CN105812205A - Cloud disk monitoring method - Google Patents
Cloud disk monitoring method Download PDFInfo
- Publication number
- CN105812205A CN105812205A CN201610145518.3A CN201610145518A CN105812205A CN 105812205 A CN105812205 A CN 105812205A CN 201610145518 A CN201610145518 A CN 201610145518A CN 105812205 A CN105812205 A CN 105812205A
- Authority
- CN
- China
- Prior art keywords
- cloud disk
- memory space
- private memory
- user
- visit capacity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Abstract
The invention discloses a cloud disk monitoring method. The method comprises following steps of detecting the private storage space of each user in a cloud disk, and obtaining page view information of the private storage spaces; obtaining average page view values based on the page view information; comparing the average page view values with a preset value; and setting access rights for the private storage spaces of the users when the average page view values are greater than the preset value, and limiting access quantity in preset time. According to the method, the technical problem that in the prior art, the monitoring efficiency of the cloud disk is low is solved, and the monitoring efficiency of the cloud disk can be improved.
Description
Technical field
The present invention relates to areas of information technology, the method particularly relating to the monitoring of a kind of cloud disk.
Background technology
Development along with science and technology, popularizing of the Internet, cloud disk is uploaded and is downloaded and has become as the necessary of people's life, but, still there are some insecurity in network cloud disk, if the information sharing uploaded, so when being attacked, being easy for so that the loss of data in cloud disk, the existing specific aim to cloud disk monitoring is relatively low, it is easy to ignore the monitoring to cloud disk.
Therefore, prior art exists the technical problem that the monitoring efficiency to cloud disk is relatively low.
Summary of the invention
The embodiment of the present application, by the method providing the monitoring of a kind of cloud disk, solves and there is the technical problem that the monitoring efficiency to cloud disk is low in prior art, and then achieves the efficiency that can improve cloud disk monitoring.
The embodiment of the present application provides the method for a kind of cloud disk monitoring, including following content:
In detection cloud disk, the private memory space of each user, obtains the visit capacity information of personal air;
Based on described visit capacity information, obtain average access value;
Described average access value and preset value are compared;
When exceeding described preset value, the private memory space of described user is arranged access rights, in Preset Time, limits the quantity of access.
Further, in detection cloud disk, the private memory space of each user, obtains the visit capacity information of personal air, particularly as follows:
The private memory space of each user in detection cloud disk, obtains the visit capacity information of other users except described user oneself access of personal air.
Further, described based on described visit capacity information, obtain average access value, particularly as follows:
Based on described visit capacity information, with Preset Time for limiting, obtain the average access value in described Preset Time.
The embodiment of the present application at least has the following technical effect that or advantage:
Owing to adopting in the method for cloud disk monitoring, first the private memory space of each user in detection cloud disk, thus obtaining the visit capacity information of personal air, then, based on this visit capacity information, obtain average access value, this average access value and preset value are compared, when exceeding preset value, the private memory space of this user is arranged access rights, the quantity of access is limited, thus improve the efficiency to cloud disk monitoring in Preset Time.
Accompanying drawing explanation
Fig. 1 is the steps flow chart schematic diagram of the method for cloud disk monitoring in the embodiment of the present application.
Detailed description of the invention
The embodiment of the present application, by the method providing the monitoring of a kind of cloud disk, solves and there is the technical problem that the monitoring efficiency to cloud disk is low in prior art, and then achieves the efficiency that can improve cloud disk monitoring.
In order to solve above-mentioned technical problem, below in conjunction with Figure of description and specific embodiment, technique scheme is described in detail.
The method of a kind of cloud disk monitoring that the application provides, as it is shown in figure 1, include: S101, the private memory space of each user in detection cloud disk, obtain the visit capacity information of private memory space;S102, based on visit capacity information, obtains average access value;S103, compares this average access value and preset value;S104, when exceeding this preset value, arranges access rights to the private memory space of this user, shows the quantity of access in Preset Time.
In a particular embodiment, first, the private memory space of the user of each registration in detection cloud disk, getting the visit capacity information of each memory space, concrete detection obtains the visit capacity information of other users except user oneself access of private memory space, due to, the private memory space of oneself is also usually accessed by oneself, accordingly, it would be desirable to the visit capacity of oneself got rid of, the visit capacity of other users is to affect the emphasis of cloud disk safety.
Next, based on this visit capacity information, obtain this average access value, specifically, it is with Preset Time for limiting, obtains the average access value in this Preset Time, such as with 24 hours for Preset Time, average access amount within the time can be got, or with 6 hours for Preset Time, it is possible to get the user average access amount information interior at every 6 hours.
After obtaining average access value, this average access value and preset value are compared, when exceeding this preset value, the private memory space of this user is arranged access rights, in Preset Time, limits the quantity of access.Such as, if this preset value is the visit capacity that not can exceed that 200 people in the time, then, if if exceeded the visit capacity of 200 people in this day at the private memory space of this user, just the private memory space of this user is arranged access rights, such as, when the visit capacity of 200 people reaching to preset, start to limit other people access, user oneself can conduct interviews, certainly, when second day, access is reopened.
Pass through the above embodiments, it is possible to effective monitoring cloud disk, it is possible to increase the efficiency of monitoring, thus ensureing the safety of user individual's memory space.
Although preferred embodiments of the present invention have been described, but those skilled in the art are once know basic creative concept, then these embodiments can be made other change and amendment.So, claims are intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, the present invention can be carried out various change and modification without deviating from the spirit and scope of the present invention by those skilled in the art.So, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.
Claims (3)
1. the method for a cloud disk monitoring, it is characterised in that include following content:
The private memory space of each user in detection cloud disk, obtains the visit capacity information of private memory space;
Based on described visit capacity information, obtain average access value;
Described average access value and preset value are compared;
When exceeding described preset value, the private memory space of described user is arranged access rights, in Preset Time, limits the quantity of access.
2. the method for cloud disk according to claim 1 monitoring, it is characterised in that the private memory space of each user in detection cloud disk, obtains the visit capacity information of private memory space, particularly as follows:
The private memory space of each user in detection cloud disk, obtains the visit capacity information of other users except described user oneself access of private memory space.
3. the method for cloud disk according to claim 1 monitoring, it is characterised in that described based on described visit capacity information, obtains average access value, particularly as follows:
Based on described visit capacity information, with Preset Time for limiting, obtain the average access value in described Preset Time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610145518.3A CN105812205A (en) | 2016-03-15 | 2016-03-15 | Cloud disk monitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610145518.3A CN105812205A (en) | 2016-03-15 | 2016-03-15 | Cloud disk monitoring method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105812205A true CN105812205A (en) | 2016-07-27 |
Family
ID=56468367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610145518.3A Withdrawn CN105812205A (en) | 2016-03-15 | 2016-03-15 | Cloud disk monitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105812205A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150163303A1 (en) * | 2013-12-08 | 2015-06-11 | Sarah M. Banas | Customizable Cloud or Distributed System Location |
CN105072180A (en) * | 2015-08-06 | 2015-11-18 | 武汉科技大学 | Cloud storage data security sharing method with permission time control |
CN105282047A (en) * | 2015-09-25 | 2016-01-27 | 小米科技有限责任公司 | Access request processing method and device |
CN105323282A (en) * | 2014-07-28 | 2016-02-10 | 神州数码信息系统有限公司 | Enterprise application deployment and management system for multiple tenants |
-
2016
- 2016-03-15 CN CN201610145518.3A patent/CN105812205A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150163303A1 (en) * | 2013-12-08 | 2015-06-11 | Sarah M. Banas | Customizable Cloud or Distributed System Location |
CN105323282A (en) * | 2014-07-28 | 2016-02-10 | 神州数码信息系统有限公司 | Enterprise application deployment and management system for multiple tenants |
CN105072180A (en) * | 2015-08-06 | 2015-11-18 | 武汉科技大学 | Cloud storage data security sharing method with permission time control |
CN105282047A (en) * | 2015-09-25 | 2016-01-27 | 小米科技有限责任公司 | Access request processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abe et al. | Modelling the effects of historical and future land cover changes on the hydrology of an Amazonian basin | |
CN103744618B (en) | Realize the method and system of the shared storage of team | |
KR20160065923A (en) | Systems and methods for mapping and routing based on clustering | |
Mäenpää et al. | Civic activism as a resource for cities | |
Geisler et al. | People, power, and land: New enclosures on a global scale | |
Carlander et al. | Effects on energy demand in an office building considering location, orientation, façade design and internal heat gains—A parametric study | |
CN105812205A (en) | Cloud disk monitoring method | |
Ibn-Elhaj et al. | Effect of Clay’s Multilayer Composites Material on the Energy Efficiency of Buildings | |
Zhao et al. | DC Aging Mechanism of Co2O3-Doped ZnO Varistors | |
Bashardoust et al. | Immunohistochemical analysis of Ki-67 expression in oral lichen planus lesions | |
Ades | Data assimilation in highly nonlinear systems | |
Markovic et al. | IT telehealth center for telecytopathology | |
Gehrels et al. | Greenland's Contribution to Early 20th Century Sea-Level Rise Determined by Sea-Level Fingerprinting | |
Showers et al. | Chapter III: Land use from below: Biofuels, urbanization and sustainable soil management in Europe and Africa | |
Glantz et al. | Prediction of the Capillary Pressure-Saturation curve from a Pore-Network Model that is Grid-Free and Based on Duality | |
Hramiak | Condominium development in Winnipeg: some aspects of the dynamics of an emerging form of home ownership | |
Espineira et al. | Progressive increase in collecting duct basal/apical AQP2 expression ratio with increasing depth along the corticopapillary axis positively correlates with maximum urine concentrating capacity | |
Cohen et al. | Tools for data-driven scholarship: past, present, future | |
Pérez-Sola et al. | OSN: When multiple autonomous users disclose another individual's information | |
Ronaghan et al. | The ability of serine proteases to induce an increase in barrier function is dependent on the tight junction protein occludin | |
Robey et al. | A Volume-of-Fluid Interface Tracking Method for Modelling the Advection of Compositional Fields with Sharp Boundaries in the Mantle Convection Code ASPECT | |
Wyborn et al. | Enabling dynamic access to dynamic petascale Earth Systems and Environmental data collections is easy: citing and reproducing the actual data extracts used in research publications is NOT | |
Tran | Essays on the impact of conflict and regulations on the private sector in developing countries | |
전영배 | Fuzzy topological spaces based on WFI-algebras | |
Juhlin | Social Media for Intelligence: Practical Examples of Analysis for Understanding: Intelligence exploitation of Social Media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20160727 |