CN108154045B - A method of creation authentic data library - Google Patents

A method of creation authentic data library Download PDF

Info

Publication number
CN108154045B
CN108154045B CN201611111431.0A CN201611111431A CN108154045B CN 108154045 B CN108154045 B CN 108154045B CN 201611111431 A CN201611111431 A CN 201611111431A CN 108154045 B CN108154045 B CN 108154045B
Authority
CN
China
Prior art keywords
server
group
database
reliability
reliable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611111431.0A
Other languages
Chinese (zh)
Other versions
CN108154045A (en
Inventor
刘斌
吴方才
楚涌泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Star Map Co Ltd
Original Assignee
Zhongke Star Map Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Star Map Co Ltd filed Critical Zhongke Star Map Co Ltd
Priority to CN201611111431.0A priority Critical patent/CN108154045B/en
Publication of CN108154045A publication Critical patent/CN108154045A/en
Application granted granted Critical
Publication of CN108154045B publication Critical patent/CN108154045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2094Redundant storage or storage space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/80Database-specific techniques

Abstract

The present invention relates to a kind of methods for creating authentic data library, this method comprises: by calculating reliability, the maximum one group of database server of reliability is selected in n platform database server as one reliable group, the server number in one group of database server is pre-set numerical value t;Step 1 is executed repeatedly, obtains mutually different m reliable group, m is numerical value predetermined;Database is divided into m small libraries, each reliable group stores a small library respectively, and the server in same reliable group all stores the copy in corresponding small library.

Description

A method of creation authentic data library
[technical field]
The invention belongs to computer and data security arts more particularly to a kind of methods for creating authentic data library.
[background technique]
In recent years, information security has become one of most concerned problem of people, and general with the applications of computer network And and improve, for database in every field using more and more extensive, database security becomes core of computer field Research contents, database security have become an importance of computer information safe, and importance is embodied in: 1) data Library is the basis of each important system, and most enterprises, tissue and the significant data of government department are all stored in various data In library, these data, which will once be lost, to bring immeasurable loss to enterprise, tissue and government department.2) database is in store Sensitive data is not paid attention to but accordingly in terms of safety, as long as it has been recognized that Strengthens network and operating system Safety can, to ignore the safety of database.3) security breaches of some databases are in compromise data library safety Operating system and other trusted systems are also threatened simultaneously, and the mechanism that some databases provide can influence operating system and network The bottom of safety, even if database operates in very safe operating system, invader need to only be executed in some databases The extended stored procedure set still can obtain operating system permission by database.
Database security includes the confidentiality, integrity, and availability of the information of storage in the database, in the prior art, How Research of Database Security is it is emphasised that keep attacker outside of the door, by encrypting and stringent access control protection information Confidentiality, integrity, and availability, multiclass classification security system, boundary Control, intrusion detection and physical security measures can Meet the privacy requirements of certain customers, the main purpose of these safe practices is defensive attack or invasion, but in fact these are anti- Imperial measure be for some malicious attacks sometimes it is invalid, especially internal attack, therefore, defend failure in the case where, must The safety that a kind of scheme enhancing existing database system must be found, makes them when facing attack with the energy restored automatically Power, provide Database Systems can survival ability.
[summary of the invention]
In order to solve the above problem in the prior art, the invention proposes a kind of methods for creating authentic data library.
The technical solution adopted by the invention is as follows:
A method of creation authentic data library, method includes the following steps:
Step 1: by calculating reliability, the maximum one group of database clothes of reliability are selected in n platform database server Device be engaged in as one reliable group, the server number in one group of database server is pre-set numerical value t;
Step 2: executing step 1 repeatedly, obtain mutually different m reliable group, m is numerical value predetermined.
Step 3: database being divided into m small libraries, each reliable organize stores a small library respectively, in same reliable group Server all stores the copy in corresponding small library.
Further, also there is a primary server, the primary server is for managing and dispatching each database server.
Further, the primary server provides database service to outside.
Further, pass through LAN connection between each database server.
Further, it is connected between each database server by wide area network.
Further, it is connected between each database server by internet.
The beneficial effect comprise that storing according to the data of reliability based distribution database, database is substantially increased Reliability and safety.
[Detailed description of the invention]
Described herein the drawings are intended to provide a further understanding of the invention, constitutes part of this application, but It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is system construction drawing applied by the method for the present invention.
Fig. 2 is the basic step figure of the method for the present invention.
[specific embodiment]
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and says It is bright to be only used to explain the present invention but not as a limitation of the invention.
Referring to attached drawing 1, it illustrates the system structure that present invention creation authentic data library method is applicable in, which includes More database servers are used for one database of distributed storage.All database servers all pass through network and are mutually connected It connects, data can be transmitted mutually between each other, while each database server receives the management and scheduling of primary server, and passes through Primary server provides database service to outside.The network can be the local area network of an inside, the advantages of using local area network It is that mutual transmission data are fast;But, it is contemplated that long-distance disaster, the network are also possible to wide area network, internet.
Referring to fig. 2, it is based on above system structure, the method in creation authentic data library of the invention includes following basic step It is rapid:
Step 1: by calculating reliability, the maximum one group of database clothes of reliability are selected in n platform database server Device be engaged in as one reliable group, the server number in one group of database server is pre-set numerical value t;
Step 2: executing step 1 repeatedly, obtain mutually different m reliable group, m is numerical value predetermined.
Step 3: database being divided into m small libraries, each reliable organize stores a small library respectively, in same reliable group Server all stores the copy in corresponding small library.
Based on above-mentioned basic step, the following detailed description of the method in creation authentic data library of the invention:
(1) entire database is divided into m small libraries.
Specific partitioning scheme depends on the organizational form of the data and database that are stored in database.For example, can To be split based on tables of data, i.e., multiple tables of data are constituted into a small library;It can also be entered to divide according to the data volume of storage It cuts, so that the data volume that each small library is stored is essentially identical.In view of distributed storage, the quantity m in small library is pre-defined Numerical value, can determine as the case may be, but generally no less than 3.
(2) the quantity t of redundant server is set.
The quantity of the redundant server refers to the quantity for storing the database server in the same small library, it is assumed that altogether There is n platform database server, then each small library is stored in t platform database server therein simultaneously, it means that i.e. Make wherein have t-1 platform database server failure, relies on remaining 1 database server, which can also be restored. In order to guarantee redundancy, t >=3 are generally required.Additionally, it is preferred that, in order to enable the advantage of distributed storage preferably plays, number It is average according to distribution, n >=mt/2 should be met, wherein m is the quantity in small library.
(3) appoint in n platform database server and take t platform, form a server group, it, altogether can be with by permutation and combination It obtainsA server group remembers that these server groups are S1, S2... ..., SK,It can so obtain by these services Set S={ the S that device group is constitutedi, 1≤i≤K }.
For example, one shares 5 database servers if t=3, then by permutation and combination, server group one is sharedIt is a, i.e., | S |=10.The step for actually give all possible group of t redundant server of same small library It closes.
(4) the current reliability of each database server is calculated, specific calculation method is explained below.
The reliability is actually the small library of the database server storing data cost to be expended, and has reacted the number According to the efficiency of library server storing data.
(5) for each server group in set S, the reliability of calculation server group, the server group it is reliable Degree is the sum of the reliability of all database servers in the server group.
The sum of described reliability, which reflects a small library, will store the server total reliability to be spent, and pass through The reliability and, the superiority and inferiority of different server group can be measured.
(6) it to the server group in set S, is ranked up according to the reliability of server group, by the maximum clothes of reliability Business device group is deleted as one reliable group, and from set S.
(7) step 4-6 is repeated, until obtaining m reliable group.
By step 4-6, an opposite optimal solution is had selected, i.e., m small libraries are stored in n number of units evidence at redundancy t The opposite optimal solution of library server, by this with respect to optimal solution, the distributed storage efficiency of entire database is guaranteed.
(8) each reliable group stores a small library respectively, i.e., all stores each database server in reliable group One duplication in corresponding small library.
The reliable group of m is corresponded with m small libraries, thus above-mentioned steps m small libraries are substantially respectively stored in m can By spending in maximum server group, and there is t redundancy in each small library, even if t-1 platform server failure therein, also can Enough continue offer service, and is provided after fault restoration and restore data.On the one hand distributed storage, another party have been achieved the purpose that Face has also achieved the purpose that redundancy backup.
(9) it for the database server not in any one reliable group, is stored using the database server all Small library.
May be excessive due to certain database server reliabilitys, or since database server quantity is very big, cause Have in the step of some database servers do not have in front and small library is stored by selection, in order not to waste its storage capacity, this hair It is bright that all small libraries, the backup as further distributed storage are stored using these servers.
In abovementioned steps (4), need to calculate current reliability for each database server, reliability can have A variety of calculations, here is the calculation of one embodiment according to the present invention, but those skilled in the art can adopt With any one other feasible calculation, the invention is not limited in this regard.
(4.1) n platform database server is set as A1, A2... ..., An;A is calculated firstiThe data cost D of (1≤i≤n)i, That is Di=Li/Ti.Wherein, TiIt is database server AiTo the propagation delay time (unit is the second) of primary server, LiIt is data Library server AiThe data throughput of itself (unit is MB/ seconds).
If each database server in the same local area network, the propagation delay time should be it is identical, In this case it can be omitted the calculating of the time, directly replaced with a fixed numbers.
(4.2) database server A is calculatediReliability Ci=Di/Fi
Wherein, FiIt is AiThe number occurred in reliable group obtained.For example, the reliable group obtained is S1= {A1, A2, A3And S2={ A1, A3, A4, then current F1=2, i.e. A1Occur 2 times in the two reliable groups obtained, together Reason has F2=1, F3=2.
The FiReflect database server AiIn existing small library quantity, each small library can occupy memory space and Data transfer bandwidth causes database server load to increase, thus results in the increase of reliability.
Based on the method in above-mentioned creation authentic data library, in the management of database, the same small library is in disparate databases All be on server it is synchronous, therefore, if having one to be lost data in n platform database server, others can be used Database server restores data for it, for example, if there is k small libraries on the server of loss data originally, Restore data using the other k platform database server corresponding to k small libraries simultaneously for it.
The above description is only a preferred embodiment of the present invention, thus it is all according to the configuration described in the scope of the patent application of the present invention, The equivalent change or modification that feature and principle are done, is included in the scope of the patent application of the present invention.

Claims (2)

1. a kind of method for creating authentic data library, which is characterized in that method includes the following steps:
Step 1: by calculating reliability, the maximum one group of database server of reliability is selected in n platform database server As one reliable group, the server number in one group of database server is pre-set numerical value t;
Appoint in n platform database server and take t platform, forms a server group, it is available altogether by permutation and combinationIt is a Server group remembers that these server groups are S1, S2... ..., SK,The set S=that the server group is constituted {Si, 1≤i≤K };
For each server group in set S, the reliability of calculation server group, the reliability of the server group is the clothes The sum of the reliability of all database servers in device group of being engaged in;
It to the server group in set S, is ranked up according to the reliability of server group, the maximum server group of reliability is made It is one reliable group, and is deleted from set S;
Step 2: executing step 1 repeatedly, obtain mutually different m reliable group, m is numerical value predetermined;
Step 3: database being divided into m small libraries, each reliable group stores a small library, the service in same reliable group respectively Device all stores the copy in corresponding small library;
Also there is a primary server, the primary server is for managing and dispatching each database server;Each database clothes Pass through LAN connection between business device;Or it is connected between each database server by wide area network;Or each database service It is connected between device by internet.
2. the method in creation authentic data library according to claim 1, which is characterized in that the primary server is mentioned to outside For database service.
CN201611111431.0A 2016-12-02 2016-12-02 A method of creation authentic data library Active CN108154045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611111431.0A CN108154045B (en) 2016-12-02 2016-12-02 A method of creation authentic data library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611111431.0A CN108154045B (en) 2016-12-02 2016-12-02 A method of creation authentic data library

Publications (2)

Publication Number Publication Date
CN108154045A CN108154045A (en) 2018-06-12
CN108154045B true CN108154045B (en) 2019-11-26

Family

ID=62467780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611111431.0A Active CN108154045B (en) 2016-12-02 2016-12-02 A method of creation authentic data library

Country Status (1)

Country Link
CN (1) CN108154045B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706795A (en) * 2009-11-30 2010-05-12 上海世范软件技术有限公司 Method for synchronizing data of database in active/standby server
CN101876924A (en) * 2009-04-30 2010-11-03 升东网络科技发展(上海)有限公司 Database fault automatic detection and transfer method
CN104317803A (en) * 2014-09-23 2015-01-28 厦门美柚信息科技有限公司 Data access structure and method of database cluster

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101876924A (en) * 2009-04-30 2010-11-03 升东网络科技发展(上海)有限公司 Database fault automatic detection and transfer method
CN101706795A (en) * 2009-11-30 2010-05-12 上海世范软件技术有限公司 Method for synchronizing data of database in active/standby server
CN104317803A (en) * 2014-09-23 2015-01-28 厦门美柚信息科技有限公司 Data access structure and method of database cluster

Also Published As

Publication number Publication date
CN108154045A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
Zhang et al. Ensure data security in cloud storage
CN105120003B (en) A kind of method for realizing data backup under cloud environment
CN104008152B (en) Support the framework method of the distributed file system of mass data access
CN105282171B (en) A kind of safe and reliable distributed cloud storage method
Alhazmi et al. Evaluating disaster recovery plans using the cloud
CN102088491B (en) Distributed storage oriented cloud storage security architecture and data access method thereof
US8528101B1 (en) Integrated physical security control system for computing resources
KR102225196B1 (en) Consensus of shared blockchain data storage based on error correction codes
Tamimi et al. Disaster recovery techniques in cloud computing
Suguna et al. Overview of data backup and disaster recovery in cloud
CN114363352B (en) Cross-chain interaction method of Internet of things system based on block chain
Yaseen et al. Mitigating insider threat in cloud relational databases
CN110839023B (en) Electric power marketing multi-channel customer service system
Vande Putte et al. Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers?
CN102055797A (en) Method, device and system for accessing cloud storage data
Pottier et al. TrustyDrive, a multi-cloud storage service that protects your privacy
CN103092533B (en) A kind of method and system of data remote synchronization
CN108154045B (en) A method of creation authentic data library
CN116800541A (en) Classified and hierarchical access control and access method for flight operation data
Jogdand et al. CSaaS-a multi-cloud framework for secure file storage technology using open ZFS
Kanimozhi et al. Immediate detection of data corruption by integrating blockchain in cloud computing
US20090276851A1 (en) Detecting malicious behavior in a series of data transmission de-duplication requests of a de-duplicated computer system
Zhang et al. Multi-level container checkpoint performance optimization strategy in SDDC
RU2720951C1 (en) Method and distributed computer system for data processing
Nikolovski et al. On the requirements for successful business continuity in the context of disaster recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 101399 No. 2 East Airport Road, Shunyi Airport Economic Core Area, Beijing (1st, 5th and 7th floors of Industrial Park 1A-4)

Applicant after: Zhongke Star Map Co., Ltd.

Address before: 101399 Building 1A-4, National Geographic Information Technology Industrial Park, Guomen Business District, Shunyi District, Beijing

Applicant before: Space Star Technology (Beijing) Co., Ltd.

GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Chen Wei

Inventor after: Liu Bin

Inventor after: Wu Fangcai

Inventor after: Chu Yongquan

Inventor before: Liu Bin

Inventor before: Wu Fangcai

Inventor before: Chu Yongquan