009-04-23 Kubisys Inc. Virtual computing environments
CN101853346A (en) * 2009-03-31 2010-10-06 甲骨文美国公司 Virtual machine snapshot and damage suppress
CN101894150A (en) * 2010-07-05 2010-11-24 优视科技有限公司 Internet web page audio/video acquisition method and system for mobile communication equipment terminal
CN102713860A (en) * 2011-12-30 2012-10-03 华为技术有限公司 User experience index monitoring method and monitoring virtual machine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
石晓东: "虚拟机在计算机网络教学中的应用", 《实习与教学 PRACTICE & TEACHING 交流平台》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108369487A (en) * 2015-11-25 2018-08-03 华睿泰科技有限责任公司 System and method for shooting snapshot in duplicate removal Virtual File System
CN108369487B (en) * 2015-11-25 2021-05-04 华睿泰科技有限责任公司 System and method for taking snapshots in a deduplicated virtual file system
CN109074692A (en) * 2016-04-11 2018-12-21 开利公司 When interacting with multiple access control apparatus, capturing behavior user is intended to
CN108647284A (en) * 2018-05-03 2018-10-12 网易宝有限公司 Record method and device, medium and the computing device of user behavior
WO2021012331A1 (en) * 2019-07-24 2021-01-28 南京智能制造研究院有限公司 Edge computing system and data storage method

Also Published As

Publication number Publication date
CN103902422B (en) 2017-05-10

Similar Documents

Publication Publication Date Title
US10114834B2 (en) Exogenous virtual machine synchronization and replication
CN102214127B (en) Method for intensively storing and backing up data based on operating system virtualization theory
CN107092538B (en) Virtual machine data backup method and system
US8448219B2 (en) Securely hosting workloads in virtual computing environments
CN109582443A (en) Virtual machine standby system based on distributed storage technology
CN102447723A (en) Client-side virtualization framework
US9836357B1 (en) Systems and methods for backing up heterogeneous virtual environments
US10754741B1 (en) Event-driven replication for migrating computing resources
CN102972010A (en) Switch method, apparatus and system for virtual application dual-machine in cloud environment
US9203700B2 (en) Monitoring client information in a shared environment
JP6663995B2 (en) System and method for backing up a large-scale distributed scale-out data system
CN103309720A (en) Virtual machine management system for maintaining virtual data center
CN112311646B (en) Hybrid cloud based on super-fusion system and deployment method
CN103902422B (en) Method and device for monitoring user operation behaviors and cloud computer system
CN111913663A (en) Storage volume online migration method and device and storage volume online migration system
AU2014290149A1 (en) Systems and methods for instantly restoring virtual machines in high input/output load environments
CN114003439B (en) Data backup method, device, equipment and storage medium
CN110134330B (en) Cloud disk migration system and method in multi-cloud environment
Coyne et al. IBM Software-Defined Storage Guide
US20210357239A1 (en) Methods and systems for managing computing virtual machine instances
CN110968444A (en) Data processing method and device of cloud computing platform
CN115080309A (en) Data backup system, method, storage medium, and electronic device
CN109324931B (en) Method for realizing vmware mount recovery in data de-duplication system
CN202652266U (en) Enterprise cloud computing common information service platform core architecture and system application
CN110543385A (en) Virtual backup method and virtual backup restoration method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant