CN112732489A - Data desensitization method and device based on database virtualization - Google Patents

Data desensitization method and device based on database virtualization Download PDF

Info

Publication number
CN112732489A
CN112732489A CN202110034262.XA CN202110034262A CN112732489A CN 112732489 A CN112732489 A CN 112732489A CN 202110034262 A CN202110034262 A CN 202110034262A CN 112732489 A CN112732489 A CN 112732489A
Authority
CN
China
Prior art keywords
desensitization
database
data
snapshot
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110034262.XA
Other languages
Chinese (zh)
Other versions
CN112732489B (en
Inventor
任养超
马佩
张少辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202110034262.XA priority Critical patent/CN112732489B/en
Publication of CN112732489A publication Critical patent/CN112732489A/en
Application granted granted Critical
Publication of CN112732489B publication Critical patent/CN112732489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/256Integrating or interfacing systems involving database management systems in federated or virtual databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The method comprises the steps of carrying out backup on database data, and carrying out snapshot on the backed-up data; virtualizing the database according to the time point of snapshot to obtain a virtual database; and carrying out desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the rapid preparation of the database data and the desensitization of the virtual library are realized, and the problems of complex data preparation and long time consumption after desensitization failure are rapidly solved.

Description

Data desensitization method and device based on database virtualization
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for data desensitization based on database virtualization.
Background
Currently, with the widespread use of database technology and big data, desensitization of database data is also increasingly used. People enjoy data analysis to bring convenience to their lives, and are also seriously troubled by personal information leakage and even disturbance, so that the desensitization of database data is particularly important. When desensitization is carried out on database data, desensitization is carried out on the existing database or the recovery database in a common desensitization mode, and when desensitization operation is carried out on the data in the database, the desensitization is successful when the desensitization operation is completed. However, when the desensitization process fails due to an exception or error of the data of the desensitization database, the desensitized data cannot be rolled back, and the desensitized data becomes dirty data. If the desensitization failure database data is directly desensitized again, the desensitized data can be secondarily desensitized, and the consistency of the desensitized data cannot be ensured. When the database is to be restored for re-desensitization, the database restoration process is tedious and time-consuming.
Disclosure of Invention
An object of the present application is to provide a data desensitization method and device based on database virtualization, which solve the problem in the prior art that a database cannot be quickly restored to provide desensitization data after database data desensitization fails.
According to one aspect of the application, there is provided a method of data desensitization based on database virtualization, the method comprising:
backing up database data, and snapshotting the backed-up data;
virtualizing the database according to the time point of snapshot to obtain a virtual database;
and carrying out desensitization operation on the data in the virtual database to obtain a desensitization result.
Further, backing up the database data, and performing snapshot on the backed-up data includes:
and performing timed backup on database data, performing timed snapshot or manual snapshot on the backed-up data, and recording the created snapshot time point.
Further, virtualizing the database according to the time point of taking the snapshot, comprising:
virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
Further, performing desensitization operations on the data in the virtual database, including:
performing occlusion desensitization or simulation desensitization on data in the virtual database.
Further, after performing desensitization operation on the data in the virtual database and obtaining a desensitization result, the method includes:
if the desensitization result is that data desensitization is successful, the virtual database is provided to a user for testing;
and if the desensitization result is data desensitization failure, recovering the virtual database.
Further, the recovering the virtual database comprises:
the database is virtualized again according to the time point of snapshot to obtain a new virtual database;
and adjusting a desensitization strategy to perform desensitization operation on the new virtual database again.
Further, the adjusting the desensitization strategy includes:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to a desensitization result of the first desensitization operation and the generated random address desensitization rule.
According to yet another aspect of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus comprising:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
According to yet another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method as described above.
Compared with the prior art, the method and the system have the advantages that the database data are backed up, and the backed-up data are subjected to snapshot; virtualizing the database according to the time point of snapshot to obtain a virtual database; and carrying out desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the rapid preparation of the database data and the desensitization of the virtual library are realized, and the problems of complex data preparation and long time consumption after desensitization failure are rapidly solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for data desensitization based on database virtualization, provided in accordance with an aspect of the present application;
FIG. 2 is a diagram illustrating a desensitization flow based on database virtualization in an exemplary embodiment of the present application;
fig. 3 is a schematic structural diagram of a device for data desensitization based on database virtualization according to another aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 illustrates a flow diagram of a method for data desensitization based on database virtualization, according to an aspect of the present application, the method comprising: step S11-step S13, wherein, step S11 is to backup the database data and to take a snapshot for the backed-up data; step S12, virtualizing the database according to the time point of snapshot to obtain a virtual database; and step S13, performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the rapid preparation of the database data and the desensitization of the virtual library are realized, and the problems of complex data preparation and long time consumption after desensitization failure are rapidly solved.
Specifically, in step S11, database data is backed up, and the backed-up data is snapshot; the database is backed up, the data in the database is backed up, and snapshot operation is performed on the backed-up data, so that a data source of the database virtualization instance is provided.
Specifically, in step S12, virtualizing the database according to the time point at which the snapshot is performed, to obtain a virtual database; the database is virtualized according to the created snapshot time point, and the obtained virtual database is consistent with the database data corresponding to the snapshot time point, so that the virtual database also has data, the original database is not operated any more when desensitization is performed, and the virtual database can be operated.
Specifically, in step S13, a desensitization operation is performed on the data in the virtual database, resulting in a desensitization result. The virtual database provides database data virtualized for the database, desensitization operation is carried out on the data in the virtual database, data deformation is carried out on certain sensitive information through desensitization rules, accordingly, reliable protection of sensitive private data is achieved, desensitization results are obtained after desensitization operation is carried out, and then the desensitization results are used for processing the virtual database, for example, whether the virtual database is recovered or not is judged.
In an embodiment of the present application, in step S11, the database data is backed up periodically, the backed-up data is snapshot periodically or manually, and the created snapshot time point is recorded. The database data is backed up at regular time, and the backup data is subjected to timed snapshot or manual snapshot, for example, a snapshot one is created at 12 minutes and 12 seconds at 12 times of 1 month, 5 days and 12 days in 2021 year, a snapshot time point can be selected to create a virtualized database instance during recovery, the created virtualized database data is the data during creation of the snapshot one, and the database backup snapshot can create periodic snapshots and manually create snapshots as required and according to time.
Following the above embodiment, in step S12, one or more database instances are virtualized according to the created snapshot time point, where the data contained in the instance includes data in the database corresponding to the created snapshot time point. Here, according to the created snapshot time point virtualized database instance, the data contained in the virtualized database instance is the data information in the database at the snapshot creation time point, and the virtual database can quickly create one or more virtual databases according to the snapshot data, thereby avoiding the tedious operation and long time consumption required by the ordinary physical recovery. For example, a first virtual database and a second virtual database are created according to the first snapshot, the data in the first virtual database and the second virtual database are database data of a snapshot time point, when desensitization is performed, only the first virtual database or the second virtual database needs to be connected for desensitization, and after desensitization is completed, the virtual databases are provided for users to use.
In one embodiment of the present application, in step S13, masking desensitization or simulation desensitization is performed on the data in the virtual database. Here, masking or simulation desensitization is performed on the data in the virtual database, such as the mask desensitization name: ABC, desensitization becomes a x, or simulation desensitization ABC desensitization is DEF, and desensitization rules may use generation of name, generation of organization name, generation of random identification number, and the like, where the manner of desensitization rules includes but is not limited to the examples above.
In an embodiment of the application, desensitization operation is performed on data in the virtual database, and after a desensitization result is obtained, if the desensitization result is that data desensitization is successful, the virtual database is provided to a user for testing; and if the desensitization result is data desensitization failure, recovering the virtual database. Here, when data desensitization succeeds, the virtual database is provided for a user to perform test use, and when desensitization fails, only the virtual database needs to be recycled.
Secondly, after the virtual database is recovered, the database is virtualized again according to the time point of snapshot to obtain a new virtual database; and adjusting a desensitization strategy to perform desensitization operation on the new virtual database again. And when the desensitization process fails, recovering the first virtual database, and recreating the second virtual database according to the first snapshot, wherein the data in the second virtual database is the same as the data in the first virtual database and is the data when the first snapshot is created. Adjusting a desensitization strategy to desensitize the virtual database II again; therefore, the database can be quickly created and destroyed, the quick preparation work of desensitization failure database data can be provided through virtualization of the database, and a set of complete and new virtual libraries are provided for desensitization programs to use.
Wherein the adjusting the desensitization strategy comprises: and generating a random address desensitization rule, and adjusting a desensitization strategy according to a desensitization result of the first desensitization operation and the generated random address desensitization rule. Here, the first desensitization operation refers to a desensitization operation performed on data in the virtual database created for the first time, after the desensitization operation fails, the first created virtual database is recovered, a new virtual database is created again, and a random address desensitization rule is generated, for example, if five-level address information is selected during the desensitization operation, and the five-level address is the address of province, city, county, town and village, the length of the generated address may exceed the field representation range of the database, and the desensitization operation may fail, therefore, the desensitization strategy of the second desensitization operation is reselected according to the desensitization result and the generated random address desensitization rule, for example, a three-level address, such as a three-level address in province, city and county, is selected to be generated, so that the problem that the generated address is too long is solved, and desensitizing the newly created virtual database according to the adjusted desensitization strategy, so that the problems of complex data preparation and long time consumption after desensitization failure are quickly solved.
In a specific embodiment of the present application, as shown in fig. 2, a database data backup and a database snapshot are created, after a snapshot is completed, a virtual database instance is created according to a database snapshot, so that a database virtualized database data can be provided, when desensitization operation is performed on the virtualized database, the database data can be directly provided for a user to perform test use if desensitization is successful, when desensitization operation is failed, a virtual database is recovered, virtualization creation operation is performed on the database snapshot again, so that a virtual database providing a data can be provided quickly, a desensitization program is provided for desensitization, and when the user finishes using, the newly created virtual database instance is recovered to complete data recovery.
Furthermore, the present application also provides a computer readable medium, on which computer readable instructions are stored, the computer readable instructions being executable by a processor to implement the aforementioned method for data desensitization based on database virtualization.
In correspondence with the method described above, the present application also provides a terminal, which includes modules or units capable of executing the method steps described in fig. 1 or fig. 2 or various embodiments, and these modules or units can be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
For example, the computer readable instructions, when executed, cause the one or more processors to:
backing up database data, and snapshotting the backed-up data;
virtualizing the database according to the time point of snapshot to obtain a virtual database;
and carrying out desensitization operation on the data in the virtual database to obtain a desensitization result.
Fig. 3 is a schematic structural diagram of an apparatus for data desensitization based on database virtualization according to another aspect of the present application, where the apparatus includes: the system comprises a snapshot device 11, a virtualization device 12 and a desensitization device 13, wherein the snapshot device 11 is used for backing up database data and snapshotting the backed-up data; the virtualization device 12 is configured to virtualize the database according to a time point of performing the snapshot to obtain a virtual database; the desensitization device 13 is used for performing desensitization operation on the data in the virtual database to obtain a desensitization result.
It should be noted that the content executed by the snapshot apparatus 11, the virtualization apparatus 12, and the desensitization apparatus 13 is the same as or corresponding to the content in the above steps S11, S12, and S13, respectively, and for the sake of brevity, no further description is provided here.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (9)

1. A method of data desensitization based on database virtualization, wherein the method comprises:
backing up database data, and snapshotting the backed-up data;
virtualizing the database according to the time point of snapshot to obtain a virtual database;
and carrying out desensitization operation on the data in the virtual database to obtain a desensitization result.
2. The method of claim 1, wherein backing up database data and snapshotting the backed up data comprises:
and performing timed backup on database data, performing timed snapshot or manual snapshot on the backed-up data, and recording the created snapshot time point.
3. The method of claim 2, wherein virtualizing the database from the point in time at which the snapshot was taken comprises:
virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
4. The method of any of claims 1 to 3, wherein desensitizing data in the virtual database comprises:
performing occlusion desensitization or simulation desensitization on data in the virtual database.
5. The method of any one of claims 1 to 3, wherein performing a desensitization operation on the data in the virtual database, after obtaining a desensitization result, comprises:
if the desensitization result is that data desensitization is successful, the virtual database is provided to a user for testing;
and if the desensitization result is data desensitization failure, recovering the virtual database.
6. The method of claim 5, wherein reclaiming the virtual database comprises:
the database is virtualized again according to the time point of snapshot to obtain a new virtual database;
and adjusting a desensitization strategy to perform desensitization operation on the new virtual database again.
7. The method of claim 6, wherein the adjusting a desensitization policy comprises:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to a desensitization result of the first desensitization operation and the generated random address desensitization rule.
8. An apparatus for data desensitization based on database virtualization, wherein the apparatus comprises:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 7.
9. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 7.
CN202110034262.XA 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization Active CN112732489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110034262.XA CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110034262.XA CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Publications (2)

Publication Number Publication Date
CN112732489A true CN112732489A (en) 2021-04-30
CN112732489B CN112732489B (en) 2023-05-09

Family

ID=75590253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110034262.XA Active CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Country Status (1)

Country Link
CN (1) CN112732489B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360476A (en) * 2021-06-21 2021-09-07 上海上讯信息技术股份有限公司 Method and device for virtual plugging of program database

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105378725A (en) * 2013-07-09 2016-03-02 戴尔菲克斯公司 Virtual database rewind
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system
US20170116878A1 (en) * 2015-10-27 2017-04-27 Thomas P. Shokite Dynamic interface virtualization in a networked computing environment
CN106909475A (en) * 2015-12-23 2017-06-30 中国移动通信集团重庆有限公司 Row data backup, the method and apparatus recovered are stored in based on object
US20190026490A1 (en) * 2017-07-21 2019-01-24 Sap Se Anonymized Data Storage and Retrieval
CN110826105A (en) * 2019-11-15 2020-02-21 江苏苏宁银行股份有限公司 Distributed bank data desensitization method and system
CN111858546A (en) * 2020-06-22 2020-10-30 网联清算有限公司 Data processing method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105378725A (en) * 2013-07-09 2016-03-02 戴尔菲克斯公司 Virtual database rewind
US20170116878A1 (en) * 2015-10-27 2017-04-27 Thomas P. Shokite Dynamic interface virtualization in a networked computing environment
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system
CN106909475A (en) * 2015-12-23 2017-06-30 中国移动通信集团重庆有限公司 Row data backup, the method and apparatus recovered are stored in based on object
US20190026490A1 (en) * 2017-07-21 2019-01-24 Sap Se Anonymized Data Storage and Retrieval
CN110826105A (en) * 2019-11-15 2020-02-21 江苏苏宁银行股份有限公司 Distributed bank data desensitization method and system
CN111858546A (en) * 2020-06-22 2020-10-30 网联清算有限公司 Data processing method, device and system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
YUN LI等: "Research on a data desensitization algorithm of blockchain distributed energy thrnsaction based on differential privacy", 《IEEE》 *
朱绍臣: "敏捷数据管理平台(ADM)金融行业解决方案", 《信息安全与通信保密》 *
李玉亮: "基于数据库虚拟化技术的拷贝数据安全与管理", 《保密科学技术》 *
杜小武等, 陕西师范大学出版总社有限公司 *
邵华西: "基于T-Closeness的大数据脱敏系统的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360476A (en) * 2021-06-21 2021-09-07 上海上讯信息技术股份有限公司 Method and device for virtual plugging of program database
CN113360476B (en) * 2021-06-21 2023-11-21 上海上讯信息技术股份有限公司 Method and equipment for program database virtualization plug

Also Published As

Publication number Publication date
CN112732489B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
US7650356B2 (en) Generating an optimized restore plan
US11176090B2 (en) Verification of the integrity of data files stored in copy-on-write (CoW) based file system snapshots
JP4796398B2 (en) Methods, systems, and products for metadata replication and restoration
CN106951345B (en) Consistency test method and device for disk data of virtual machine
US11093162B2 (en) Method and apparatus for deleting cascaded snapshot
US7395278B2 (en) Transaction consistent copy-on-write database
US8001091B2 (en) Apparatus, system, and method for hierarchical rollback of business operations
CN110659256B (en) Multi-computer room synchronization method, computing device and computer storage medium
EP4014119B1 (en) Data race analysis based on altering function internal loads during time-travel debugging
US9823976B2 (en) Optimization to permit block based incremental backup across system reboot or crash
CN113360322B (en) Method and equipment for recovering data based on backup system
US10503601B2 (en) Method and apparatus for tracking objects in a first memory
CN112445780A (en) Master-slave architecture deployment method and device based on snapshot
US20070143591A1 (en) Method for non-destructive restoration of a corrupted operating system
US20170124141A1 (en) Selective data synchronization to troubleshoot production environment failures
CN112732489B (en) Data desensitization method and device based on database virtualization
US10936395B1 (en) Smart log parser for backup software to ease troubleshooting
US11314624B2 (en) Reducing trace recording overheads with targeted recording via partial snapshots
CN111722800A (en) Method for realizing ROW snapshot of distributed storage system and related components
CN115658391A (en) Backup recovery method of WAL mechanism based on QianBase MPP database
CN113791934A (en) Data recovery method, computing device and storage medium
CN112069519A (en) Method and equipment for outputting encrypted record of information file
CN109271277B (en) Access method, device and system after database downtime
CN117130980B (en) Virtual machine snapshot management method and device
US20240126740A1 (en) Cyber recovery forensics kit - lightning restore of storage systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant