CN112367360B - Method and device for expanding public cloud data processing capacity - Google Patents

Method and device for expanding public cloud data processing capacity Download PDF

Info

Publication number
CN112367360B
CN112367360B CN202011143102.0A CN202011143102A CN112367360B CN 112367360 B CN112367360 B CN 112367360B CN 202011143102 A CN202011143102 A CN 202011143102A CN 112367360 B CN112367360 B CN 112367360B
Authority
CN
China
Prior art keywords
information
data
obtaining
data information
capacity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011143102.0A
Other languages
Chinese (zh)
Other versions
CN112367360A (en
Inventor
杨光
黄允富
贾东伟
杨栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtong Information Service Co ltd
Original Assignee
Zhongtong Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongtong Information Service Co ltd filed Critical Zhongtong Information Service Co ltd
Priority to CN202011143102.0A priority Critical patent/CN112367360B/en
Publication of CN112367360A publication Critical patent/CN112367360A/en
Application granted granted Critical
Publication of CN112367360B publication Critical patent/CN112367360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention provides a method and a device for expanding public cloud data processing capacity, which are used for obtaining first data information of a first client; obtaining first format information of first data information; judging whether the first format information meets a first preset condition or not; if the first format information does not meet the first format information, a first conversion instruction is obtained, wherein the first conversion instruction is used for obtaining second format information after converting the first format of the first data; obtaining first capacity information of the first data information; judging whether the first capacity information is within a preset capacity threshold value; if so, obtaining a first encryption level; obtaining a target encryption storage space according to the first encryption level; the first data information is stored in the target encryption storage space, so that a personalized storage scheme is formulated for a customer, the control and management of public cloud on data are improved, the safety of the data and information of the customer is guaranteed, the reliability and safety of the system are improved, and the customer satisfaction is improved.

Description

Method and device for expanding public cloud data processing capacity
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a device for expanding public cloud data processing capacity.
Background
The public cloud refers to computing services provided by third party providers over the public Internet, facing anyone who wishes to use or purchase. It may be sold free or on demand, allowing customers to pay only based on CPU cycles, storage or bandwidth usage. There are many instances of such a cloud that can provide services throughout today's open public network. Such as for example, the aristoloc, services including resilient computing, databases, storage, networking, analytics, communications, monitoring and management, application services, internet middleware, mobile services, video services, big data, security, domain names and websites, cloud marketplaces, and the like.
However, the applicant of the present invention finds that the prior art has at least the following technical problems:
the existing public cloud is difficult to ensure that data and information are protected sufficiently, so that the reliability and the safety of the system are low, the data management is difficult and complex, and the storage performance is poor, so that the user experience is poor.
Disclosure of Invention
The embodiment of the invention provides a method and a device for expanding public cloud data processing capacity, solves the technical problems that in the prior art, public cloud is difficult to ensure that data and information are sufficiently protected, so that the reliability and the safety of a system are not high, the data management is difficult and complex, and the storage performance is poor, so that the user experience is poor, and achieves the technical effects of establishing a personalized storage scheme for a user, improving the handling control and the management of the public cloud on the data, ensuring the safety of the data and the information of the user, further improving the reliability and the safety of the system, and improving the satisfaction degree of the user.
In view of the foregoing, embodiments of the present application are provided to provide a method and an apparatus for expanding public cloud data processing capability.
In a first aspect, the present invention provides a method for expanding public cloud data processing capability, where the method includes: obtaining first data information of a first client; obtaining first format information of the first data information; judging whether the first format information meets a first preset condition or not; if the first preset condition is not met, obtaining a first conversion instruction, wherein the first conversion instruction is used for obtaining second format information after converting a first format of the first data; obtaining first capacity information of the first data information; judging whether the first capacity information is within a preset capacity threshold value; if so, obtaining a first encryption level of the first data information; obtaining a target encryption storage space according to the first encryption level; and storing the first data information in the target encryption storage space according to the second format information.
In a second aspect, the present invention provides an apparatus for expanding public cloud data processing capability, the apparatus comprising:
a first obtaining unit, configured to obtain first data information of a first client;
a second obtaining unit configured to obtain first format information of the first data information;
the first judging unit is used for judging whether the first format information meets a first preset condition or not;
a third obtaining unit, configured to obtain a first conversion instruction if the first preset condition is not met, where the first conversion instruction is used to obtain second format information after converting a first format of the first data;
a fourth obtaining unit configured to obtain first capacity information of the first data information;
a second judging unit, configured to judge whether the first capacity information is within a preset capacity threshold;
a fifth obtaining unit, configured to obtain a first encryption level of the first data information if the first encryption level is the first encryption level;
a sixth obtaining unit, configured to obtain a target encrypted storage space according to the first encryption level;
and the first storage unit is used for storing the first data information in the target encryption storage space according to the second format information.
In a third aspect, the present invention provides an apparatus for extending public cloud data processing capability, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the method of the first aspect when executing the program.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
according to the method and the device for expanding the public cloud data processing capacity, provided by the embodiment of the invention, first data information of a first client and first format information of the first data information are obtained, and then whether the first format information meets a first preset condition is judged; if the first preset condition is not met, obtaining a first conversion instruction, wherein the first conversion instruction is used for obtaining second format information after converting the first format of the first data, so that the purpose of conveniently storing and managing the data in the later period is achieved; further, acquiring first capacity information of the first data information and judging whether the first capacity information is within a preset capacity threshold value, so as to achieve the purpose of mastering the data information in real time and avoiding problems in the subsequent processing process, and if so, acquiring a first encryption level of the first data information; and obtaining a target encryption storage space according to the first encryption level, and finally storing the first data information in the target encryption storage space according to the second format information, so that an individualized storage scheme is formulated for a client, the control and management of public cloud on data are improved, the safety of the data and information of the client is ensured, the reliability and safety of a system are improved, and the technical effect of improving the satisfaction degree of the client is achieved.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
Fig. 1 is a schematic flow chart illustrating a method for expanding public cloud data processing capability according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an apparatus for expanding public cloud data processing capability according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of another exemplary electronic device in an embodiment of the present invention.
Description of the reference numerals: a first obtaining unit 11, a second obtaining unit 12, a first judging unit 13, a third obtaining unit 14, a fourth obtaining unit 15, a second judging unit 16, a fifth obtaining unit 17, a sixth obtaining unit 18, a first storage unit 19, a receiver 301, a processor 302, a transmitter 303, a memory 304, and a bus interface 306.
Detailed Description
The embodiment of the invention provides a method and a device for expanding public cloud data processing capacity, which are used for solving the technical problems that in the prior art, a public cloud is difficult to ensure that data and information are protected enough, so that the reliability and the safety of a system are not high, the data management is difficult and complex, and the storage performance is poor, so that the user experience is poor, and the technical effects of establishing a personalized storage scheme for a user, improving the control and the management of the public cloud on the data, ensuring the safety of the data and the information of the user, further improving the reliability and the safety of the system and improving the satisfaction of the user are achieved. Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are merely some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited to the example embodiments described herein.
Summary of the application
The public cloud refers to computing services provided by third party providers over the public Internet, facing anyone who wishes to use or purchase. It may be sold free or on demand, allowing customers to pay only on CPU cycles, storage or bandwidth usage. There are many instances of such a cloud that can provide services throughout the open public network today. Such as the arrhizus example, the services include resilient computing, databases, storage, networking, analytics, communications, monitoring and management, application services, internet middleware, mobile services, video services, big data, security, domain names and websites, cloud marketplaces, and the like. However, the existing public cloud is difficult to ensure that data and information are protected sufficiently, so that the reliability and the safety of the system are not high, data management is difficult and complex, and the storage performance is poor, so that the user experience is poor.
Aiming at the technical problems, the technical scheme provided by the invention has the following general idea:
the embodiment of the application provides a method for expanding public cloud data processing capacity, which comprises the following steps: obtaining first data information of a first client; obtaining first format information of the first data information; judging whether the first format information meets a first preset condition or not; if the first preset condition is not met, obtaining a first conversion instruction, wherein the first conversion instruction is used for obtaining second format information after converting a first format of the first data; obtaining first capacity information of the first data information; judging whether the first capacity information is within a preset capacity threshold value; if so, obtaining a first encryption level of the first data information; obtaining a target encryption storage space according to the first encryption level; and storing the first data information in the target encryption storage space according to the second format information.
After introducing the basic principle of the present application, the following detailed description of the technical solutions of the present invention is made through the accompanying drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present application are detailed descriptions of the technical solutions of the present application, and are not limitations of the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
Example one
Fig. 1 is a schematic flowchart of a method for expanding public cloud data processing capability in an embodiment of the present invention. As shown in fig. 1, an embodiment of the present invention provides a method for expanding public cloud data processing capability, where the method includes:
step 100: first data information of a first customer is obtained.
Specifically, the first data information is resource information related to an individual or a company of the first customer, in other words, the first data information is information that the first customer needs to use a public cloud to perform services such as storage, calculation, monitoring, management, and analysis. For example, when the company of the first client is a hospital, the first data information includes medical record information, treatment information, information of medical staff, and the like of patients, and when the company of the first client is an electronic product company, the first data includes types, manufacturing methods, development processes, and the like of electronic products.
Step 200: first format information of the first data information is obtained.
Specifically, after the first data information is obtained, the first format information of the first data information may be obtained accordingly, where the first format information is a data format of the first data information, that is, a formatting format in which data is stored in a file or a record. May be in the form of numeric values, characters, or binary numbers, etc. Described by data type and data length.
Step 300: judging whether the first format information meets a first preset condition or not;
step 400: if the first preset condition is not met, obtaining a first conversion instruction, wherein the first conversion instruction is used for obtaining second format information after converting a first format of the first data;
specifically, after the first format information of the first data information is obtained, it is further required to determine whether the first format information meets a first preset condition, where the first preset condition is a format type that can be processed by a preset public cloud service platform. Therefore, when the first format information meets the first preset condition, after data analysis and processing are continued, when the format of the relevant data in the first format information does not meet the first preset condition, a first conversion instruction needs to be generated, and then according to the first conversion instruction, the data format which does not meet the first preset condition is converted to obtain the second format information, so that the purpose of conveniently storing and managing the data in the later period is achieved.
Step 500: obtaining first capacity information of the first data information;
step 600: judging whether the first capacity information is within a preset capacity threshold value;
specifically, the first capacity information is the size of a memory occupied by the first data, in actual operation, whether the first capacity information is within a preset capacity threshold range needs to be judged, wherein the preset capacity threshold is the preset capacity size of the stored data, and by analyzing and judging the first capacity information of the first data, the data information is further mastered in real time, so that problems in a subsequent processing process are avoided, and a foundation is laid for the management of subsequent data.
Step 700: if yes, obtaining a first encryption level of the first data information;
further, in order to enhance the data accuracy, accurately determine the encryption level of the data information, and improve the data storage security, step 700 in this embodiment of the present application further includes:
step 710: obtaining first demand information of the first customer;
step 720: inputting the first requirement information and the first data information into a training model, wherein the training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets of training data includes: the first requirement information, the first data information, and identification information for identifying a first encryption level of the data information;
step 730: obtaining output information of the training model, wherein the output information comprises first encryption level information of the first data information;
step 740: and determining a target encryption storage space of the first data information according to the first encryption level information of the first data information.
Specifically, when the first capacity information of the first data information is within a preset capacity threshold, the first requirement information of the first customer is further obtained, where the first requirement information of the first customer is a requirement, suggestion, and the like of the customer on data storage, such as time of storage, speed of invocation, form of storage, and the like. Furthermore, the first requirement information and the first data information can be trained, so that the first encryption grade information of the first data information is more accurate, and after the encryption grade information is obtained, the corresponding target encryption storage space can be determined, namely different encryption grades correspond to different target encryption storage spaces.
Furthermore, the training model is a neural network model in a machine learning model, and the machine learning model can continuously correct the model through continuous learning of a large amount of data, so that satisfactory experience is finally obtained to process other data. The machine model is obtained by training a plurality of groups of training data, and the process of training the neural network model by the training data is essentially a process of supervised learning. The training model in the embodiment of the application is obtained by utilizing machine learning training through a plurality of groups of training data, and each group of training data in the plurality of groups comprises: first requirement information, first data information, and identification information for identifying an encryption level of the data information. Wherein, the encryption grade information of the data information is used as the supervision data.
Further, encryption grade information of the data information is used as supervision data and is input into each group of training data, supervision learning is carried out on the first requirement information and the first data information, comparison is carried out on the encryption grade information and an output result of the training model, when the encryption grade information is consistent with the output result of the training model, supervision learning of the group of data is finished, and supervision learning of the next group of data is carried out; when the first data information is inconsistent with the second data information, the training model carries out self-correction until the output result is consistent with the first encryption grade information of the first data information of the identification, the group of supervised learning is finished, and the next group of data supervised learning is carried out; and (4) performing supervised learning of a large amount of data to enable the output result of the machine learning model to reach a convergence state, and completing the supervised learning. Through the process of supervising and learning the training model, the first encryption grade information of the first data information output by the training model is more accurate, the flexibility of data management is improved, the reliability and the safety of the data and the information are improved, the accuracy and the reliability of encryption grade judgment are improved, the working efficiency is improved, and the effects of convenience and quickness are achieved.
Step 800: obtaining a target encryption storage space according to the first encryption level;
step 900: and storing the first data information in the target encryption storage space according to the second format information.
Specifically, after the first encryption level is obtained, the target encryption storage space can be correspondingly obtained according to the encryption level. That is, the encryption level information corresponds to the target encrypted storage space in a one-to-one relationship, and different encryption levels correspond to different target encrypted storage spaces. Furthermore, the first data information is stored in the target encryption storage space according to the second format information, so that a private cloud surpassing body is provided for a client by a public cloud technology and a business mode, the safety and the reliability of the system are further improved, the client data are sufficiently protected, and the aim of preventing confidential data and information of the client from being leaked is fulfilled.
Further, in order to achieve the effects of enhancing data accuracy and further ensuring the security and reliability of data information, step 900 in this embodiment of the present application further includes:
step 910: acquiring first access request information of a first user;
step 920: obtaining a first access permission level of the first user;
step 930: when the first access permission level reaches a preset permission level, starting the access of the first user to the first data information according to the first access request information;
step 940: when the first access permission level does not reach a preset permission level, first verification code information of the first user is obtained after first verification information is sent to the first user according to the first access request information;
step 950: judging whether the first verification code information is consistent with preset login key information or not;
step 960: if not, acquiring a first input frequency of the first user;
step 970: judging whether the first input times are within a preset input threshold range or not;
step 980: if the input threshold value exceeds the preset input threshold value range, first alarm information is obtained;
step 990: and sending an alarm signal to a data management center according to the first alarm information.
Specifically, the first user is a user needing to access and browse first data information, and when the first user needs to access, first access request information of the first user is obtained, wherein the first access request information is a message which is sent by the first user to a public cloud management platform and is used for requesting to access the first data information, so that after the first access request information of the first user is obtained, identity information of the first user is judged, and a first access permission level of the first user is obtained, wherein the first access permission level is a preset division of different access permission levels corresponding to users of different levels. Further, the first access permission level is compared with a preset access permission level, when the first access permission level reaches the preset permission level, the access level of the first user is higher, at the moment, the identity of the first user does not need to be subsequently verified, and the access to the first data information can be directly started according to the first access request information of the first user. When the first access permission level does not reach the preset permission level, the access level of the first user is low, at the moment, subsequent verification needs to be carried out on the login identity of the first user, first verification information needs to be sent to the first user, verification code information of the first user is further obtained, the first verification code information is compared with preset login key information, whether the first verification code information is consistent with the preset login key information or not is judged, if the first verification code information is consistent with the preset login key information, the first user is started to access first data information, if the first verification code information is inconsistent with the preset login key information, the first input times of the first user are obtained, whether the first input times reach a preset input threshold value or not is judged, if the first input times exceed the preset input times, the potential safety hazard of the identity information of the first user is possible, the risk of leakage and stealing of the data information is possible, therefore, when the preset times are exceeded, the first alarm information is generated, and then the first alarm information is sent to a data management center, and therefore the safety and the effect of ensuring the safety and the information is prevented from being stolen are achieved.
Further, in order to achieve the effects of implementing automatic management of data, and being capable of adjusting and responding to the customer's requirements immediately, step 500 in the embodiment of the present application further includes:
step 510: obtaining second data information of the first client;
step 520: obtaining second capacity information of the second data information;
step 530: obtaining third capacity information according to the first capacity information and the second capacity information;
step 540: judging whether the third capacity information is within a preset capacity threshold value;
step 550: if the current capacity is not within the preset capacity threshold, a first adjusting instruction is obtained;
step 510: and responding to the service requirement of the second data information after acquiring the second storage space of the second data information according to the first adjusting instruction.
Specifically, the second data information is data information that a first user needs to add in storage, then, second capacity information corresponding to the second data information is obtained according to the second data information, after the second capacity information is accumulated with the first capacity information, third capacity information is obtained, whether the third capacity information is within a preset capacity threshold value is further judged, if the third capacity information exceeds the preset capacity threshold value range, a first adjusting instruction needs to be generated, then, a second storage space needed by the second capacity information of the second data is calculated according to the first adjusting instruction, then, the second data is stored in the second storage space, and finally, response and processing are carried out according to the service requirement of the second data information, so that the effects of realizing automatic management of the data, and being capable of adjusting in real time and responding to the requirement of the user quickly are achieved.
Further, in order to perform dynamic storage according to different types of data and improve the effect of data storage and management capability, step 520 in this embodiment of the present application further includes:
step 521: obtaining first data type information of the first data information;
step 522: obtaining second data type information of the second data information;
step 523: judging whether the first data type information is consistent with the second data type information;
step 524: and if the first data information is inconsistent with the second data information, acquiring a second adjusting instruction, wherein the second adjusting instruction is used for allocating a first database to the first data information and allocating a second database to the second data information, the first database comprises the target encrypted storage space, and the second database comprises a second storage space.
Specifically, the first data type information is strength of the first data in the professional domain, and when the first data type information is high in the professional domain, it indicates that the application group pertinence of the first data is high, for example, when the first data type information is coding information related to computer software development, the first data at this time is applicable to relevant persons of computer coding, and other non-relevant persons may not understand the first data at this time. Similarly, the second data type information of the second data information may be acquired, and the second data type information is the strength of the professional domain of the second data. And then, judging whether the first data type information is consistent with the second data type information, if so, putting the first data and the second data into the same storage space, and if not, correspondingly generating a second adjusting instruction, respectively allocating a first database to the first data information and allocating a second database to the second data information according to the second adjusting instruction, wherein the first database comprises a target encryption storage space, and the second database comprises a second storage space. For example, when the first data type information is high in professional territory, which indicates that the first data is only applicable to professional related users, and the second data type information is low in professional territory, which indicates that the second data is widely applicable to most users, the first data information is stored in the first database, and the second data information is stored in the second database, wherein the data type corresponding to the first database is high in specialty, and the type corresponding to the second database is low in specialty and strong in universality, so that the effects of dynamically storing data according to different types of data, improving the storage and management capacity of the data, comprehensively controlling the utilization rate and optimizing the storage structure are achieved.
Further, in order to ensure the security of data information storage and improve the accuracy of storage, step 100 in this embodiment of the present application further includes:
step 110: generating a first verification code according to the first data information, wherein the first verification code corresponds to the first data information one to one;
step 120: generating a second verification code according to the second data information and the first verification code; by parity of reasoning, generating an Nth verification code according to the Nth data information and the (N-1) th verification code, wherein N is a natural number greater than 1;
step 130: and respectively copying and storing all the data information and the verification codes on M devices, wherein M is a natural number greater than 1.
In particular, to ensure the security of data information storage, ensuring it is not tampered with, a blockchain based encryption operation may be performed. The block chain technology is a universal underlying technical framework, and can generate and synchronize data on distributed nodes through a consensus mechanism, and realize automatic execution and data operation of contract terms by means of programmable scripts. A block chain is defined as a data structure that organizes data blocks in time sequence, with chain-like connections being formed in order between different blocks, by means of which a digital ledger is built.
Furthermore, the first encryption level information of the first data information is obtained by repeated training through a large amount of data training, and in order to ensure the safety of training data during training, first verification codes are generated by the first data information in the experimental data for training, wherein the first verification codes correspond to the first data information one by one; generating a second verification code according to the second data information and the first verification code; generating an Nth verification code according to the Nth data information and the N-1 th verification code; taking the first data information and the first verification code as a first storage unit; taking the second data information and the second verification code as a second storage unit; the nth data information and the nth verification code are used as an nth storage unit. Respectively copying and storing the first storage unit, the second storage unit and the & gtNth storage unit on N devices; when the training data needs to be called, after each next node receives the data stored by the previous node, the data is verified through a common identification mechanism and then stored, each storage unit is connected in series through a Hash technology, so that the training data is not easy to lose and damage, the data information is encrypted in a mode of obtaining the whole training data by carrying out block chain calculation on each data information, and then the safe and accurate training data is obtained to obtain the first encryption grade information.
Further, in order to further ensure the security of data information storage and improve the accuracy of storage, step 100 in this embodiment of the present application further includes:
step 140: taking the Nth data information and the (N-1) th verification code as an Nth block;
step 150: obtaining the recording time of the Nth block, wherein the recording time of the Nth block represents the time required to be recorded by the Nth block;
step 160: obtaining the first equipment with the fastest transport capacity in the M pieces of equipment according to the recording time of the Nth block;
step 170: and sending the recording right of the Nth block to the first equipment.
Specifically, a predetermined recording time required for the first storage unit is obtained, a device which cannot complete recording of the first storage unit within a predetermined time is excluded, a device which records the first storage unit most rapidly among the N devices is obtained, and the recording right of the first storage unit is given to the device. Furthermore, the second storage unit, the third storage unit,. Cndot. Cndot.n storage unit all adopt the recording method of the first storage unit, so that the safe, effective and stable operation of the decentralized block chain system is ensured, the storage units can be rapidly and accurately recorded in the equipment, and the training data is further ensured to be difficult to lose and safe.
The data information is encrypted based on the block chain, so that the safety of the data information is effectively ensured, and the technical effect of safely storing the data information is achieved.
Further, in order to achieve the effect of improving the matching degree between the customer demand and the data storage and further improving the customer satisfaction, step 710 of the embodiment of the present application further includes:
step 711: acquiring a plurality of versions of the server according to the first requirement information;
step 712: sending a plurality of said version information to said first client;
step 713: obtaining first confirmation information from the first customer;
step 714: obtaining first version information according to the first confirmation information;
step 715: and storing the first data information according to the first version information.
Specifically, according to first requirement information of a client, a plurality of versions of information from a public cloud server can be obtained, then the plurality of versions of information are sent to a first client, after the client confirms the plurality of versions of information, first confirmation information from the first client can be obtained, wherein the first confirmation information is final version information confirmed by the first client according to self needs and budgets, the first version information can be obtained, finally, the first data information can be stored according to the first version information, and therefore the user can select according to self conditions by matching with the client requirement, and finally the client experience and the satisfaction degree of the public cloud service are improved.
Example two
Based on the same inventive concept as the method for expanding the public cloud data processing capability in the foregoing embodiment, the present invention further provides a device for expanding the public cloud data processing capability, as shown in fig. 2, where the device includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain first data information of a first client;
a second obtaining unit 12, where the second obtaining unit 12 is configured to obtain first format information of the first data information;
a first judging unit 13, where the first judging unit 13 is configured to judge whether the first format information satisfies a first preset condition;
a third obtaining unit 14, where the third obtaining unit 14 is configured to obtain a first conversion instruction if the first preset condition is not met, where the first conversion instruction is used to obtain second format information after converting a first format of the first data;
a fourth obtaining unit 15, where the fourth obtaining unit 15 is configured to obtain first capacity information of the first data information;
a second judging unit 16, where the second judging unit 16 is configured to judge whether the first capacity information is within a preset capacity threshold;
a fifth obtaining unit 17, where the fifth obtaining unit 17 is configured to obtain the first encryption level of the first data information if the first encryption level is met;
a sixth obtaining unit 18, where the sixth obtaining unit 18 is configured to obtain a target encrypted storage space according to the first encryption level;
a first storage unit 19, where the first storage unit 19 is configured to store the first data information in the target encrypted storage space according to the second format information.
Further, the apparatus further comprises:
a seventh obtaining unit, configured to obtain first demand information of the first customer;
a first training unit, configured to input the first requirement information and the first data information into a training model, where the training model is obtained by training multiple sets of training data, and each set of training data in the multiple sets includes: the first requirement information, the first data information, and identification information for identifying a first encryption level of the data information;
an eighth obtaining unit, configured to obtain output information of the training model, where the output information includes first encryption level information of the first data information;
a first determining unit, configured to determine a target encrypted storage space of the first data information according to first encryption level information of the first data information.
Further, the apparatus further comprises:
a ninth obtaining unit, configured to obtain first access request information of a first user;
a tenth obtaining unit, configured to obtain the first access right level of the first user;
the first execution unit is used for starting the access of the first user to the first data information according to the first access request information when the first access permission level reaches a preset permission level;
an eleventh obtaining unit, configured to, when the first access permission level does not reach a preset permission level, obtain first verification code information of the first user after sending first verification information to the first user according to the first access request information;
a third judging unit, configured to judge whether the first verification code information is consistent with preset login key information;
a twelfth obtaining unit, configured to obtain the first input times of the first user if the first input times of the first user are inconsistent with the second input times of the second user;
a fourth judging unit, configured to judge whether the first input frequency is within a preset input threshold range;
a thirteenth obtaining unit, configured to obtain first alarm information if the preset input threshold range is exceeded;
and the first sending unit is used for sending an alarm signal to a data management center according to the first alarm information.
Further, the apparatus further comprises:
a fourteenth obtaining unit, configured to obtain second data information of the first client;
a fifteenth obtaining unit configured to obtain second capacity information of the second data information;
a sixteenth obtaining unit, configured to obtain third capacity information according to the first capacity information and the second capacity information;
a fifth judging unit, configured to judge whether the third capacity information is within a preset capacity threshold;
a seventeenth obtaining unit, configured to obtain a first adjustment instruction if the first adjustment instruction is not within a preset capacity threshold;
and the second execution unit is used for responding to the service requirement of the second data information after acquiring the second storage space of the second data information according to the first adjusting instruction.
Further, the apparatus further comprises:
an eighteenth obtaining unit configured to obtain first data type information of the first data information;
a nineteenth obtaining unit configured to obtain second data type information of the second data information;
a sixth judging unit, configured to judge whether the first data type information is consistent with the second data type information;
a twentieth obtaining unit, configured to obtain a second adjustment instruction if the first data information and the second data information are inconsistent, where the second adjustment instruction is configured to allocate a first database to the first data information and allocate a second database to the second data information, where the first database includes the target encrypted storage space, and the second database includes a second storage space.
Further, the apparatus further comprises:
a first generating unit, configured to generate a first verification code according to the first data information, where the first verification code corresponds to the first data information one to one;
a second generating unit configured to generate a second verification code from the second data information and the first verification code; by analogy, generating an Nth verification code according to the Nth data information and the Nth-1 verification code, wherein N is a natural number greater than 1;
and the second storage unit is used for respectively copying and storing all the data information and the verification codes on M devices, wherein M is a natural number greater than 1.
Further, the apparatus further comprises:
a third execution unit, configured to use the nth data information and the N-1 verification code as an nth block;
a twenty-first obtaining unit, configured to obtain the nth block recording time, where the nth block recording time represents a time that needs to be recorded by an nth block;
a twenty-second obtaining unit, configured to obtain, according to the nth block recording time, a first device with the fastest capacity from among the M devices;
a second sending unit, configured to send the recording right of the nth block to the first device.
Further, the apparatus further comprises:
a twenty-third obtaining unit, configured to obtain, according to the first requirement information, a plurality of version information of a server;
a third sending unit, configured to send a plurality of version information to the first client;
a twenty-fourth obtaining unit configured to obtain first confirmation information from the first client;
a twenty-fifth obtaining unit, configured to obtain first version information according to the first confirmation information;
a third storage unit, configured to store the first data information according to the first version information.
Various changes and specific examples of the method for expanding public cloud data processing capability in the first embodiment in fig. 1 are also applicable to the device for expanding public cloud data processing capability in this embodiment, and through the foregoing detailed description of the method for expanding public cloud data processing capability, a person skilled in the art can clearly know an implementation method of the device for expanding public cloud data processing capability in this embodiment, so for the sake of brevity of the description, detailed description is not provided here.
EXAMPLE III
Based on the same inventive concept as one of the foregoing embodiments of a method for extending public cloud data processing capability, the present invention further provides an exemplary electronic device, as shown in fig. 3, including a memory 304, a processor 302, and a computer program stored on the memory 304 and operable on the processor 302, where when the processor 302 executes the program, the processor implements the steps of any one of the foregoing methods for cloud platform e-commerce data processing based on big data.
Where in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be one and the same element, i.e. a transceiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
One or more technical solutions in the embodiments of the present application at least have one or more of the following technical effects:
the embodiment of the invention provides a method and a device for expanding public cloud data processing capacity, wherein first data information of a first customer is obtained; obtaining first format information of the first data information; judging whether the first format information meets a first preset condition or not; if the first preset condition is not met, obtaining a first conversion instruction, wherein the first conversion instruction is used for obtaining second format information after converting a first format of the first data; obtaining first capacity information of the first data information; judging whether the first capacity information is within a preset capacity threshold value; if so, obtaining a first encryption level of the first data information; obtaining a target encryption storage space according to the first encryption level; according to the second format information, the first data information is stored in the target encryption storage space, so that the technical problems that in the prior art, the public cloud is difficult to ensure that data and information are protected sufficiently, the reliability and the safety of the system are low, the data management is difficult and complex, the storage performance is poor, and the user experience is poor are solved, the personalized storage scheme is formulated for the user, the control and the management of the public cloud on the data are improved, the safety of the data and the information of the user is ensured, the reliability and the safety of the system are improved, and the technical effect of the satisfaction degree of the user is improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A method for expanding public cloud data processing capacity, wherein the method comprises the following steps:
obtaining first data information of a first client;
obtaining first format information of the first data information;
judging whether the first format information meets a first preset condition or not;
if the first preset condition is not met, obtaining a first conversion instruction, wherein the first preset condition is a preset format type which can be processed by a public cloud service platform, and the first conversion instruction is used for obtaining second format information after converting a first format of the first data;
obtaining first capacity information of the first data information;
judging whether the first capacity information is within a preset capacity threshold value;
if so, obtaining a first encryption level of the first data information;
obtaining a target encryption storage space according to the first encryption level;
storing the first data information in the target encryption storage space according to the second format information;
wherein the obtaining of the first encryption level of the first data information comprises:
obtaining first demand information of the first customer;
inputting the first requirement information and the first data information into a training model, wherein the training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets of training data includes: the first requirement information, the first data information, and identification information for identifying a first encryption level of the data information;
obtaining output information of the training model, wherein the output information comprises first encryption level information of the first data information;
and determining a target encryption storage space of the first data information according to the first encryption level information of the first data information.
2. The method of claim 1, wherein after storing the first data information in the target encrypted storage space according to the second format information, the method further comprises:
obtaining first access request information of a first user;
obtaining a first access permission level of the first user;
when the first access permission level reaches a preset permission level, starting the access of the first user to the first data information according to the first access request information;
when the first access permission level does not reach a preset permission level, according to the first access request information, after first verification information is sent to the first user, first verification code information of the first user is obtained;
judging whether the first verification code information is consistent with preset login key information or not;
if not, acquiring a first input frequency of the first user;
judging whether the first input times are within a preset input threshold range or not;
if the input threshold value exceeds the preset input threshold value range, first alarm information is obtained;
and sending an alarm signal to a data management center according to the first alarm information.
3. The method of claim 1, wherein the method further comprises:
obtaining second data information of the first client;
obtaining second capacity information of the second data information;
obtaining third capacity information according to the first capacity information and the second capacity information;
judging whether the third capacity information is within a preset capacity threshold value;
if the current capacity is not within the preset capacity threshold, a first adjusting instruction is obtained;
and responding to the service requirement of the second data information after acquiring a second storage space of the second data information according to the first adjusting instruction.
4. The method of claim 3, wherein the method further comprises:
obtaining first data type information of the first data information;
obtaining second data type information of the second data information;
judging whether the first data type information is consistent with the second data type information;
and if the first data information is inconsistent with the second data information, acquiring a second adjusting instruction, wherein the second adjusting instruction is used for allocating a first database to the first data information and allocating a second database to the second data information, the first database comprises the target encrypted storage space, and the second database comprises a second storage space.
5. The method of claim 1, wherein the method further comprises:
generating a first verification code according to the first data information, wherein the first verification code corresponds to the first data information one to one;
generating a second verification code according to the second data information and the first verification code; by analogy, generating an Nth verification code according to the Nth data information and the Nth-1 verification code, wherein N is a natural number greater than 1;
and respectively copying and storing all the data information and the verification codes on M devices, wherein M is a natural number greater than 1.
6. The method of claim 5, wherein the method comprises:
taking the Nth data information and the (N-1) th verification code as an Nth block;
obtaining the recording time of the Nth block, wherein the recording time of the Nth block represents the time required to be recorded by the Nth block;
obtaining the first equipment with the fastest transport capacity in the M pieces of equipment according to the recording time of the Nth block;
and sending the recording right of the Nth block to the first equipment.
7. The method of claim 1, wherein before storing the first data information in the target encrypted storage space according to the second format information, the method further comprises:
acquiring a plurality of versions of the server according to the first requirement information;
sending a plurality of said version information to said first client;
obtaining first confirmation information from the first customer;
obtaining first version information according to the first confirmation information;
and storing the first data information according to the first version information.
8. An apparatus for extending public cloud data processing capabilities, the apparatus comprising:
a first obtaining unit, configured to obtain first data information of a first client;
a second obtaining unit configured to obtain first format information of the first data information;
the first judging unit is used for judging whether the first format information meets a first preset condition or not;
a third obtaining unit, configured to obtain a first conversion instruction if the first preset condition is not met, where the first conversion instruction is used to obtain second format information after converting a first format of the first data;
a fourth obtaining unit configured to obtain first capacity information of the first data information;
a second judging unit, configured to judge whether the first capacity information is within a preset capacity threshold;
a fifth obtaining unit, configured to obtain a first encryption level of the first data information if the first encryption level is the first encryption level;
a sixth obtaining unit, configured to obtain a target encrypted storage space according to the first encryption level;
the first storage unit is used for storing the first data information in the target encryption storage space according to the second format information;
a seventh obtaining unit, configured to obtain first demand information of the first customer;
a first training unit, configured to input the first requirement information and the first data information into a training model, where the training model is obtained by training multiple sets of training data, and each set of training data in the multiple sets includes: the first requirement information, the first data information, and identification information for identifying a first encryption level of the data information;
an eighth obtaining unit, configured to obtain output information of the training model, where the output information includes first encryption level information of the first data information;
a first determining unit, configured to determine a target encrypted storage space of the first data information according to first encryption level information of the first data information.
9. An apparatus for extending public cloud data processing capabilities, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1-7 when executing the program.
CN202011143102.0A 2020-10-23 2020-10-23 Method and device for expanding public cloud data processing capacity Active CN112367360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011143102.0A CN112367360B (en) 2020-10-23 2020-10-23 Method and device for expanding public cloud data processing capacity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011143102.0A CN112367360B (en) 2020-10-23 2020-10-23 Method and device for expanding public cloud data processing capacity

Publications (2)

Publication Number Publication Date
CN112367360A CN112367360A (en) 2021-02-12
CN112367360B true CN112367360B (en) 2022-10-21

Family

ID=74511694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011143102.0A Active CN112367360B (en) 2020-10-23 2020-10-23 Method and device for expanding public cloud data processing capacity

Country Status (1)

Country Link
CN (1) CN112367360B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918937A (en) * 2017-12-13 2019-06-21 航天信息股份有限公司 A kind of information processing method, device, equipment and medium
CN109936555A (en) * 2018-06-13 2019-06-25 国网安徽省电力有限公司信息通信分公司 A kind of date storage method based on cloud platform, apparatus and system
CN109587146A (en) * 2018-12-11 2019-04-05 北京奇虎科技有限公司 Method for managing object and system based on block chain
CN110516474A (en) * 2019-08-27 2019-11-29 腾讯科技(深圳)有限公司 User information processing method, device, electronic equipment and storage medium in block chain network
CN110851865B (en) * 2019-11-12 2021-03-30 北京海益同展信息科技有限公司 Resource data processing method, device, system and storage medium
CN111611249A (en) * 2020-06-29 2020-09-01 平安银行股份有限公司 Data management method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112367360A (en) 2021-02-12

Similar Documents

Publication Publication Date Title
TWI694350B (en) Information supervision method and device based on blockchain
CN109558748B (en) Data processing method and device, electronic equipment and storage medium
KR101727525B1 (en) Block chain based distributed storage method and device thereof
US11487969B2 (en) Apparatuses, computer program products, and computer-implemented methods for privacy-preserving federated learning
US10268829B2 (en) Security systems and methods based on cryptographic utility token inventory tenure
CN109995523B (en) Activation code management method and device and activation code generation method and device
Guo et al. An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
US10922309B2 (en) Distributed ledger interaction system and methods
CN112257048B (en) Information security protection method and device
CN113901505B (en) Data sharing method and device, electronic equipment and storage medium
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN111629063A (en) Block chain based distributed file downloading method and electronic equipment
CN112182109A (en) Distributed data coding storage method based on block chain and electronic equipment
CN108390886A (en) Educate big data secure access control system
CN110245014B (en) Data processing method and device
CN113067802B (en) User identification method, device, equipment and computer readable storage medium
CN112181599B (en) Model training method, device and storage medium
CN112367360B (en) Method and device for expanding public cloud data processing capacity
CN113011907A (en) Data processing method, device, storage medium and equipment
CN110232570A (en) A kind of information monitoring method and device
Nafi et al. A new trusted and secured E-commerce architeture for cloud computing
CN113537333B (en) Method for training optimization tree model and longitudinal federal learning system
EP3971754A1 (en) Method and apparatus for identifying applets of risky content based on differential privacy preserving
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN115589316A (en) Data encryption transmission method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant