CN104410683B - A kind of data back up method - Google Patents
A kind of data back up method Download PDFInfo
- Publication number
- CN104410683B CN104410683B CN201410675081.5A CN201410675081A CN104410683B CN 104410683 B CN104410683 B CN 104410683B CN 201410675081 A CN201410675081 A CN 201410675081A CN 104410683 B CN104410683 B CN 104410683B
- Authority
- CN
- China
- Prior art keywords
- backup
- data
- node
- file
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Abstract
The invention provides a kind of data back up method, the network data backup under cloud environment can be achieved.Each network node under cloud environment provides a data backup area, the Backup Data for storing other network nodes;The redundancy backup of particular case lower network data is carried out by disaster tolerance redundant storage center;Global control is carried out to the network data backup under cloud environment by cloud control centre, and the ability scoring screening of data backup can be periodically provided all-network node using the method based on probability statistics, to improve the efficiency of cloud environment lower network data backup.
Description
Technical field
The present invention relates to a kind of network data backup method under field of cloud computer technology, more particularly to cloud environment.
Background technology
Cloud environment, refers to cloud computing environment, cloud computing (Cloud Computing) is Distributed Calculation (Distrbuted
Computing), the development of parallel computation (Parallel Computing) and grid computing (Grid Computing), its base
Present principles are to perform calculating task to multiple stage computers by network allocation, and every computer is referred to as one of system for cloud computing
Network node.
Data backup as its name suggests, is exactly retained data in some way, to be wrecked or it in system
Under his particular case, a process being used again.Data recovery is exactly to occur in system under disaster scenario, by data also
Original is to a nearest state, with the normal operation of safeguards system.
With the rise of cloud computing, it is supplied to numerous clients to use increasingly using data backup as a kind of mode of service
Welcome by user, this backup services can be described as the network data backup under cloud environment.Compared with traditional backup, cloud environment
Under network data backup have many advantages, such as.First, the installation of the network data backup under cloud environment, using, safeguard all compare
Traditional backup software is easier.Usual user only needs to install the client or plug-in unit of exquisiteness in modem, appoints by setting
After business, both file data can be backed up according to backup interval on a daily or weekly basis, can also be according to the actual demand of user
Data backup is carried out in real time.Secondly, as a kind of network service, the network data backup under cloud environment solves data in itself
Long-distance disaster problem, solve the technical barrier that user voluntarily builds disaster tolerant backup system.Meanwhile, with general backup phase
Than the network data backup under cloud environment more focuses on the security of data transfer and data storage.Data are generally in the mistake of transmission
Cheng Jiami, the data backed up are responsible for safeguarding its storage and access security by professional service manufacturer.In addition, user is according only to institute
The backup services asked for are paid, when that need not service user's free time, it is not necessary to paid the extra hardware and software of waste and taken
With, and the retractility serviced is very strong, and user can ask different services different when, without worrying software and hardware
Upgrade problem, these problems are managed and safeguarded by the service facility of specialty, and user is paid according only to service.
Because cloud environment is a complicated network environment, and the network data backup process under cloud environment also tends to compare
Complexity, it is related to the coordination to all-network node and control, while also to take into account efficiency and cost.
The content of the invention
In order to be optimized to the network data backup process under cloud environment, solve under cloud environment between all-network node
Cooperation controlling problem, solve the problems, such as the disaster tolerance redundancy backup of data under cloud environment;And in order to improve cloud environment lower network number
According to the efficiency of backup:
The present invention proposes a kind of data back up method, and this method can realize the network data backup under cloud environment.Wherein:
Network data backup process under the cloud environment comprises the following steps:
Step 1:The data backup requests of user's local node are received, the data backup requests are carried in data to be backed up
The newest modification time and newest BACKUP TIME of each file;
Step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Step 3:Data to be backed up are compressed;
Step 4:The data of compression are encrypted;
Step 5:Select the network node under cloud environment as the destination node of data backup, data to be backed up are uploaded to
Selected destination node;
Step 6:Selected destination node is received after data to be backed up, and data are decrypted and decompressed successively,
By the data storage after decompression in the data backup area of the destination node;
Wherein, the compression algorithm, encryption/decryption algorithm are all pre-defined, and the all-networks under cloud environment
Nodes sharing.
Further, each network node under cloud environment has a data backup area and a backup list;
The data backup area is used to back up in the backup data files from other network nodes, the data backup area
All backup data files stored with the form of the Backup Data block of fixed size;
When the network node data backup area residual memory space be less than or equal to threshold value T_node when, forbid to
The network node carries out data backup;
Threshold value T_node value can be the 10% of the data backup area total memory capacity of current network node;
The backup list have recorded BACKUP TIME, fileinfo and the verification of each file in the data backup area
Value, the fileinfo includes the filename, file size and blocking information of this document.
Further, it is further comprising the steps of before step 3:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under
Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the net under cloud environment
Network data backup, issues the user with prompting;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that in some file
Containing the content for forbidding uploading, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to enter the ring that racks simultaneously
Network data backup under border;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret
The data that reason is backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
The network identity of user node, user name, operating right, the mark for whether completing full backup and each standby
The fileinfo of part file;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file are big
Whether small, file check value, file forbid whether the mark uploaded, file complete the mark backed up.
Further, in the step 5, the cloud control centre C_center and disaster tolerance redundant storage in cloud environment are utilized
Center S_center carries out global control to the data backup under cloud environment, wherein:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node,
Backup services quality list QB_list includes the backup services quality for the data backup that all n network nodes can be provided
Scoring;All n network nodes of cloud control centre C_center routine tests can provide the backup services of data backup
Quality score, backup services quality list QB_list described in updating maintenance, and all n network nodes can be provided by it
The backup services quality score of data backup is from high to low sequence;
The cloud control centre C_center, which carries out global control process to the data backup under cloud environment, includes following step
Suddenly:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, is treated successively to described
Each file in Backup Data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of the data of other network nodes of the check value of this document with inquiring in user's local node are standby
The check value of file of the same name in part area is compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value can be cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to net
Network node can provide the backup services quality score of data backup and be scored one network of highest from high to low sequential selection
Node as data backup destination node;
Step QB3:If the capacity in the data backup area of current target node ensure that completion, the data backup please
The backup of middle All Files is asked, then the All Files in the data backup requests is backed up into current target node, Ran Houjie
Beam;Otherwise, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_
During node, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then,
The backup services quality score of data backup can be provided from the high to low next network section of sequential selection according to network node
The file that interruption is backed up in current target node is backed up to next destination node by point again as next destination node, and will
The remaining file that is not backed up continues to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
Threshold value T_max represents the maximum for allowing the single file of storage to be taken up space in the data backup area of network node
Value;
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user
The redundancy backup that big file in data to be backed up is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to being used as data backup
While the network node of destination node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center
S_center。
Further, in steps of 5, it is described data to be backed up are uploaded to selected destination node to include:User's sheet
The All Files piecemeal of each file in the data to be backed up of user is uploaded to the target as data backup by ground node successively
The network node of node, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool in user's local node, it is pending for storing
Send data block;
Step 5.2:Each file in the data to be backed up of user is divided into file according to fixed word joint number L0 successively
Piecemeal formation data block, buffer pool is sequentially stored into by the data block;If last block number of some file according to byte number less than L0,
Also serve as a data block reading;
Step 5.3:The read block from buffer pool, sends to the net of the destination node as data backup successively
Network node, until the data to be backed up are all sent.
Further, in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The length L of buffer pool span is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
Further, the backup services quality score si of the network node i is calculated as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v can for the data backup area of network node
With storage space volume, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p pays for service
Take standard.
Further, the cloud control centre C_center periodically screens out backup services quality score exception with cycle T
Network node, comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ...
Si ..., sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);Wherein, si represents network section
Point i backup services quality score;
Step B2:The time series S (1), S of the backup services quality score vector S are periodically generated according to cycle T
(2) ... S (j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) was represented j-th cycle
Backup services quality score vector, si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, S (j) predicted vector is defined
For PS (j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is 0.25, PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of errors
Vectorial EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are 0.15, EB_2 (0)=0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error is calculated
Vectorial EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is 0.05, EB_3 (0)=0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with setting in advance
Fixed backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is at this corresponding to the component
The backup services quality score in cycle is abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added
Enter backup node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to institute
State disaster tolerance redundant storage center S_center.
Further, the step B3 also includes:
Step B3.5:The cloud control centre C_center is with backup node blacklist list described in cycle T periodic scanning
B_black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described
Deleted in backup node blacklist list B_black.
The beneficial effects of the present invention are:The network data backup process under cloud environment is optimized, institute under cloud environment is solved
There is the control cooperation problem between network node;The disaster tolerance redundancy backup of cloud environment lower network data is solved the problems, such as simultaneously;Also
The efficiency of cloud environment lower network data backup can be improved.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings:
Fig. 1 is the system construction drawing of the network data backup under cloud environment of the present invention;
Fig. 2 is the flow chart of the network data backup under cloud environment of the present invention.
Embodiment
The present invention proposes a kind of data back up method, and this method can realize the network data backup under cloud environment.
Below in conjunction with the accompanying drawings and specific embodiment, the present invention is further described in detail, but not as to this hair
Bright restriction.
Fig. 1 is the network data recovery under the system construction drawing of the network data backup under cloud environment of the present invention, cloud environment
System architecture it is identical with this.
As shown in figure 1, the present invention proposes a kind of data back up method, the network data backup under cloud environment can be achieved,
Specifically:The system of the present invention is main by the network node under the cloud environment being connected with each other by network and cloud control centre C_
Center, the parts of disaster tolerance redundant storage center S_center tri- composition.
In order to realize the monitoring and the disaster tolerance redundancy backup of data and recovery of the overall situation, the present invention utilizes the cloud control in cloud environment
Center C_center processed and disaster tolerance redundant storage center S_center are controlled to the data backup and resume under cloud environment.Always
For body, because the cloud control centre C_center and disaster tolerance redundant storage center S_center has Relatively centralized
Function, be only used for completing specific control, backup tasks, therefore can neither consume excessively huge memory space;And
The back up memory space of network data backup and data recovery under cloud environment, mainly numerous network nodes under cloud environment
In data backup area realize.
The preferred network position of network data backup and data recovery of user's local node under cloud environment is target section
Point, in order to improve the network data backup under cloud environment and the efficiency of data recovery, the present invention is in data backup and data recovery
During used service quality scoring, pass through the backup services quality list QB_list and network section of network node
The recovery service quality list QR_list of point, routine test all-network node can provide the backup services matter of data backup
Amount scoring, backup services quality list QB_list described in updating maintenance and recovery service quality list QR_list, and will be all
Network node scores from high to low sequence by its backup/restoration service quality that can provide data backup/data recovery.
The cloud control centre C_center carries out control of overall importance to the network data backup under cloud environment and data recovery
System.The cloud control centre C_center routine test all-networks node can provide the standby of data backup and data recovery
Part and recovery service quality scoring, updating maintenance backup services quality list QB_list and recovery service quality list QR_list
To select the destination node of data backup and data recovery;Meanwhile, to network node each other and network node and appearance
Calamity redundant storage center S_center network data transmission is controlled.
The cloud control centre C_center can also be replicated according to the situation of change of network node, mobile or deletion institute
State the copy of data backup.
Cloud control centre C_center in the present invention is different from general high in the clouds backup server, and its major function is not
For storing Backup Data, and the control function of cloud environment lower network is simply concentrated.It is superfluous for the data disaster tolerance under cloud environment
It is remaining, then handled by disaster tolerance redundant storage center S_center.
The effect of the disaster tolerance redundant storage center S_center is not that the complete mirror image of all-network Backup Data is superfluous
Remaining (demand so for memory space is huge, is also what is be difficult to), the redundancy that it is mainly used in some special datas is standby
Part.Such as, redundancy backup is carried out to the file of some super larges, or when some network nodes are not suitable for the mesh as data backup
When marking node, the Backup Data in such network node can be copied to the disaster tolerance redundant storage center S_center.
All-network node under the cloud environment all has identical or similar structure.The data backup and
Data recovery both can be regular or automatic, can in real time be carried out by the actual demand of user again.The data of the present invention are standby
Part method mainly carries out data backup using the network node under cloud environment to the data of user node.
It is in data backup and data recovery procedure, the network data under cloud environment is standby for the sake of the convenience of statement
Part, the target network node of data recovery are referred to as destination node.Obviously, the collection of destination node be combined into except user's local node it
The a subset of outer other all-network nodes composition set.And the physical arrangement of user's local node and all destination nodes
It is identical, the network site residing under cloud environment is also complete equity, and user's local node may also be used as other nets
Data backup, the destination node of data recovery under network node progress cloud environment.
The network node under cloud environment in the present invention refers to all terminal device kimonos that can be networked under cloud environment
Business device, specific networking mode both can be by wired connection or by wireless connection.
In order to ensure the security of data transfer in network transmission, carry out before network data backup, need under cloud environment
File in Backup Data is compressed and encrypted successively;Correspondingly, when from restoring user data under cloud environment,
Need to be decrypted and decompress successively to receiving the file in data.
In the present invention, the logic unit of data backup and data recovery under cloud environment is all single file;And in reality
Network transmission in, file block is transmitted, i.e., by file division be fixed size data block.Entering the ring that racks
During data backup under border, in order to improve parallel efficiency, the operating system of user's local node can set multiple upload threads,
Each thread that uploads controls a upload queue, and each uploading queue can control the upload of multiple files to back up;Similarly, exist
When carrying out the data recovery under cloud environment, the operating system of user's local node can set multiple download threads, each to download
Thread controls a download queue, and each downloading queue can control the download of multiple files to recover.
In the data backup and data recovery procedure, a storage region is provided separately in each network node, uses
In the Backup Data for storing other network nodes;When other network nodes propose data recovery request when, from the storage region to
The network node filed a request recovers data.Certainly, in some cases, the disaster tolerance redundant storage center S_center also may be used
Using the destination address as network data backup and data recovery.
It is standby that the storage region that can provide data backup function that each network node under cloud environment has is referred to as data
Part area, and each network node also has a backup list.Specifically:
The size in the data backup area of each network node is set according to the actual conditions of the network node.Example
Such as:If network node, which is one, has the file server of a large amount of memory spaces, then it will be apparent that the network node can be carried
It is that other numerous network nodes under cloud environment carry out data backup service for the data backup area of a larger capacity;And it is right
In some personal network's terminals, such as PC or notebook computer, its memory space is relatively limited, and that can provide one
The individual data backup area compared with low capacity.
Although the size in the data backup area of each network node is not quite similar, its process for carrying out data backup is
Identical, the data backup area of each network node is used to back up the backup data files from other network nodes,
And all backup data files in the data backup area are stored with the form of the Backup Data block of fixed size.
And in order to prevent in Backup Data, overflow as the space in the data backup area of the network node of destination node
Go out, each network node can be that its data backup area sets a threshold value T_node for preventing from overflowing according to actual conditions,
When other network nodes are to the network node Backup Data, once find the network node of the destination node as data backup
When the residual memory space in data backup area is less than or equal to threshold value T_node set in advance, then forbid entering to the network node
Row data backup.The value of the threshold value T_node could be arranged to the data backup area total memory capacity for current network node
5%~15%, it is preferable that could be arranged to 10%.
In addition, in order to which the process to data backup is recorded, each network node also has a backup list, described
Backup list have recorded BACKUP TIME, fileinfo and the check value of each file in the data backup area, the file letter
Breath includes the filename, file size and blocking information of this document.
Fig. 2 describes the basic procedure of the network data backup under cloud environment of the present invention.
As shown in Fig. 2 a kind of data back up method proposed by the present invention can realize the network data backup under cloud environment, institute
The network data backup process stated under cloud environment comprises the following steps:
Data backup step 1:The data backup requests of user's local node are received, the data backup requests carry and treat standby
The newest modification time and newest BACKUP TIME of number each file in;
Data backup step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Data backup step 3:Data to be backed up are compressed;
Data backup step 4:The data of compression are encrypted;
Data backup step 5:The network node under cloud environment is selected as the destination node of data backup, by number to be backed up
According to being uploaded to selected destination node;
Data backup step 6:Selected destination node is received after data to be backed up, data are decrypted successively and
Decompression, by the data storage after decompression in the data backup area of the destination node.
Compression algorithm, AES in above-mentioned steps are all pre-defined, and the all-network section under cloud environment
Point is shared.
Network data recovery process under the cloud environment comprises the following steps:
Data restoration step I:Receive to include in the data recovery request of user's local node, the data recovery request and treat
Recover the filename of data;
Data restoration step II:Select the network node under cloud environment as the destination node for data recovery, will treat
Recover data and be downloaded to user's local node from selected destination node;
Data restoration step III:The data to be restored of download are decrypted;
Data restoration step IV:The data of decryption are decompressed;
Data restoration step V:According to the data after decryption and decompression, the file in data to be restored is obtained;
Decipherment algorithm, decompression algorithm in above-mentioned steps are all pre-defined, and the all-networks under cloud environment
Nodes sharing.
Simply simply describe the network data backup under cloud environment and the most basic flow of data recovery above, below it is right
Above-mentioned data backup and data recovery procedure are further limited.
It is further comprising the steps of during network data backup under the cloud environment:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under
Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the net under cloud environment
Network data backup, issues the user with prompting;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that in some file
Containing the content for forbidding uploading, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to enter the ring that racks simultaneously
Network data backup under border;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret
The data that reason is backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
The network identity of user node, user name, operating right, the mark for whether completing full backup and each standby
The fileinfo of part file;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file are big
Whether small, file check value, file forbid whether the mark uploaded, file complete the mark backed up.
It is further comprising the steps of during network data recovery under the cloud environment:
Step N1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under
Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess download permission, then user is forbidden to carry out the net under cloud environment
Network data recovery, issues the user with prompting;
Step N2:Security sweep is carried out to each file that user obtains, if it find that containing what is forbidden in some file
Content, then intercept this document and mark, issue the user with prompting;
The content forbidden includes:Unlawful data, bad data, harmful data, and/or may to reveal individual subscriber hidden
Private data;
Step N3:The recovery log information of the network data recovery behavior of user is recorded, the recovery log information includes:
The network identity of user node, user name, operating right, recover the time started, recover the end time, whether complete
The mark of full recovery and each fileinfo for recovering file;
Wherein, each fileinfo for recovering file includes:Filename, file format, file size, file download recover
Whether source address, the check value of file, file access pattern time started, file access pattern end time, file complete the mark recovered
Know.
In the present invention, pass through S_center pairs of the cloud control centre C_center in cloud environment and disaster tolerance redundant storage center
Data backup and resume under cloud environment carries out global control.The disaster tolerance redundant storage center S_center can be standby to data
Big file during part carries out redundancy backup, specifically, and being represented with threshold value T_max in the data backup area of network node allows
The maximum that the single file of storage is taken up space.If the file size in the data to be backed up of user exceedes the threshold value
T_max, then the disaster tolerance redundant storage center S_center is by the redundancy backup synchronized.
Specifically, for the data backup procedure under cloud environment:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node,
Backup services quality list QB_list includes the backup services quality for the data backup that all n network nodes can be provided
Scoring;All n network nodes of cloud control centre C_center routine tests can provide the backup services of data backup
Quality score, backup services quality list QB_list described in updating maintenance, and all n network nodes can be provided by it
The backup services quality score of data backup is from high to low sequence.
The cloud control centre C_center, which carries out global control process to the data backup under cloud environment, includes following step
Suddenly:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, is treated successively to described
Each file in Backup Data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of the data of other network nodes of the check value of this document with inquiring in user's local node are standby
The check value of file of the same name in part area is compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value can be cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to net
Network node can provide the backup services quality score of data backup and be scored one network of highest from high to low sequential selection
Node as data backup destination node;
Step QB3:If the capacity in the data backup area of current target node ensure that completion, the data backup please
The backup of middle All Files is asked, then the All Files in the data backup requests is backed up into current target node, Ran Houjie
Beam;Otherwise, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_
During node, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then,
The backup services quality score of data backup can be provided from the high to low next network section of sequential selection according to network node
The file that interruption is backed up in current target node is backed up to next destination node by point again as next destination node, and will
The remaining file that is not backed up continues to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user
The redundancy backup that big file in data to be backed up is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to being used as data backup
While the network node of destination node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center
S_center;
Specifically, for the data recovery procedure under cloud environment:
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user
Big file in data to be restored is recovered, including:
If there is the file that size is more than threshold value T_max in the data to be restored, user's local node will be direct
Downloaded from the disaster tolerance redundant storage center S_center and recover this document;
The cloud control centre C_center, which carries out global control process to the data recovery under cloud environment, includes following step
Suddenly:
Step QR1:The cloud control centre C_center is received after the data recovery request of user, according to the data
Each filename in the data to be restored included in recovery request, inquiring about in the disaster tolerance redundant storage center S_center is
The no data backup that there is this document;Recover described if it is present being downloaded from the disaster tolerance redundant storage center S_center
File;
Step QR2:For not recovering file in the data recovery request, the cloud control centre C_center according to
The each filename for not recovering file included in the data recovery request, inquires about the data of every other network node successively
The data backup of file is not recovered in backup area with the presence or absence of this;
If it find that there is the data backup for not recovering file in the data backup area of a network node, then by the net
The BACKUP TIME of this document recorded in the backup list of network address of node information and the network node is sent to number of request
According to user's local node of recovery;
Step QR3:User's local node does not recover text according to being sent the cloud control centre C_center
The address information of network node where part, downloads from the network node and does not recover file described in recovering, until completing described
Data recovery request;
Wherein, in step QR3, if one is not recovered file and has time different multiple data backups, point out
User is according to BACKUP TIME selective recovery this document of this document;If user does not make a choice, acquiescence automatically selects extensive
The newest backup of multiple this document.
Preferably, in steps of 5, it is described data to be backed up are uploaded to selected destination node to include:User is local
The All Files piecemeal of each file in the data to be backed up of user is uploaded to the target section as data backup by node successively
The network node of point, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool is sent in user's local node, for storing
Data block to be sent;
Step 5.2:Each file in the data to be backed up of user is divided into file according to fixed word joint number L0 successively
Piecemeal formation data block, transmission buffer pool is sequentially stored into by the data block;If last block number of some file according to byte number not
Sufficient L0, also serves as a data block reading;
Step 5.3:The read block from buffer pool is sent, sends to the destination node as data backup successively
Network node, until the data to be backed up are all sent.
Preferably, in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The span of the length L for sending buffer pool is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
For the network data backup process under cloud environment, the backup services quality score si of the network node i is calculated
It is as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v can for the data backup area of network node
With storage space volume, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p pays for service
Take standard.The backup services quality score si of network node i initial value could be arranged to 0.
The cloud control centre C_center uses the method based on probability statistics, every with fixed cycle T periodic detection
The network node of the individual destination node as data backup can provide the backup services quality score of data backup, to screen out
The abnormal network node of backup services quality score, so that the network data backup efficiency under improving cloud environment.Assuming that si is represented
Network node i backup services quality score, the sum of network node is n, and this method comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ...
Si ..., sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);
As described above, the initial value that all-network node can provide the backup services quality score of data backup is all 0,
And the backup services quality score can be over time change and change.
Under cloud environment, the sum of network node, can be with for the network node increase newly/exited it is possible that change
Increase/delete the backup services quality score corresponding to the network node in real time in the backup services quality score vector S;
So that the quantity of the component in the backup services quality score vector S is equal to the network node quantity under cloud environment.Specifically,
If a network node exits cloud environment, the network node should be deleted in the rhythmic backup services quality score vector of institute
Corresponding backup services quality score in S.
Step B2:The time series S (1), S of the backup services quality score vector S are periodically generated according to cycle T
(2) ... S (j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) was represented j-th cycle
Backup services quality score vector, si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
In following formula, symbol " " represents coefficient and multiplication of vectors, i.e., each point in vector is multiplied by with coefficient
Amount;Symbol " | " represents to take absolute value to each component in vector.
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, S (j) predicted vector is defined
For PS (j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is preferably 0.25, can also be set according to specific actual conditions;PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of errors
Vectorial EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are preferably 0.15, can also be set according to specific actual conditions;EB_2(0)
=0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error is calculated
Vectorial EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is preferably 0.05, can also be set according to specific actual conditions;EB_3(0)
=0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with setting in advance
Fixed backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is at this corresponding to the component
The backup services quality score in cycle is abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added
Enter backup node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to institute
State disaster tolerance redundant storage center S_center.
In the present invention, the calculating of three-level error vector is passed through, it is possible to reduce the mistake that direct, simple error vector compares
Difference, improves the accuracy of detection.
For above-mentioned backup services error threshold T_EB, can specifically it be set according to actual conditions, it is specific to set former
It is then:Pass through the setting of the backup services error threshold so that under cloud environment in all-network node, backup services quality score
Controlled for abnormal number of nodes in a rational scope.For example so that abnormal network node quantity is controlled all the time
Within the 20% of the cloud environment lower network node total number.
The step B3 can further include:
Step B3.5:The cloud control centre C_center is with backup node blacklist list described in cycle T periodic scanning
B_black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described
Deleted in backup node blacklist list B_black.
Similarly, for above-mentioned threshold value T_EB, can also specifically it be set according to actual conditions, specific setting principle
For:Pass through the setting of the threshold value so that under cloud environment, the number of nodes control in the backup node blacklist list B_black
System is in a rational scope.For example so that the number of nodes in the backup node blacklist list B_black is controlled all the time
System is within the 10% of the cloud environment lower network node total number.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field
Technical staff, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all
Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.
Claims (6)
1. a kind of data back up method, can be achieved the network data backup under cloud environment, it is characterised in that:This method includes following
Step:
Step 1:The data backup requests of user's local node are received, the data backup requests carry each in data to be backed up
The newest modification time and newest BACKUP TIME of file;
Step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Step 3:Data to be backed up are compressed;
Step 4:The data of compression are encrypted;
Step 5:Select the network node under cloud environment as the destination node of data backup, data to be backed up are uploaded to selected
The destination node selected;
Step 6:Selected destination node is received after data to be backed up, and data are decrypted and decompressed successively, will be solved
Data storage after compression is in the data backup area of the destination node;
Wherein, the compression algorithm, encryption/decryption algorithm are all pre-defined, and the all-network node under cloud environment
It is shared;
Each network node under cloud environment has a data backup area and a backup list;
The data backup area is used to back up the institute in the backup data files from other network nodes, the data backup area
There are backup data files and stored with the form of the Backup Data block of fixed size;
When the residual memory space in the data backup area of the network node is less than or equal to threshold value T_node, forbid to the net
Network node carries out data backup;
Threshold value T_node value is the 10% of the data backup area total memory capacity of current network node;
The backup list have recorded BACKUP TIME, fileinfo and the check value of each file in the data backup area, institute
Stating fileinfo includes the filename, file size and blocking information of this document;
It is further comprising the steps of before step 3:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, download, create
Build, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the network number under cloud environment
According to backup, prompting is issued the user with;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that containing in some file
Forbid the content uploaded, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to carry out under cloud environment simultaneously
Network data backup;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret
The data backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
Network identity, user name, operating right, the mark for whether completing full backup and each backup text of user node
The fileinfo of part;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file size,
Whether check value, the file of file forbid whether the mark uploaded, file complete the mark backed up;
In the step 5, the cloud control centre C_center in cloud environment and disaster tolerance redundant storage center S_center are utilized
Global control is carried out to the data backup under cloud environment, wherein:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node, and this is standby
Part service quality list QB_list includes the backup services quality score for the data backup that all n network nodes can be provided;
The backup services quality that all n network nodes of cloud control centre C_center routine tests can provide data backup is commented
Point, backup services quality list QB_list described in updating maintenance, and it is standby by all n network nodes by it can to provide data
Part backup services quality score from high to low sequence;
The cloud control centre C_center carries out global control process to the data backup under cloud environment and comprised the following steps:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, successively to described to be backed up
Each file in data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of by the data backup area of the check value of this document in user's local node and other network nodes inquired
In the check value of file of the same name be compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value is cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to network section
Point can provide the backup services quality score of data backup and be scored one network node of highest from high to low sequential selection
It is used as the destination node of data backup;
Step QB3:If the capacity in the data backup area of current target node ensure that in the completion data backup requests
The backup of All Files, then back up to current target node by the All Files in the data backup requests, then terminate;It is no
Then, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_node
When, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then, according to
The backup services quality score that network node can provide data backup is made from the high to low next network node of sequential selection
For next destination node, the file that interruption is backed up in current target node is backed up into next destination node again, and by residue
The file that is not backed up continue to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
Threshold value T_max represents the maximum for allowing the single file of storage to be taken up space in the data backup area of network node;
The multilevel iudge of the disaster tolerance redundant storage center S_center combination threshold values T_max, to the number to be backed up of user
The redundancy backup that big file in is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to the target as data backup
While the network node of node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center S_
center。
2. data back up method according to claim 1, it is characterised in that:In steps of 5, it is described by data to be backed up
Reaching selected destination node includes:User's local node is successively by all texts of each file in the data to be backed up of user
Part piecemeal is uploaded to the network node of the destination node as data backup, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool in user's local node, for storing number to be sent
According to block;
Step 5.2:Each file in the data to be backed up of user is divided into file block according to fixed word joint number L0 successively
Data block is formed, the data block is sequentially stored into buffer pool;If last block number of some file, less than L0, is also made according to byte number
Read for a data block;
Step 5.3:The read block from buffer pool, sends to the network section of the destination node as data backup successively
Point, until the data to be backed up are all sent.
3. data back up method according to claim 2, it is characterised in that in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The length L of buffer pool span is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
4. data back up method according to claim 3, it is characterised in that:
The backup services quality score si of the network node i is calculated as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v deposits for the available of data backup area of network node
Spatial content is stored up, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p is services pay mark
It is accurate.
5. the data back up method according to any one of claim 1-4, it is characterised in that:The cloud control centre C_
Center periodically screens out the abnormal network node of backup services quality score with cycle T, comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ... si ...,
Sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);Wherein, si represents network node i's
Backup services quality score;
Step B2:Time series S (1), the S (2) of the backup services quality score vector S are periodically generated according to cycle T ... S
(j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) represents the backup clothes j-th cycle
Being engaged in, quality score is vectorial, and si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, the predicted vector for defining S (j) is PS
(j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is 0.25, PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of error vectors
EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are 0.15, EB_2 (0)=0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error vector is calculated
EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is 0.05, EB_3 (0)=0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with it is set in advance
Backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is in the cycle corresponding to the component
Backup services quality score be abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added standby
Part node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to the appearance
Calamity redundant storage center S_center.
6. data back up method according to claim 5, it is characterised in that:The step B3 also includes:
Step B3.5:The cloud control centre C_center is with backup node blacklist list B_ described in cycle T periodic scanning
Black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described standby
Deleted in part node blacklist list B_black.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410675081.5A CN104410683B (en) | 2014-11-21 | 2014-11-21 | A kind of data back up method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410675081.5A CN104410683B (en) | 2014-11-21 | 2014-11-21 | A kind of data back up method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104410683A CN104410683A (en) | 2015-03-11 |
CN104410683B true CN104410683B (en) | 2017-10-17 |
Family
ID=52648281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410675081.5A Active CN104410683B (en) | 2014-11-21 | 2014-11-21 | A kind of data back up method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104410683B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105120003B (en) * | 2015-09-10 | 2019-01-01 | 浪潮(北京)电子信息产业有限公司 | A kind of method for realizing data backup under cloud environment |
WO2017117809A1 (en) * | 2016-01-08 | 2017-07-13 | 王晓光 | Video network uploading method and system |
CN106503556A (en) * | 2016-10-25 | 2017-03-15 | 广东欧珀移动通信有限公司 | The method of data storage, apparatus and system |
CN106648970A (en) * | 2016-11-04 | 2017-05-10 | 北京华为数字技术有限公司 | File backup method and distributed file system |
CN108279996A (en) * | 2018-01-17 | 2018-07-13 | 链家网(北京)科技有限公司 | A kind of high in the clouds data backup processing method and device |
CN108459926B (en) * | 2018-02-26 | 2020-05-15 | 新华三技术有限公司 | Data remote backup method and device and computer readable medium |
CN110568992A (en) * | 2018-06-06 | 2019-12-13 | 华为技术有限公司 | data processing device and method |
CN110635927B (en) * | 2018-06-21 | 2022-08-19 | 中兴通讯股份有限公司 | Node switching method, network node and network system |
CN110191149B (en) * | 2019-04-03 | 2020-01-31 | 特斯联(北京)科技有限公司 | file storage and retrieval method and device |
CN110471794A (en) * | 2019-07-23 | 2019-11-19 | 深圳康佳电子科技有限公司 | Support network storage method, system and the storage medium of data backup |
CN110493339B (en) * | 2019-08-20 | 2022-02-25 | 曾亮 | Distributed remote storage management method, system and device |
CN110597778B (en) * | 2019-09-11 | 2022-04-22 | 北京宝兰德软件股份有限公司 | Distributed file backup and monitoring method and device |
CN112000514B (en) * | 2020-05-28 | 2022-07-08 | 苏州浪潮智能科技有限公司 | Data backup recommendation method and system for storing user data in storage device |
CN111880967A (en) * | 2020-07-28 | 2020-11-03 | 平安科技(深圳)有限公司 | File backup method, device, medium and electronic equipment in cloud scene |
CN112953803B (en) * | 2021-02-10 | 2022-07-08 | 西南电子技术研究所(中国电子科技集团公司第十研究所) | Airborne redundant network data transmission method |
CN115640170B (en) * | 2022-12-26 | 2023-03-21 | 交通运输部公路科学研究所 | Big data synchronous backup and verification method |
CN116974827B (en) * | 2023-09-25 | 2024-01-16 | 北京装库创意科技有限公司 | Cloud big data storage management method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102281314A (en) * | 2011-01-30 | 2011-12-14 | 程旭 | Realization method and apparatus for high-efficient and safe data cloud storage system |
CN102306114A (en) * | 2010-09-25 | 2012-01-04 | 广东电子工业研究院有限公司 | Regular data backup and recovery method based on cloud storage |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2013277351A1 (en) * | 2012-06-18 | 2015-01-22 | Actifio, Inc. | Enhanced data management virtualization system |
-
2014
- 2014-11-21 CN CN201410675081.5A patent/CN104410683B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306114A (en) * | 2010-09-25 | 2012-01-04 | 广东电子工业研究院有限公司 | Regular data backup and recovery method based on cloud storage |
CN102281314A (en) * | 2011-01-30 | 2011-12-14 | 程旭 | Realization method and apparatus for high-efficient and safe data cloud storage system |
Also Published As
Publication number | Publication date |
---|---|
CN104410683A (en) | 2015-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104410683B (en) | A kind of data back up method | |
CN104331346B (en) | A kind of data guard method | |
CN105120003B (en) | A kind of method for realizing data backup under cloud environment | |
CN104331345B (en) | A kind of data reconstruction method | |
US11651075B2 (en) | Extensible attack monitoring by a storage system | |
US11657146B2 (en) | Compressibility metric-based detection of a ransomware threat to a storage system | |
US11256558B1 (en) | Prioritized data rebuilding in a dispersed storage network based on consistency requirements | |
US11720692B2 (en) | Hardware token based management of recovery datasets for a storage system | |
US11720714B2 (en) | Inter-I/O relationship based detection of a security threat to a storage system | |
US20210397711A1 (en) | Detection of Writing to a Non-header Portion of a File as an Indicator of a Possible Ransomware Attack Against a Storage System | |
US11687418B2 (en) | Automatic generation of recovery plans specific to individual storage elements | |
CN103929467B (en) | The data storage service of safe distribution on line formula | |
US20170250809A1 (en) | Cryptographic key storage in a dispersed storage network | |
US20180293024A1 (en) | Dynamic retention policies and optional deletes | |
US20230062383A1 (en) | Encryption Indicator-based Retention of Recovery Datasets for a Storage System | |
US20220083657A1 (en) | Independent Security Threat Detection and Remediation by Storage Systems in a Synchronous Replication Arrangement | |
US20220156396A1 (en) | Cybersecurity active defense in a data storage system | |
US11645162B2 (en) | Recovery point determination for data restoration in a storage system | |
US20170132079A1 (en) | Rebuilding and verifying an encoded data slice utilizing slice verification information | |
CN103248632A (en) | Synchronous disc data security protection writing and reading method | |
US20210382995A1 (en) | Host Anomaly-Based Generation of Snapshots | |
US10671746B2 (en) | Controlling access when processing intents in a dispersed storage network | |
CN103248713A (en) | Synchronous disc data security protection method | |
US11675898B2 (en) | Recovery dataset management for security threat monitoring | |
US20220050898A1 (en) | Selective Control of a Data Synchronization Setting of a Storage System Based on a Possible Ransomware Attack Against the Storage System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230605 Address after: F13, Building 11, Zone D, New Economic Industrial Park, No. 99, West Section of Hupan Road, Xinglong Street, Tianfu New District, Chengdu, Sichuan, 610000 Patentee after: Sichuan Shenhu Technology Co.,Ltd. Address before: 610041 No. 5, floor 1, unit 1, building 19, No. 177, middle section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan Province Patentee before: SICHUAN CINGHOO TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |