CN107395772A - The management method and management system of a kind of duplicate data - Google Patents

The management method and management system of a kind of duplicate data Download PDF

Info

Publication number
CN107395772A
CN107395772A CN201710805266.7A CN201710805266A CN107395772A CN 107395772 A CN107395772 A CN 107395772A CN 201710805266 A CN201710805266 A CN 201710805266A CN 107395772 A CN107395772 A CN 107395772A
Authority
CN
China
Prior art keywords
identification code
data
exclusive identification
private clound
public cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710805266.7A
Other languages
Chinese (zh)
Other versions
CN107395772B (en
Inventor
张贵勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710805266.7A priority Critical patent/CN107395772B/en
Publication of CN107395772A publication Critical patent/CN107395772A/en
Application granted granted Critical
Publication of CN107395772B publication Critical patent/CN107395772B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0607Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

This application discloses a kind of management method of duplicate data, including:Unique mark calculating processing is carried out to data, obtains exclusive identification code;Judge to whether there is and exclusive identification code identical identification code in private clound;If it is not, then by data storage corresponding to exclusive identification code in private clound;Judge in public cloud with exclusive identification code identical identification code existing for quantity whether be less than predetermined number;If so, then storing corresponding to exclusive identification code, data are into public cloud, until quantity is equal to predetermined number.It is a in the private clound that the data repeated are only preserved, improve the utilization rate of the memory space of private clound.The duplicate data of predetermined number is preserved in public cloud to ensure the reliability of data, and the utilization rate for depositing number space can be improved within certain amount, improves systematic function.Disclosed herein as well is a kind of management system of duplicate data and computer-readable recording medium, has above-mentioned beneficial effect.

Description

The management method and management system of a kind of duplicate data
Technical field
The application is related to field of computer technology, the more particularly to a kind of management method of duplicate data, management system and meter Calculation machine readable storage medium storing program for executing.
Background technology
With the development of cloud computing technology, data are more and more stored in cloud by enterprise, and are in data safety Consideration, enterprise is more willing to place the data in private clound, but again wishes that depositing for the calculating of public cloud can be obtained simultaneously Storage resource reduces cost.Therefore there is the mixed cloud by private clound and mixed cloud fusion, public cloud and private clound are mixed Close and match the purpose for obtain optimal effect, having reached and having saved money and ensureing safety.
But in cloud system is mixed, the quantity of data storage is constantly increased with geometric progression, but wherein most number According to when redundant data, do not only take up network bandwidth, also waste memory space, increase data management cost, reduce systematicness Energy.
Therefore, how to be hot issue that those skilled in the art face for ever-increasing data volume.
The content of the invention
The purpose of the application is to provide a kind of management method of duplicate data, management system and computer-readable storage medium Matter, judge whether data repeat in private clound by the exclusive identification code of data, the private clound that only preserves of data that will be repeated Middle portion, improve the utilization rate of the memory space of private clound.The duplicate data of predetermined number is preserved in public cloud to ensure The reliability of data, and the utilization rate for depositing number space can be improved within certain amount, data management cost is reduced, is carried High systematic function.
In order to solve the above technical problems, the application provides a kind of management method of duplicate data, including:
Unique mark calculating processing is carried out to data, obtains exclusive identification code;
Judge to whether there is and the exclusive identification code identical identification code in private clound;
If it is not, then by the data storage corresponding to the exclusive identification code in the private clound;
Judge whether be less than present count with quantity existing for identification code described in the exclusive identification code identical in public cloud Amount;
If so, the data corresponding to the exclusive identification code are then stored into the public cloud, until described quantity etc. In the predetermined number.
Optionally, it is described judge in public cloud with quantity existing for identification code described in the exclusive identification code identical whether Before predetermined number, including:
The exclusive identification code is encrypted, obtains encryption key;
The encryption key is sent into the public cloud processing is decrypted, obtain the exclusive identification code.
Optionally, in addition to:
To uniquely it be marked described in the address of data corresponding to exclusive identification code described in the private clound and the public cloud Know the address of data corresponding to code, be stored in the private clound.
Optionally, the exclusive identification code is cryptographic Hash.
The application also provides a kind of management system of duplicate data, including:
Computing module, for carrying out unique mark calculating processing to data, obtain exclusive identification code;
Private clound duplicate data enquiry module, for judging to whether there is and the exclusive identification code identical in private clound Identification code;
Private clound data memory module, for by the data storage corresponding to the exclusive identification code in the private clound In;
Public cloud duplicate data enquiry module, for judging in public cloud with being identified described in the exclusive identification code identical Whether quantity existing for code is less than predetermined number;
Public cloud data memory module, for storing the data corresponding to the exclusive identification code to the public cloud In, until the quantity is equal to the predetermined number.
Optionally, in addition to:
Private clound encrypting module, for the exclusive identification code to be encrypted, obtain encryption key;
Public cloud deciphering module, processing is decrypted for the encryption key to be sent into the public cloud, obtains The exclusive identification code.
Optionally, in addition to:
Data address memory module, for by the address of data corresponding to exclusive identification code described in the private clound and institute The address of data corresponding to exclusive identification code described in public cloud is stated, is stored in the private clound.
The application also provides a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium On be stored with computer program, when the computer program is executed by processor realize as described in any one of Claims 1-4 The step of management method of duplicate data.
A kind of management method of duplicate data provided herein, including:Unique mark calculating processing is carried out to data, Obtain exclusive identification code;Judge to whether there is and the exclusive identification code identical identification code in private clound;If it is not, then by described in The data storage is in the private clound corresponding to exclusive identification code;Judge in public cloud with the exclusive identification code identical Whether quantity existing for the identification code is less than predetermined number;If so, then store the data corresponding to the exclusive identification code Into the public cloud, until the quantity is equal to the predetermined number.
Judge to whether there is duplicate data in private clound by the exclusive identification code of data, will if there is duplicate data The duplicate data only preserves portion in private clound, duplicate data is preserved predetermined number in shared cloud, can improve The utilization rate of memory space, while duplicate data is deposited in public cloud predetermined number, it is ensured that the reliability of data. Normal duplicate data can be replaced in public cloud by exclusive identification code when the duplicate data in private clound is impaired.
Unique mark is encrypted in the present embodiment simultaneously, it is ensured that the data safety in public cloud Property.
The application also provides a kind of management system of duplicate data and a kind of computer-readable recording medium, has with above-mentioned Beneficial effect, is no longer repeated herein.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of application, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of flow chart of the management method for duplicate data that the embodiment of the present application provides;
Fig. 2 is a kind of flow of the exclusive identification code transmission of the management method for duplicate data that the embodiment of the present application provides Figure;
Fig. 3 is a kind of structural representation of the management system for duplicate data that the embodiment of the present application provides;
Fig. 4 is a kind of a kind of embodiment of the management system for duplicate data that the embodiment of the present application provides.
Embodiment
The core of the application is to provide a kind of management method of duplicate data, management system and computer-readable storage medium Matter, judge whether data repeat in private clound by the exclusive identification code of data, the private clound that only preserves of data that will be repeated Middle portion, improve the utilization rate of the memory space of private clound.The duplicate data of predetermined number is preserved in public cloud to ensure The reliability of data, and the utilization rate for depositing number space can be improved within certain amount, data management cost is reduced, is carried High systematic function.
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
Fig. 1 is refer to, Fig. 1 is a kind of flow chart of the management method for duplicate data that the embodiment of the present application provides.
The present embodiment provides a kind of management method of duplicate data, can include:
S101, unique mark calculating processing is carried out to data, obtains exclusive identification code;
This step is intended to calculate exclusive identification code, it is necessary to which explanation is, in cloud computing storage system, to data to data Carrying out identical contrast is contrasted for the exclusive identification codes of data, determines whether data are identical.And exclusive identification code is theoretical On be that the data of a unit have unique identification code, therefore data its exclusive identification code repeated is also identical, is in storage The unit data of repetition can be uniquely determined in system.Also, exclusive identification code can not change with the number of unit data, That is no matter how many data volume of unit data is, can be represented by the exclusive identification code of fixed length, be easy to condition code Send and receive in cloud computing storage.
Wherein, unique mark calculates processing and selects different calculations according to the difference of selection exclusive identification code, This is not repeated.Wherein, exclusive identification code can be that cryptographic Hash can also be MD5 values, all with the relatively low repetition rate of coding, Ke Yizhun Really determine unique unit data.
Wherein, data refer to the data of a unit, and unit can refer to that one piece can also be one section, should regard different storages Systematic selection is adapted to the unit of storage system, will not be described here.
S102, judge to whether there is and exclusive identification code identical identification code in private clound;
S103, if it is not, then by data storage corresponding to exclusive identification code in private clound;
On the basis of step S101, step S102 to step S103 is intended to judge to whether there is repeat number in private clound According to, and ensure that duplicate data only preserves portion in private clound.
Wherein, identification code is exclusive identification code, this be the name distinguished in public cloud with other exclusive identification codes Claim, substantially and indifference.
Wherein, because private clound cost is higher, and when the data volume of storage is huger, there can be substantial amounts of redundancy Data, the utilization rate of the storage system of private clound is reduced, occupy a large amount of storage resources, be unfavorable for the normal operation of system.Cause This, judges the duplicate data in data, and a duplicate data is only preserved in private clound, reduces the quantity of redundant data, improves The utilization rate of storage system.
S104, judge in public cloud with exclusive identification code identical identification code existing for quantity whether be less than predetermined number;
S105, if so, then storing corresponding to exclusive identification code, data are into public cloud, until quantity is equal to predetermined number.
On the basis of step S101 to step S103, weight that step S104 is intended to store in public cloud to step S105 The quantity of complex data is maintained on predetermined number.By the method for judgement, judge whether to require supplementation with duplicate data to present count In amount.
It should be noted that portion is only preserved for duplicate data in private clound, may when there are system disorders The problems such as error in data occurs, the situation for causing duplicate data to lose, therefore in storage portion, this is heavy in mixed cloud system Complex data.
Wherein, public cloud cost is relatively low, and possesses substantial amounts of storage resource, therefore duplicate data can be stored in into public affairs Have in cloud.And the duplicate data of predetermined number can be preserved, to keep the reliability of data storage.
When the duplicate data stored in private clound again occurs wrong, can be found according to exclusive identification code in public cloud The duplicate data of preservation, so as to recover the wrong data of the loss in private clound.
To sum up, the present embodiment by the exclusive identification code of data judge data whether in private clound repeat, by repeat It is a in the private clound that data only preserve, improve the utilization rate of the memory space of private clound.Present count is preserved in public cloud The duplicate data of amount can improve the utilization rate for depositing number space to ensure the reliability of data within certain amount, drop Low data management cost, improves systematic function.
Fig. 2 is refer to, Fig. 2 is that a kind of exclusive identification code of the management method for duplicate data that the embodiment of the present application provides passes The flow chart sent.
With reference to a upper embodiment, the exclusive identification code that how to transmit during the present embodiment is implemented primarily directed to upper one does one Explain, other parts are substantially identical with a upper embodiment, and same section refer to an embodiment, no longer repeat herein.
The present embodiment can include:
S201, exclusive identification code is encrypted, obtains encryption key;
This step, which is intended to this defending clothing identification code, to be encrypted, and obtains encryption key.
Wherein, because exclusive identification code is transmitted to public cloud, clothing identification code robber is defended in order to prevent third party's malice from obtaining Data content is taken, therefore exclusive identification code is encrypted, to improve the security of data.
S202, encryption key is sent processing is decrypted into public cloud, obtain exclusive identification code.
On the basis of step S201, this step is intended to send encryption key to public cloud crowd, and carries out decryption processing, Obtain exclusive identification code.The associative operation of duplicate data can be carried out according to the exclusive identification code exposed out in public cloud.
Wherein, encryption and decryption processing, can be according to the systematic function choosing of practical situations, and cloud storage system Suitable processing mode is selected, is no longer repeated herein.
With reference to a upper embodiment, the address that the present embodiment preserves data primarily directed to the private clound in upper one implementation does one Individual expansion, other parts are substantially identical with a upper embodiment, and same section refer to an embodiment, no longer repeat herein.
The present embodiment can include:
By data corresponding to exclusive identification code in the address of data corresponding to exclusive identification code in private clound and public cloud Address, it is stored in private clound.
Wherein, the address of the duplicate data in the address and public cloud of the duplicate data in private clound is all stored in privately owned Yun Zhong, can be according to the address of the duplicate data of preservation in private clound when private clound requires to look up and preserved the duplicate data Neutralize in public cloud and find the duplicate data.
It is envisioned that when the storage address of data is transmitted into preservation, the storage address of data can be entered Row encryption, to keep security and reliability of the storage address in transmission.
The embodiment of the present application provides a kind of management method of duplicate data, judges data by the exclusive identification code of data Whether repeated in private clound, it is a in the private clound that the data repeated are only preserved, improve the memory space of private clound Utilization rate.The duplicate data of predetermined number is preserved in public cloud to ensure the reliability of data, and within certain amount The utilization rate for depositing number space can be improved, data management cost is reduced, improves systematic function.
A kind of management system of the duplicate data provided below the embodiment of the present application is introduced, one kind described below The management system of duplicate data can be mutually to should refer to a kind of above-described management method of duplicate data.
Fig. 3 is refer to, Fig. 3 is a kind of structural representation of the management system for duplicate data that the embodiment of the present application provides.
The present embodiment can include:
Computing module 100, for carrying out unique mark calculating processing to data, obtain exclusive identification code;
Private clound duplicate data enquiry module 200, for judging to whether there is and exclusive identification code identical in private clound Identification code;
Private clound data memory module 300, for judge in public cloud with exclusive identification code identical identification code existing for Whether quantity is less than predetermined number;
Public cloud duplicate data enquiry module 400, for judging exclusive identification code identical data present in public cloud Quantity whether be less than predetermined number;
Public cloud data memory module 500, for storing data corresponding to exclusive identification code into public cloud, until quantity Equal to predetermined number.
It can also include:
Private clound encrypting module, for exclusive identification code to be encrypted, obtain encryption key;
Public cloud deciphering module, processing is decrypted into public cloud for encryption key to be sent, obtains unique mark Code.
It can also include:
Data address memory module, for data address memory module, for by corresponding to exclusive identification code in private clound The address of data corresponding to exclusive identification code, is stored in private clound in the address of data and public cloud.
Fig. 4 is refer to, Fig. 4 is a kind of a kind of embodiment party of the management system for duplicate data that the embodiment of the present application provides Formula.
Wherein it is possible to the difference of the storage system position according to performed by modules in system, modules are divided into The module in module and public cloud in private clound.Private clound includes:Computing module, private clound duplicate data enquiry module, Private clound data memory module and private clound encrypting module.Public cloud includes:It is public cloud duplicate data enquiry module, publicly-owned Cloud data memory module and public cloud deciphering module.
A kind of computer-readable recording medium provided below the embodiment of the present application is introduced, one kind described below Computer-readable recording medium can be mutually to should refer to a kind of above-described management method of duplicate data.
The present embodiment provides a kind of computer-readable recording medium, it is characterised in that is deposited on computer-readable recording medium Computer program is contained, the pipe of the duplicate data such as any one of Claims 1-4 is realized when computer program is executed by processor The step of reason method.
Each embodiment is described by the way of progressive in specification, and what each embodiment stressed is and other realities Apply the difference of example, between each embodiment identical similar portion mutually referring to.For device disclosed in embodiment Speech, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is referring to method part illustration .
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, the composition and step of each example are generally described according to function in the above description.These Function is performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specialty Technical staff can realize described function using distinct methods to each specific application, but this realization should not Think to exceed scope of the present application.
Directly it can be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above to management method, management system and the computer-readable storage medium of a kind of duplicate data provided herein Matter system is described in detail.Specific case used herein is set forth to the principle and embodiment of the application, with The explanation of upper embodiment is only intended to help and understands the present processes and its core concept.It should be pointed out that led for this technology For the those of ordinary skill in domain, on the premise of the application principle is not departed from, can also to the application carry out it is some improvement and Modification, these are improved and modification is also fallen into the application scope of the claims.

Claims (8)

  1. A kind of 1. management method of duplicate data, it is characterised in that including:
    Unique mark calculating processing is carried out to data, obtains exclusive identification code;
    Judge to whether there is and the exclusive identification code identical identification code in private clound;
    If it is not, then by the data storage corresponding to the exclusive identification code in the private clound;
    Judge whether be less than predetermined number with quantity existing for identification code described in the exclusive identification code identical in public cloud;
    If so, the data corresponding to the exclusive identification code are then stored into the public cloud, until the quantity is equal to institute State predetermined number.
  2. 2. management method according to claim 1, it is characterised in that it is described judgement public cloud in the exclusive identification code Whether quantity existing for identification code described in identical is less than before predetermined number, including:
    The exclusive identification code is encrypted, obtains encryption key;
    The encryption key is sent into the public cloud processing is decrypted, obtain the exclusive identification code.
  3. 3. management method according to claim 2, it is characterised in that also include:
    By exclusive identification code described in the address of data corresponding to exclusive identification code described in the private clound and the public cloud The address of corresponding data, it is stored in the private clound.
  4. 4. management method according to claim 3, it is characterised in that the exclusive identification code is cryptographic Hash.
  5. A kind of 5. management system of duplicate data, it is characterised in that including:
    Computing module, for carrying out unique mark calculating processing to data, obtain exclusive identification code;
    Private clound duplicate data enquiry module, identified for judging to whether there is in private clound with the exclusive identification code identical Code;
    Private clound data memory module, for by the data storage corresponding to the exclusive identification code in the private clound;
    Public cloud duplicate data enquiry module, for judging to deposit with identification code described in the exclusive identification code identical in public cloud Quantity whether be less than predetermined number;
    Public cloud data memory module, for storing, the data are into the public cloud corresponding to the exclusive identification code, directly It is equal to the predetermined number to the quantity.
  6. 6. management system according to claim 5, it is characterised in that also include:
    Private clound encrypting module, for the exclusive identification code to be encrypted, obtain encryption key;
    Public cloud deciphering module, processing is decrypted for the encryption key to be sent into the public cloud, obtains described Exclusive identification code.
  7. 7. management system according to claim 6, it is characterised in that also include:
    Data address memory module, for by the address of data corresponding to exclusive identification code described in the private clound and the public affairs There is the address of data corresponding to exclusive identification code described in cloud, be stored in the private clound.
  8. 8. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the management of the duplicate data as described in any one of Claims 1-4 is realized when the computer program is executed by processor The step of method.
CN201710805266.7A 2017-09-08 2017-09-08 Management method and management system for repeated data Active CN107395772B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710805266.7A CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710805266.7A CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Publications (2)

Publication Number Publication Date
CN107395772A true CN107395772A (en) 2017-11-24
CN107395772B CN107395772B (en) 2020-09-18

Family

ID=60349488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710805266.7A Active CN107395772B (en) 2017-09-08 2017-09-08 Management method and management system for repeated data

Country Status (1)

Country Link
CN (1) CN107395772B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639778A (en) * 2018-11-29 2019-04-16 威富通科技有限公司 A kind of data transmission method, private clound and server
CN110677429A (en) * 2019-10-10 2020-01-10 青岛大学 File storage method and system, cloud device and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765848A (en) * 2015-04-17 2015-07-08 中国人民解放军空军航空大学 Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage
CN104932956A (en) * 2015-06-19 2015-09-23 华南理工大学 Big-data-oriented cloud disaster tolerant backup method
US20160342507A1 (en) * 2013-10-01 2016-11-24 Blazemeter Ltd. System and method for dynamically testing networked target systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160342507A1 (en) * 2013-10-01 2016-11-24 Blazemeter Ltd. System and method for dynamically testing networked target systems
CN104765848A (en) * 2015-04-17 2015-07-08 中国人民解放军空军航空大学 Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage
CN104932956A (en) * 2015-06-19 2015-09-23 华南理工大学 Big-data-oriented cloud disaster tolerant backup method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639778A (en) * 2018-11-29 2019-04-16 威富通科技有限公司 A kind of data transmission method, private clound and server
CN110677429A (en) * 2019-10-10 2020-01-10 青岛大学 File storage method and system, cloud device and terminal device

Also Published As

Publication number Publication date
CN107395772B (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN110059494B (en) Privacy protection method for block chain transaction data and block chain system
CN107360156B (en) P2P network method for cloud storage based on block chain under a kind of big data environment
AU2018347195B2 (en) System and method for information protection
CN111656343B (en) Error correction coding based shared blockchain data storage in trusted execution environments
CN106101257B (en) A kind of cloud storage data managing method and device based on Bloom filter
CN111417930B (en) Prioritizing shared blockchain data storage
CN101917403B (en) Distributed key management method for ciphertext storage
CN104836862B (en) A kind of Intelligent terminal data storage method
CN111656386B (en) Managing transaction requests in ledger system
CN111406252A (en) Consensus of error correction code based shared blockchain data storage
CA3037833A1 (en) System and method for information protection
CN110602147A (en) Data encryption safe storage method, system and storage medium based on cloud platform
CA3083722C (en) Re-encrypting data on a hash chain
WO2019147744A1 (en) Consistency and consensus management in decentralized and distributed systems
CN109948347A (en) A kind of date storage method and device, server and readable storage medium storing program for executing
CN107483192A (en) A kind of data transmission method and device based on quantum communication
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
CN108810063A (en) Secure distribution and restorative procedure, the system and medium of data under a kind of cloudy storage environment
CN109639436A (en) The data property held verification method and terminal device based on salt figure
CN106648938A (en) Linux system application program memory management method and system
Tchernykh et al. Towards mitigating uncertainty of data security breaches and collusion in cloud computing
CN111630545B (en) Managing transaction requests in ledger system
CN107395772A (en) The management method and management system of a kind of duplicate data
CN107645558A (en) A kind of three-level secure cloud storage method calculated based on mist
CN110914826B (en) System and method for distributed data mapping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200824

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant