CN104410683B - A kind of data back up method - Google Patents

A kind of data back up method Download PDF

Info

Publication number
CN104410683B
CN104410683B CN201410675081.5A CN201410675081A CN104410683B CN 104410683 B CN104410683 B CN 104410683B CN 201410675081 A CN201410675081 A CN 201410675081A CN 104410683 B CN104410683 B CN 104410683B
Authority
CN
China
Prior art keywords
backup
data
node
file
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410675081.5A
Other languages
Chinese (zh)
Other versions
CN104410683A (en
Inventor
罗阳
陈虹宇
王峻岭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Shenhu Technology Co.,Ltd.
Original Assignee
SICHUAN SHENHU TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN SHENHU TECHNOLOGY Co Ltd filed Critical SICHUAN SHENHU TECHNOLOGY Co Ltd
Priority to CN201410675081.5A priority Critical patent/CN104410683B/en
Publication of CN104410683A publication Critical patent/CN104410683A/en
Application granted granted Critical
Publication of CN104410683B publication Critical patent/CN104410683B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention provides a kind of data back up method, the network data backup under cloud environment can be achieved.Each network node under cloud environment provides a data backup area, the Backup Data for storing other network nodes;The redundancy backup of particular case lower network data is carried out by disaster tolerance redundant storage center;Global control is carried out to the network data backup under cloud environment by cloud control centre, and the ability scoring screening of data backup can be periodically provided all-network node using the method based on probability statistics, to improve the efficiency of cloud environment lower network data backup.

Description

A kind of data back up method
Technical field
The present invention relates to a kind of network data backup method under field of cloud computer technology, more particularly to cloud environment.
Background technology
Cloud environment, refers to cloud computing environment, cloud computing (Cloud Computing) is Distributed Calculation (Distrbuted Computing), the development of parallel computation (Parallel Computing) and grid computing (Grid Computing), its base Present principles are to perform calculating task to multiple stage computers by network allocation, and every computer is referred to as one of system for cloud computing Network node.
Data backup as its name suggests, is exactly retained data in some way, to be wrecked or it in system Under his particular case, a process being used again.Data recovery is exactly to occur in system under disaster scenario, by data also Original is to a nearest state, with the normal operation of safeguards system.
With the rise of cloud computing, it is supplied to numerous clients to use increasingly using data backup as a kind of mode of service Welcome by user, this backup services can be described as the network data backup under cloud environment.Compared with traditional backup, cloud environment Under network data backup have many advantages, such as.First, the installation of the network data backup under cloud environment, using, safeguard all compare Traditional backup software is easier.Usual user only needs to install the client or plug-in unit of exquisiteness in modem, appoints by setting After business, both file data can be backed up according to backup interval on a daily or weekly basis, can also be according to the actual demand of user Data backup is carried out in real time.Secondly, as a kind of network service, the network data backup under cloud environment solves data in itself Long-distance disaster problem, solve the technical barrier that user voluntarily builds disaster tolerant backup system.Meanwhile, with general backup phase Than the network data backup under cloud environment more focuses on the security of data transfer and data storage.Data are generally in the mistake of transmission Cheng Jiami, the data backed up are responsible for safeguarding its storage and access security by professional service manufacturer.In addition, user is according only to institute The backup services asked for are paid, when that need not service user's free time, it is not necessary to paid the extra hardware and software of waste and taken With, and the retractility serviced is very strong, and user can ask different services different when, without worrying software and hardware Upgrade problem, these problems are managed and safeguarded by the service facility of specialty, and user is paid according only to service.
Because cloud environment is a complicated network environment, and the network data backup process under cloud environment also tends to compare Complexity, it is related to the coordination to all-network node and control, while also to take into account efficiency and cost.
The content of the invention
In order to be optimized to the network data backup process under cloud environment, solve under cloud environment between all-network node Cooperation controlling problem, solve the problems, such as the disaster tolerance redundancy backup of data under cloud environment;And in order to improve cloud environment lower network number According to the efficiency of backup:
The present invention proposes a kind of data back up method, and this method can realize the network data backup under cloud environment.Wherein:
Network data backup process under the cloud environment comprises the following steps:
Step 1:The data backup requests of user's local node are received, the data backup requests are carried in data to be backed up The newest modification time and newest BACKUP TIME of each file;
Step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Step 3:Data to be backed up are compressed;
Step 4:The data of compression are encrypted;
Step 5:Select the network node under cloud environment as the destination node of data backup, data to be backed up are uploaded to Selected destination node;
Step 6:Selected destination node is received after data to be backed up, and data are decrypted and decompressed successively, By the data storage after decompression in the data backup area of the destination node;
Wherein, the compression algorithm, encryption/decryption algorithm are all pre-defined, and the all-networks under cloud environment Nodes sharing.
Further, each network node under cloud environment has a data backup area and a backup list;
The data backup area is used to back up in the backup data files from other network nodes, the data backup area All backup data files stored with the form of the Backup Data block of fixed size;
When the network node data backup area residual memory space be less than or equal to threshold value T_node when, forbid to The network node carries out data backup;
Threshold value T_node value can be the 10% of the data backup area total memory capacity of current network node;
The backup list have recorded BACKUP TIME, fileinfo and the verification of each file in the data backup area Value, the fileinfo includes the filename, file size and blocking information of this document.
Further, it is further comprising the steps of before step 3:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the net under cloud environment Network data backup, issues the user with prompting;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that in some file Containing the content for forbidding uploading, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to enter the ring that racks simultaneously Network data backup under border;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret The data that reason is backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
The network identity of user node, user name, operating right, the mark for whether completing full backup and each standby The fileinfo of part file;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file are big Whether small, file check value, file forbid whether the mark uploaded, file complete the mark backed up.
Further, in the step 5, the cloud control centre C_center and disaster tolerance redundant storage in cloud environment are utilized Center S_center carries out global control to the data backup under cloud environment, wherein:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node, Backup services quality list QB_list includes the backup services quality for the data backup that all n network nodes can be provided Scoring;All n network nodes of cloud control centre C_center routine tests can provide the backup services of data backup Quality score, backup services quality list QB_list described in updating maintenance, and all n network nodes can be provided by it The backup services quality score of data backup is from high to low sequence;
The cloud control centre C_center, which carries out global control process to the data backup under cloud environment, includes following step Suddenly:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, is treated successively to described Each file in Backup Data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of the data of other network nodes of the check value of this document with inquiring in user's local node are standby The check value of file of the same name in part area is compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value can be cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to net Network node can provide the backup services quality score of data backup and be scored one network of highest from high to low sequential selection Node as data backup destination node;
Step QB3:If the capacity in the data backup area of current target node ensure that completion, the data backup please The backup of middle All Files is asked, then the All Files in the data backup requests is backed up into current target node, Ran Houjie Beam;Otherwise, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_ During node, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then, The backup services quality score of data backup can be provided from the high to low next network section of sequential selection according to network node The file that interruption is backed up in current target node is backed up to next destination node by point again as next destination node, and will The remaining file that is not backed up continues to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
Threshold value T_max represents the maximum for allowing the single file of storage to be taken up space in the data backup area of network node Value;
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user The redundancy backup that big file in data to be backed up is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to being used as data backup While the network node of destination node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center S_center。
Further, in steps of 5, it is described data to be backed up are uploaded to selected destination node to include:User's sheet The All Files piecemeal of each file in the data to be backed up of user is uploaded to the target as data backup by ground node successively The network node of node, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool in user's local node, it is pending for storing Send data block;
Step 5.2:Each file in the data to be backed up of user is divided into file according to fixed word joint number L0 successively Piecemeal formation data block, buffer pool is sequentially stored into by the data block;If last block number of some file according to byte number less than L0, Also serve as a data block reading;
Step 5.3:The read block from buffer pool, sends to the net of the destination node as data backup successively Network node, until the data to be backed up are all sent.
Further, in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The length L of buffer pool span is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
Further, the backup services quality score si of the network node i is calculated as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v can for the data backup area of network node With storage space volume, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p pays for service Take standard.
Further, the cloud control centre C_center periodically screens out backup services quality score exception with cycle T Network node, comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ... Si ..., sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);Wherein, si represents network section Point i backup services quality score;
Step B2:The time series S (1), S of the backup services quality score vector S are periodically generated according to cycle T (2) ... S (j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) was represented j-th cycle Backup services quality score vector, si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, S (j) predicted vector is defined For PS (j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is 0.25, PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of errors Vectorial EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are 0.15, EB_2 (0)=0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error is calculated Vectorial EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is 0.05, EB_3 (0)=0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with setting in advance Fixed backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is at this corresponding to the component The backup services quality score in cycle is abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added Enter backup node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to institute State disaster tolerance redundant storage center S_center.
Further, the step B3 also includes:
Step B3.5:The cloud control centre C_center is with backup node blacklist list described in cycle T periodic scanning B_black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described Deleted in backup node blacklist list B_black.
The beneficial effects of the present invention are:The network data backup process under cloud environment is optimized, institute under cloud environment is solved There is the control cooperation problem between network node;The disaster tolerance redundancy backup of cloud environment lower network data is solved the problems, such as simultaneously;Also The efficiency of cloud environment lower network data backup can be improved.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings:
Fig. 1 is the system construction drawing of the network data backup under cloud environment of the present invention;
Fig. 2 is the flow chart of the network data backup under cloud environment of the present invention.
Embodiment
The present invention proposes a kind of data back up method, and this method can realize the network data backup under cloud environment.
Below in conjunction with the accompanying drawings and specific embodiment, the present invention is further described in detail, but not as to this hair Bright restriction.
Fig. 1 is the network data recovery under the system construction drawing of the network data backup under cloud environment of the present invention, cloud environment System architecture it is identical with this.
As shown in figure 1, the present invention proposes a kind of data back up method, the network data backup under cloud environment can be achieved, Specifically:The system of the present invention is main by the network node under the cloud environment being connected with each other by network and cloud control centre C_ Center, the parts of disaster tolerance redundant storage center S_center tri- composition.
In order to realize the monitoring and the disaster tolerance redundancy backup of data and recovery of the overall situation, the present invention utilizes the cloud control in cloud environment Center C_center processed and disaster tolerance redundant storage center S_center are controlled to the data backup and resume under cloud environment.Always For body, because the cloud control centre C_center and disaster tolerance redundant storage center S_center has Relatively centralized Function, be only used for completing specific control, backup tasks, therefore can neither consume excessively huge memory space;And The back up memory space of network data backup and data recovery under cloud environment, mainly numerous network nodes under cloud environment In data backup area realize.
The preferred network position of network data backup and data recovery of user's local node under cloud environment is target section Point, in order to improve the network data backup under cloud environment and the efficiency of data recovery, the present invention is in data backup and data recovery During used service quality scoring, pass through the backup services quality list QB_list and network section of network node The recovery service quality list QR_list of point, routine test all-network node can provide the backup services matter of data backup Amount scoring, backup services quality list QB_list described in updating maintenance and recovery service quality list QR_list, and will be all Network node scores from high to low sequence by its backup/restoration service quality that can provide data backup/data recovery.
The cloud control centre C_center carries out control of overall importance to the network data backup under cloud environment and data recovery System.The cloud control centre C_center routine test all-networks node can provide the standby of data backup and data recovery Part and recovery service quality scoring, updating maintenance backup services quality list QB_list and recovery service quality list QR_list To select the destination node of data backup and data recovery;Meanwhile, to network node each other and network node and appearance Calamity redundant storage center S_center network data transmission is controlled.
The cloud control centre C_center can also be replicated according to the situation of change of network node, mobile or deletion institute State the copy of data backup.
Cloud control centre C_center in the present invention is different from general high in the clouds backup server, and its major function is not For storing Backup Data, and the control function of cloud environment lower network is simply concentrated.It is superfluous for the data disaster tolerance under cloud environment It is remaining, then handled by disaster tolerance redundant storage center S_center.
The effect of the disaster tolerance redundant storage center S_center is not that the complete mirror image of all-network Backup Data is superfluous Remaining (demand so for memory space is huge, is also what is be difficult to), the redundancy that it is mainly used in some special datas is standby Part.Such as, redundancy backup is carried out to the file of some super larges, or when some network nodes are not suitable for the mesh as data backup When marking node, the Backup Data in such network node can be copied to the disaster tolerance redundant storage center S_center.
All-network node under the cloud environment all has identical or similar structure.The data backup and Data recovery both can be regular or automatic, can in real time be carried out by the actual demand of user again.The data of the present invention are standby Part method mainly carries out data backup using the network node under cloud environment to the data of user node.
It is in data backup and data recovery procedure, the network data under cloud environment is standby for the sake of the convenience of statement Part, the target network node of data recovery are referred to as destination node.Obviously, the collection of destination node be combined into except user's local node it The a subset of outer other all-network nodes composition set.And the physical arrangement of user's local node and all destination nodes It is identical, the network site residing under cloud environment is also complete equity, and user's local node may also be used as other nets Data backup, the destination node of data recovery under network node progress cloud environment.
The network node under cloud environment in the present invention refers to all terminal device kimonos that can be networked under cloud environment Business device, specific networking mode both can be by wired connection or by wireless connection.
In order to ensure the security of data transfer in network transmission, carry out before network data backup, need under cloud environment File in Backup Data is compressed and encrypted successively;Correspondingly, when from restoring user data under cloud environment, Need to be decrypted and decompress successively to receiving the file in data.
In the present invention, the logic unit of data backup and data recovery under cloud environment is all single file;And in reality Network transmission in, file block is transmitted, i.e., by file division be fixed size data block.Entering the ring that racks During data backup under border, in order to improve parallel efficiency, the operating system of user's local node can set multiple upload threads, Each thread that uploads controls a upload queue, and each uploading queue can control the upload of multiple files to back up;Similarly, exist When carrying out the data recovery under cloud environment, the operating system of user's local node can set multiple download threads, each to download Thread controls a download queue, and each downloading queue can control the download of multiple files to recover.
In the data backup and data recovery procedure, a storage region is provided separately in each network node, uses In the Backup Data for storing other network nodes;When other network nodes propose data recovery request when, from the storage region to The network node filed a request recovers data.Certainly, in some cases, the disaster tolerance redundant storage center S_center also may be used Using the destination address as network data backup and data recovery.
It is standby that the storage region that can provide data backup function that each network node under cloud environment has is referred to as data Part area, and each network node also has a backup list.Specifically:
The size in the data backup area of each network node is set according to the actual conditions of the network node.Example Such as:If network node, which is one, has the file server of a large amount of memory spaces, then it will be apparent that the network node can be carried It is that other numerous network nodes under cloud environment carry out data backup service for the data backup area of a larger capacity;And it is right In some personal network's terminals, such as PC or notebook computer, its memory space is relatively limited, and that can provide one The individual data backup area compared with low capacity.
Although the size in the data backup area of each network node is not quite similar, its process for carrying out data backup is Identical, the data backup area of each network node is used to back up the backup data files from other network nodes, And all backup data files in the data backup area are stored with the form of the Backup Data block of fixed size.
And in order to prevent in Backup Data, overflow as the space in the data backup area of the network node of destination node Go out, each network node can be that its data backup area sets a threshold value T_node for preventing from overflowing according to actual conditions, When other network nodes are to the network node Backup Data, once find the network node of the destination node as data backup When the residual memory space in data backup area is less than or equal to threshold value T_node set in advance, then forbid entering to the network node Row data backup.The value of the threshold value T_node could be arranged to the data backup area total memory capacity for current network node 5%~15%, it is preferable that could be arranged to 10%.
In addition, in order to which the process to data backup is recorded, each network node also has a backup list, described Backup list have recorded BACKUP TIME, fileinfo and the check value of each file in the data backup area, the file letter Breath includes the filename, file size and blocking information of this document.
Fig. 2 describes the basic procedure of the network data backup under cloud environment of the present invention.
As shown in Fig. 2 a kind of data back up method proposed by the present invention can realize the network data backup under cloud environment, institute The network data backup process stated under cloud environment comprises the following steps:
Data backup step 1:The data backup requests of user's local node are received, the data backup requests carry and treat standby The newest modification time and newest BACKUP TIME of number each file in;
Data backup step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Data backup step 3:Data to be backed up are compressed;
Data backup step 4:The data of compression are encrypted;
Data backup step 5:The network node under cloud environment is selected as the destination node of data backup, by number to be backed up According to being uploaded to selected destination node;
Data backup step 6:Selected destination node is received after data to be backed up, data are decrypted successively and Decompression, by the data storage after decompression in the data backup area of the destination node.
Compression algorithm, AES in above-mentioned steps are all pre-defined, and the all-network section under cloud environment Point is shared.
Network data recovery process under the cloud environment comprises the following steps:
Data restoration step I:Receive to include in the data recovery request of user's local node, the data recovery request and treat Recover the filename of data;
Data restoration step II:Select the network node under cloud environment as the destination node for data recovery, will treat Recover data and be downloaded to user's local node from selected destination node;
Data restoration step III:The data to be restored of download are decrypted;
Data restoration step IV:The data of decryption are decompressed;
Data restoration step V:According to the data after decryption and decompression, the file in data to be restored is obtained;
Decipherment algorithm, decompression algorithm in above-mentioned steps are all pre-defined, and the all-networks under cloud environment Nodes sharing.
Simply simply describe the network data backup under cloud environment and the most basic flow of data recovery above, below it is right Above-mentioned data backup and data recovery procedure are further limited.
It is further comprising the steps of during network data backup under the cloud environment:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the net under cloud environment Network data backup, issues the user with prompting;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that in some file Containing the content for forbidding uploading, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to enter the ring that racks simultaneously Network data backup under border;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret The data that reason is backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
The network identity of user node, user name, operating right, the mark for whether completing full backup and each standby The fileinfo of part file;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file are big Whether small, file check value, file forbid whether the mark uploaded, file complete the mark backed up.
It is further comprising the steps of during network data recovery under the cloud environment:
Step N1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, under Carry, create, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess download permission, then user is forbidden to carry out the net under cloud environment Network data recovery, issues the user with prompting;
Step N2:Security sweep is carried out to each file that user obtains, if it find that containing what is forbidden in some file Content, then intercept this document and mark, issue the user with prompting;
The content forbidden includes:Unlawful data, bad data, harmful data, and/or may to reveal individual subscriber hidden Private data;
Step N3:The recovery log information of the network data recovery behavior of user is recorded, the recovery log information includes:
The network identity of user node, user name, operating right, recover the time started, recover the end time, whether complete The mark of full recovery and each fileinfo for recovering file;
Wherein, each fileinfo for recovering file includes:Filename, file format, file size, file download recover Whether source address, the check value of file, file access pattern time started, file access pattern end time, file complete the mark recovered Know.
In the present invention, pass through S_center pairs of the cloud control centre C_center in cloud environment and disaster tolerance redundant storage center Data backup and resume under cloud environment carries out global control.The disaster tolerance redundant storage center S_center can be standby to data Big file during part carries out redundancy backup, specifically, and being represented with threshold value T_max in the data backup area of network node allows The maximum that the single file of storage is taken up space.If the file size in the data to be backed up of user exceedes the threshold value T_max, then the disaster tolerance redundant storage center S_center is by the redundancy backup synchronized.
Specifically, for the data backup procedure under cloud environment:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node, Backup services quality list QB_list includes the backup services quality for the data backup that all n network nodes can be provided Scoring;All n network nodes of cloud control centre C_center routine tests can provide the backup services of data backup Quality score, backup services quality list QB_list described in updating maintenance, and all n network nodes can be provided by it The backup services quality score of data backup is from high to low sequence.
The cloud control centre C_center, which carries out global control process to the data backup under cloud environment, includes following step Suddenly:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, is treated successively to described Each file in Backup Data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of the data of other network nodes of the check value of this document with inquiring in user's local node are standby The check value of file of the same name in part area is compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value can be cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to net Network node can provide the backup services quality score of data backup and be scored one network of highest from high to low sequential selection Node as data backup destination node;
Step QB3:If the capacity in the data backup area of current target node ensure that completion, the data backup please The backup of middle All Files is asked, then the All Files in the data backup requests is backed up into current target node, Ran Houjie Beam;Otherwise, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_ During node, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then, The backup services quality score of data backup can be provided from the high to low next network section of sequential selection according to network node The file that interruption is backed up in current target node is backed up to next destination node by point again as next destination node, and will The remaining file that is not backed up continues to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user The redundancy backup that big file in data to be backed up is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to being used as data backup While the network node of destination node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center S_center;
Specifically, for the data recovery procedure under cloud environment:
The disaster tolerance redundant storage center S_center can combine threshold value T_max multilevel iudge, to described in user Big file in data to be restored is recovered, including:
If there is the file that size is more than threshold value T_max in the data to be restored, user's local node will be direct Downloaded from the disaster tolerance redundant storage center S_center and recover this document;
The cloud control centre C_center, which carries out global control process to the data recovery under cloud environment, includes following step Suddenly:
Step QR1:The cloud control centre C_center is received after the data recovery request of user, according to the data Each filename in the data to be restored included in recovery request, inquiring about in the disaster tolerance redundant storage center S_center is The no data backup that there is this document;Recover described if it is present being downloaded from the disaster tolerance redundant storage center S_center File;
Step QR2:For not recovering file in the data recovery request, the cloud control centre C_center according to The each filename for not recovering file included in the data recovery request, inquires about the data of every other network node successively The data backup of file is not recovered in backup area with the presence or absence of this;
If it find that there is the data backup for not recovering file in the data backup area of a network node, then by the net The BACKUP TIME of this document recorded in the backup list of network address of node information and the network node is sent to number of request According to user's local node of recovery;
Step QR3:User's local node does not recover text according to being sent the cloud control centre C_center The address information of network node where part, downloads from the network node and does not recover file described in recovering, until completing described Data recovery request;
Wherein, in step QR3, if one is not recovered file and has time different multiple data backups, point out User is according to BACKUP TIME selective recovery this document of this document;If user does not make a choice, acquiescence automatically selects extensive The newest backup of multiple this document.
Preferably, in steps of 5, it is described data to be backed up are uploaded to selected destination node to include:User is local The All Files piecemeal of each file in the data to be backed up of user is uploaded to the target section as data backup by node successively The network node of point, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool is sent in user's local node, for storing Data block to be sent;
Step 5.2:Each file in the data to be backed up of user is divided into file according to fixed word joint number L0 successively Piecemeal formation data block, transmission buffer pool is sequentially stored into by the data block;If last block number of some file according to byte number not Sufficient L0, also serves as a data block reading;
Step 5.3:The read block from buffer pool is sent, sends to the destination node as data backup successively Network node, until the data to be backed up are all sent.
Preferably, in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The span of the length L for sending buffer pool is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
For the network data backup process under cloud environment, the backup services quality score si of the network node i is calculated It is as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v can for the data backup area of network node With storage space volume, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p pays for service Take standard.The backup services quality score si of network node i initial value could be arranged to 0.
The cloud control centre C_center uses the method based on probability statistics, every with fixed cycle T periodic detection The network node of the individual destination node as data backup can provide the backup services quality score of data backup, to screen out The abnormal network node of backup services quality score, so that the network data backup efficiency under improving cloud environment.Assuming that si is represented Network node i backup services quality score, the sum of network node is n, and this method comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ... Si ..., sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);
As described above, the initial value that all-network node can provide the backup services quality score of data backup is all 0, And the backup services quality score can be over time change and change.
Under cloud environment, the sum of network node, can be with for the network node increase newly/exited it is possible that change Increase/delete the backup services quality score corresponding to the network node in real time in the backup services quality score vector S; So that the quantity of the component in the backup services quality score vector S is equal to the network node quantity under cloud environment.Specifically, If a network node exits cloud environment, the network node should be deleted in the rhythmic backup services quality score vector of institute Corresponding backup services quality score in S.
Step B2:The time series S (1), S of the backup services quality score vector S are periodically generated according to cycle T (2) ... S (j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) was represented j-th cycle Backup services quality score vector, si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
In following formula, symbol " " represents coefficient and multiplication of vectors, i.e., each point in vector is multiplied by with coefficient Amount;Symbol " | " represents to take absolute value to each component in vector.
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, S (j) predicted vector is defined For PS (j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is preferably 0.25, can also be set according to specific actual conditions;PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of errors Vectorial EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are preferably 0.15, can also be set according to specific actual conditions;EB_2(0) =0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error is calculated Vectorial EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is preferably 0.05, can also be set according to specific actual conditions;EB_3(0) =0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with setting in advance Fixed backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is at this corresponding to the component The backup services quality score in cycle is abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added Enter backup node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to institute State disaster tolerance redundant storage center S_center.
In the present invention, the calculating of three-level error vector is passed through, it is possible to reduce the mistake that direct, simple error vector compares Difference, improves the accuracy of detection.
For above-mentioned backup services error threshold T_EB, can specifically it be set according to actual conditions, it is specific to set former It is then:Pass through the setting of the backup services error threshold so that under cloud environment in all-network node, backup services quality score Controlled for abnormal number of nodes in a rational scope.For example so that abnormal network node quantity is controlled all the time Within the 20% of the cloud environment lower network node total number.
The step B3 can further include:
Step B3.5:The cloud control centre C_center is with backup node blacklist list described in cycle T periodic scanning B_black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described Deleted in backup node blacklist list B_black.
Similarly, for above-mentioned threshold value T_EB, can also specifically it be set according to actual conditions, specific setting principle For:Pass through the setting of the threshold value so that under cloud environment, the number of nodes control in the backup node blacklist list B_black System is in a rational scope.For example so that the number of nodes in the backup node blacklist list B_black is controlled all the time System is within the 10% of the cloud environment lower network node total number.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field Technical staff, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.

Claims (6)

1. a kind of data back up method, can be achieved the network data backup under cloud environment, it is characterised in that:This method includes following Step:
Step 1:The data backup requests of user's local node are received, the data backup requests carry each in data to be backed up The newest modification time and newest BACKUP TIME of file;
Step 2:Filter out file of the newest modification time earlier than newest BACKUP TIME in data to be backed up;
Step 3:Data to be backed up are compressed;
Step 4:The data of compression are encrypted;
Step 5:Select the network node under cloud environment as the destination node of data backup, data to be backed up are uploaded to selected The destination node selected;
Step 6:Selected destination node is received after data to be backed up, and data are decrypted and decompressed successively, will be solved Data storage after compression is in the data backup area of the destination node;
Wherein, the compression algorithm, encryption/decryption algorithm are all pre-defined, and the all-network node under cloud environment It is shared;
Each network node under cloud environment has a data backup area and a backup list;
The data backup area is used to back up the institute in the backup data files from other network nodes, the data backup area There are backup data files and stored with the form of the Backup Data block of fixed size;
When the residual memory space in the data backup area of the network node is less than or equal to threshold value T_node, forbid to the net Network node carries out data backup;
Threshold value T_node value is the 10% of the data backup area total memory capacity of current network node;
The backup list have recorded BACKUP TIME, fileinfo and the check value of each file in the data backup area, institute Stating fileinfo includes the filename, file size and blocking information of this document;
It is further comprising the steps of before step 3:
Step M1:Verify the validity and operating right of user identity;Wherein, the operating right includes:Upload, download, create Build, change, replicate, delete, check and search for;
If user identity empirical tests are invalid, all operating rights of user are locked;
If user identity empirical tests are effective, but do not possess upload permissions, then user is forbidden to carry out the network number under cloud environment According to backup, prompting is issued the user with;
Step M2:Security sweep is carried out to each file in the data to be backed up of user, if it find that containing in some file Forbid the content uploaded, then this document is intercepted and marked, issue the user with prompting;This document is forbidden to carry out under cloud environment simultaneously Network data backup;
The content for forbidding uploading includes:Unlawful data, bad data, harmful data, or due to safe and secret The data backed up without Adapted for Network;
Step M3:The backup log information of the network data backup behavior of user is recorded, the backup log information includes:
Network identity, user name, operating right, the mark for whether completing full backup and each backup text of user node The fileinfo of part;
Wherein, the fileinfo of each backup file includes:Filename, the BACKUP TIME of file, file format, file size, Whether check value, the file of file forbid whether the mark uploaded, file complete the mark backed up;
In the step 5, the cloud control centre C_center in cloud environment and disaster tolerance redundant storage center S_center are utilized Global control is carried out to the data backup under cloud environment, wherein:
The cloud control centre C_center dynamically possesses the backup services quality list QB_list of a network node, and this is standby Part service quality list QB_list includes the backup services quality score for the data backup that all n network nodes can be provided; The backup services quality that all n network nodes of cloud control centre C_center routine tests can provide data backup is commented Point, backup services quality list QB_list described in updating maintenance, and it is standby by all n network nodes by it can to provide data Part backup services quality score from high to low sequence;
The cloud control centre C_center carries out global control process to the data backup under cloud environment and comprised the following steps:
Step QB1:The cloud control centre C_center is received after the data backup requests of user, successively to described to be backed up Each file in data performs following repeatability filterings:
First, the check value of current file in data to be backed up is calculated;
Secondly, it whether there is file of the same name in the data backup area for inquiring about every other network node;
If in the presence of by the data backup area of the check value of this document in user's local node and other network nodes inquired In the check value of file of the same name be compared;
If check value is identical, represent that two files are identical, it is not necessary to back up this document;
The check value is cryptographic Hash or MD5 values;
Step QB2:The cloud control centre C_center inquires about the backup services quality list QB_list, according to network section Point can provide the backup services quality score of data backup and be scored one network node of highest from high to low sequential selection It is used as the destination node of data backup;
Step QB3:If the capacity in the data backup area of current target node ensure that in the completion data backup requests The backup of All Files, then back up to current target node by the All Files in the data backup requests, then terminate;It is no Then, step QB4 is gone to;
Step QB4:When the residual memory space in the data backup area for finding current target node is less than or equal to threshold value T_node When, stop carrying out data backup to current target node, delete the file that interruption is backed up in current target node;Then, according to The backup services quality score that network node can provide data backup is made from the high to low next network node of sequential selection For next destination node, the file that interruption is backed up in current target node is backed up into next destination node again, and by residue The file that is not backed up continue to back up to next destination node;
Step QB5:By that analogy, until completing the backup of All Files in the data backup requests;
Threshold value T_max represents the maximum for allowing the single file of storage to be taken up space in the data backup area of network node;
The multilevel iudge of the disaster tolerance redundant storage center S_center combination threshold values T_max, to the number to be backed up of user The redundancy backup that big file in is synchronized, specifically:
If there is the file that size is more than threshold value T_max in the data to be backed up, to the target as data backup While the network node of node backs up this document, this document synchronous mirror is copied to the disaster tolerance redundant storage center S_ center。
2. data back up method according to claim 1, it is characterised in that:In steps of 5, it is described by data to be backed up Reaching selected destination node includes:User's local node is successively by all texts of each file in the data to be backed up of user Part piecemeal is uploaded to the network node of the destination node as data backup, specifically:
Step 5.1:Internal memory of one piece of byte number for L is opened up as buffer pool in user's local node, for storing number to be sent According to block;
Step 5.2:Each file in the data to be backed up of user is divided into file block according to fixed word joint number L0 successively Data block is formed, the data block is sequentially stored into buffer pool;If last block number of some file, less than L0, is also made according to byte number Read for a data block;
Step 5.3:The read block from buffer pool, sends to the network section of the destination node as data backup successively Point, until the data to be backed up are all sent.
3. data back up method according to claim 2, it is characterised in that in step 5.2:
The size L0 of data block span is:16KB≤L0≤8MB;
The length L of buffer pool span is as follows:
As 16KB≤L0≤256KB, L=32*L0;
Work as 256KB<During L0≤1MB, L=16*L0;
Work as 1MB<During L0≤4MB, L=8*L0;
Work as 4MB<During L0≤16MB, L=4*L0.
4. data back up method according to claim 3, it is characterised in that:
The backup services quality score si of the network node i is calculated as follows:
Si=f*v*c*s* (1-m)2/ p formula (1)
In above-mentioned variable, for network node i:F is backup access frequency, and v deposits for the available of data backup area of network node Spatial content is stored up, c is cpu calculation processing powers, and s is network transfer speeds, and m is file backup mortality, and p is services pay mark It is accurate.
5. the data back up method according to any one of claim 1-4, it is characterised in that:The cloud control centre C_ Center periodically screens out the abnormal network node of backup services quality score with cycle T, comprises the following steps:
Step B1:All n network nodes can be provided to backup services quality score s1, the s2 of data backup ... si ..., Sn be configured to a backup services quality score vector S=(s1, s2 ... si ..., sn);Wherein, si represents network node i's Backup services quality score;
Step B2:Time series S (1), the S (2) of the backup services quality score vector S are periodically generated according to cycle T ... S (j) ..., wherein, S (j)=(s1 (j), s2 (j) ..., si (j) ..., sn (j)), S (j) represents the backup clothes j-th cycle Being engaged in, quality score is vectorial, and si (j) represents backup services quality scores of the network node i j-th of cycle;
Step B3:Following steps are periodically executed according to cycle T:
Step B3.1:For the backup services quality score vector S (j) j-th of cycle, the predicted vector for defining S (j) is PS (j), S (j) one-level error vector is EB (j), is calculated as follows:
PS (j)=λ 1S (j)+(1- λ 1) PS (j-1) formula (2)
EB (j)=| S (j)-PS (j-1) | formula (3)
Wherein, one-level error coefficient λ 1 is 0.25, PS (0)=S (1);
Step B3.2:It is EB (j) according to the S (j) in j-th of cycle one-level error vector, calculates S (j) two grades of error vectors EB_2 (j) is as follows:
EB_2 (j)=| λ 2EB (j)+(1-λ 2) EB_2 (j-1) | formula (4)
Wherein, two grades of error coefficient λ 2 are 0.15, EB_2 (0)=0;
Step B3.3:According to the two of the S (j) in j-th of cycle grades of error vector EB_2 (j), S (j) three-level error vector is calculated EB_3 (j) is as follows:
EB_3 (j)=| λ 3EB_2 (j)+(1-λ 3) EB_3 (j-1) | formula (5)
Wherein, three-level error coefficient λ 3 is 0.05, EB_3 (0)=0;
Step B3.4:By each component in the S (j) in j-th of cycle three-level error vector EB_3 (j) with it is set in advance Backup services error threshold T_EB compares;
If there is the component more than backup services error threshold T_EB, it is determined that network node is in the cycle corresponding to the component Backup services quality score be abnormal;And
If the backup services quality score in a network node continuous two cycles is abnormal, the network node is added standby Part node blacklist list B_black;Meanwhile, the Backup Data in the data backup area of the network node is copied to the appearance Calamity redundant storage center S_center.
6. data back up method according to claim 5, it is characterised in that:The step B3 also includes:
Step B3.5:The cloud control centre C_center is with backup node blacklist list B_ described in cycle T periodic scanning Black, if it find that backup services quality score is higher than threshold value TB_out network node, then by the network node from described standby Deleted in part node blacklist list B_black.
CN201410675081.5A 2014-11-21 2014-11-21 A kind of data back up method Active CN104410683B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410675081.5A CN104410683B (en) 2014-11-21 2014-11-21 A kind of data back up method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410675081.5A CN104410683B (en) 2014-11-21 2014-11-21 A kind of data back up method

Publications (2)

Publication Number Publication Date
CN104410683A CN104410683A (en) 2015-03-11
CN104410683B true CN104410683B (en) 2017-10-17

Family

ID=52648281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410675081.5A Active CN104410683B (en) 2014-11-21 2014-11-21 A kind of data back up method

Country Status (1)

Country Link
CN (1) CN104410683B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105120003B (en) * 2015-09-10 2019-01-01 浪潮(北京)电子信息产业有限公司 A kind of method for realizing data backup under cloud environment
WO2017117809A1 (en) * 2016-01-08 2017-07-13 王晓光 Video network uploading method and system
CN106503556A (en) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 The method of data storage, apparatus and system
CN106648970A (en) * 2016-11-04 2017-05-10 北京华为数字技术有限公司 File backup method and distributed file system
CN108279996A (en) * 2018-01-17 2018-07-13 链家网(北京)科技有限公司 A kind of high in the clouds data backup processing method and device
CN108459926B (en) * 2018-02-26 2020-05-15 新华三技术有限公司 Data remote backup method and device and computer readable medium
CN110568992A (en) * 2018-06-06 2019-12-13 华为技术有限公司 data processing device and method
CN110635927B (en) * 2018-06-21 2022-08-19 中兴通讯股份有限公司 Node switching method, network node and network system
CN110191149B (en) * 2019-04-03 2020-01-31 特斯联(北京)科技有限公司 file storage and retrieval method and device
CN110471794A (en) * 2019-07-23 2019-11-19 深圳康佳电子科技有限公司 Support network storage method, system and the storage medium of data backup
CN110493339B (en) * 2019-08-20 2022-02-25 曾亮 Distributed remote storage management method, system and device
CN110597778B (en) * 2019-09-11 2022-04-22 北京宝兰德软件股份有限公司 Distributed file backup and monitoring method and device
CN112000514B (en) * 2020-05-28 2022-07-08 苏州浪潮智能科技有限公司 Data backup recommendation method and system for storing user data in storage device
CN111880967A (en) * 2020-07-28 2020-11-03 平安科技(深圳)有限公司 File backup method, device, medium and electronic equipment in cloud scene
CN112953803B (en) * 2021-02-10 2022-07-08 西南电子技术研究所(中国电子科技集团公司第十研究所) Airborne redundant network data transmission method
CN115640170B (en) * 2022-12-26 2023-03-21 交通运输部公路科学研究所 Big data synchronous backup and verification method
CN116974827B (en) * 2023-09-25 2024-01-16 北京装库创意科技有限公司 Cloud big data storage management method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system
CN102306114A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 Regular data backup and recovery method based on cloud storage

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013277351A1 (en) * 2012-06-18 2015-01-22 Actifio, Inc. Enhanced data management virtualization system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306114A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 Regular data backup and recovery method based on cloud storage
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system

Also Published As

Publication number Publication date
CN104410683A (en) 2015-03-11

Similar Documents

Publication Publication Date Title
CN104410683B (en) A kind of data back up method
CN104331346B (en) A kind of data guard method
CN105120003B (en) A kind of method for realizing data backup under cloud environment
CN104331345B (en) A kind of data reconstruction method
US11651075B2 (en) Extensible attack monitoring by a storage system
US11657146B2 (en) Compressibility metric-based detection of a ransomware threat to a storage system
US11256558B1 (en) Prioritized data rebuilding in a dispersed storage network based on consistency requirements
US11720692B2 (en) Hardware token based management of recovery datasets for a storage system
US11720714B2 (en) Inter-I/O relationship based detection of a security threat to a storage system
US20210397711A1 (en) Detection of Writing to a Non-header Portion of a File as an Indicator of a Possible Ransomware Attack Against a Storage System
US11687418B2 (en) Automatic generation of recovery plans specific to individual storage elements
CN103929467B (en) The data storage service of safe distribution on line formula
US20170250809A1 (en) Cryptographic key storage in a dispersed storage network
US20180293024A1 (en) Dynamic retention policies and optional deletes
US20230062383A1 (en) Encryption Indicator-based Retention of Recovery Datasets for a Storage System
US20220083657A1 (en) Independent Security Threat Detection and Remediation by Storage Systems in a Synchronous Replication Arrangement
US20220156396A1 (en) Cybersecurity active defense in a data storage system
US11645162B2 (en) Recovery point determination for data restoration in a storage system
US20170132079A1 (en) Rebuilding and verifying an encoded data slice utilizing slice verification information
CN103248632A (en) Synchronous disc data security protection writing and reading method
US20210382995A1 (en) Host Anomaly-Based Generation of Snapshots
US10671746B2 (en) Controlling access when processing intents in a dispersed storage network
CN103248713A (en) Synchronous disc data security protection method
US11675898B2 (en) Recovery dataset management for security threat monitoring
US20220050898A1 (en) Selective Control of a Data Synchronization Setting of a Storage System Based on a Possible Ransomware Attack Against the Storage System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230605

Address after: F13, Building 11, Zone D, New Economic Industrial Park, No. 99, West Section of Hupan Road, Xinglong Street, Tianfu New District, Chengdu, Sichuan, 610000

Patentee after: Sichuan Shenhu Technology Co.,Ltd.

Address before: 610041 No. 5, floor 1, unit 1, building 19, No. 177, middle section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan Province

Patentee before: SICHUAN CINGHOO TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right