CN114006914A - Cloud security storage method, system, medium and electronic device for file copies - Google Patents

Cloud security storage method, system, medium and electronic device for file copies Download PDF

Info

Publication number
CN114006914A
CN114006914A CN202111615301.1A CN202111615301A CN114006914A CN 114006914 A CN114006914 A CN 114006914A CN 202111615301 A CN202111615301 A CN 202111615301A CN 114006914 A CN114006914 A CN 114006914A
Authority
CN
China
Prior art keywords
file
storage
node
copies
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111615301.1A
Other languages
Chinese (zh)
Other versions
CN114006914B (en
Inventor
黄欢
王飞
孙维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huasheng Zhilian Technology Co ltd
Original Assignee
Hongtai Intelligent Technology Dongguan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongtai Intelligent Technology Dongguan Co Ltd filed Critical Hongtai Intelligent Technology Dongguan Co Ltd
Priority to CN202111615301.1A priority Critical patent/CN114006914B/en
Publication of CN114006914A publication Critical patent/CN114006914A/en
Application granted granted Critical
Publication of CN114006914B publication Critical patent/CN114006914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The embodiment of the application provides a cloud security storage method and system for file copies, a computer readable medium and electronic equipment. The cloud security storage method of the file copy comprises the following steps: the method comprises the steps of coding a file based on file attributes of the file to be processed to generate a file copy, evaluating stability parameters of nodes based on node information of each storage node in a cloud platform, then matching the file copy conditions with the stability parameters of the storage nodes, determining proper storage nodes for the file copy, and finally encrypting and storing the stored file copy based on keys corresponding to the storage nodes.

Description

Cloud security storage method, system, medium and electronic device for file copies
Technical Field
The application relates to the technical field of computers, in particular to a cloud security storage method and system for file copies, a computer readable medium and electronic equipment.
Background
At present, the storage capacity and transmission demand of data are higher and higher at the moment of high-speed development of big data, and companies or users do not have enough storage resources to store the data many times, so that a lot of existing users and enterprises store the data generated in the production process in a cloud server in an outsourcing mode. Cloud storage is a mode of online storage on the internet, i.e., data is stored on a plurality of virtual servers, which are usually hosted by third parties, rather than on dedicated servers. The hosting company operates a large-scale data center, and people who need data storage hosting meet the requirement of data storage through a mode of buying or leasing storage space for the people. The data center operator prepares the storage virtualized resources at the back end according to the requirements of the customer, and provides the resources in a storage resource pool manner, so that the customer can use the storage resource pool to store files or objects. In practice, these resources may be distributed over numerous server hosts.
However, storing all the complete data in the cloud consumes much storage time, transmission time and storage resources, and threatens the security and reliability of data storage, so how to ensure the integrity and security of data storage in the file data storage process is a problem to be solved.
Disclosure of Invention
Embodiments of the present application provide a cloud security storage method and system for a file copy, a computer-readable medium, and an electronic device, so that integrity and security of data storage can be guaranteed at least to a certain extent.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of the embodiment of the present application, there is provided a cloud security storage method for a file copy, including: the method comprises the steps that an encoding module encodes a file to be processed based on file attributes of the file to be processed to generate a file copy of the file to be processed, wherein the file attributes comprise file data volume and importance level; the method comprises the steps that a node management module obtains node information of each storage node in a cloud platform, and stability parameters of the storage nodes are determined based on the node information; the file management module matches the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determines the storage nodes corresponding to the file copies; and the node storage module sends the node key of each storage node to the corresponding storage node so as to store the corresponding file copy in the storage node based on the node key.
In some embodiments of the present application, based on the foregoing scheme, the encoding the file to be processed based on the file attribute of the file to be processed to generate a file copy of the file to be processed includes: acquiring file attributes of the file to be processed, wherein the file attributes comprise file data volume and importance level; determining the copy number of the file copy corresponding to the file at the agent based on the file data volume and the importance level; and coding the file to be processed to generate file copies corresponding to the number of the copies.
In some embodiments of the present application, based on the foregoing scheme, the number of copies of the file is calculated by the following formula:
Figure 868457DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 324846DEST_PATH_IMAGE002
the number factor is expressed in terms of a number factor,
Figure 955679DEST_PATH_IMAGE003
indicating the number of copies of the file copy,
Figure 17176DEST_PATH_IMAGE004
indicates the level of importance of the document to be processed,
Figure 832685DEST_PATH_IMAGE005
indicating the amount of file data.
In some embodiments of the present application, based on the foregoing scheme, the obtaining node information of each storage node in the cloud platform, and determining the stability parameter of the storage node based on the node information includes: acquiring node information of each storage node in the cloud platform, wherein the node information comprises a node storage threshold, a current storage amount and data transmission frequency; determining storage parameters of the storage nodes based on node storage threshold values and current storage amount in the node information; determining a stability parameter for the storage node based on the storage parameter and the data transmission frequency.
In some embodiments of the present application, based on the foregoing solution, the matching, performed on the storage nodes and the file copies, based on the stability parameters of each storage node and the copy attributes corresponding to each file copy, and determining the storage node corresponding to the file copy includes: sorting the storage nodes according to the sequence of the stability parameters from large to small to obtain a first queue; sequencing the file copies according to the sequence of the data volume of the file copies from large to small; obtaining a second queue; the data volume belongs to the replica attribute; and matching the storage nodes and the file copies based on the first queue and the second queue, and determining the storage nodes corresponding to the file copies.
In some embodiments of the present application, based on the foregoing solution, the method further comprises: acquiring node information of the storage node; and generating a node key of each storage node based on the node information.
In some embodiments of the present application, based on the foregoing solution, the method further comprises: when a file request triggered by a terminal is acquired; determining a storage node corresponding to the file identifier based on the file identifier in the file request; acquiring a file copy corresponding to the file identifier from the storage node; and checking the file copies, and sending files formed by the file copies to the terminal after the file copies pass the checking.
According to an aspect of an embodiment of the present application, there is provided a cloud security storage system for file copies, including:
the system comprises an encoding module, a storage module and a processing module, wherein the encoding module is used for encoding a file to be processed based on file attributes of the file to be processed to generate a file copy of the file to be processed, and the file attributes comprise file data volume and importance level; the node management module is used for acquiring node information of each storage node in the cloud platform and determining stability parameters of the storage nodes based on the node information; the file management module is used for matching the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determining the storage nodes corresponding to the file copies; and the node storage module is used for sending the node key of each storage node to the corresponding storage node so as to store the corresponding file copy in the storage node based on the node key.
According to an aspect of the embodiments of the present application, there is provided a computer readable medium, on which a computer program is stored, the computer program, when executed by a processor, implements the cloud security storage method of a file copy as described in the above embodiments.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the cloud-secure storage method of file copies as described in the above embodiments.
According to an aspect of embodiments herein, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and executes the computer instructions, so that the computer device executes the cloud security storage method for the file copy provided in the above various optional implementation modes.
In the cloud security storage method of the file copies, the file is encoded based on the file attributes of the file to be processed to generate the corresponding file copies, and based on the node information of each storage node in the cloud platform, evaluating the stability parameters of the nodes, then matching according to the condition of the file copy and the stability parameters of the storage nodes, determining appropriate storage nodes for the file copies, finally encrypting and storing the stored file copies based on the corresponding keys stored, by the method, the file attribute of the file to be processed is considered, the node attribute of the storage node is considered in the storage of the file copy, the corresponding storage nodes are determined according to the file copies under different conditions, so that the stability and the storage efficiency of the file copy storage are improved, and finally, the safety and the reliability of the file copy storage are improved in an encryption mode.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 shows a schematic diagram of an exemplary system architecture to which aspects of embodiments of the present application may be applied;
FIG. 2 schematically shows a flowchart of a method for cloud-safe storage of a copy of a file according to an embodiment of the present application
FIG. 3 schematically illustrates a flow diagram for generating a copy of a file according to an embodiment of the present application;
FIG. 4 schematically shows a flow chart for generating a stability parameter according to an embodiment of the present application;
FIG. 5 schematically illustrates a schematic diagram of a cloud-secured storage system of file copies according to one embodiment of the present application;
FIG. 6 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the subject matter of the present application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, systems, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the application.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solution of the embodiments of the present application can be applied.
As shown in fig. 1, the system architecture may include a terminal device (e.g., one or more of a smartphone 101, a tablet computer 102, and a portable computer 103 shown in fig. 1, but may also be a desktop computer, etc.), a network 104, and a server 105. The network 104 serves as a medium for providing communication links between terminal devices and the server 105. Network 104 may include various connection types, such as wired communication links, wireless communication links, and so forth.
In this embodiment, an electronic device (for example, the server/terminal device shown in fig. 1) on which the cloud security storage method for file copies operates may receive xx information in a wired connection manner or a wireless connection manner. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
In the present embodiment, the server 105 may be a server that provides various services, such as a background server that provides support for pages displayed on the terminal devices 101, 102, and 103, and a data storage server that performs data storage.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
A user may use a terminal device to interact with the server 105 via the network 104 to receive or transmit file data or the like. The server 105 may be a server that provides various services. In this embodiment, a file copy of a file to be processed is generated by encoding the file to be processed based on a file attribute of the file to be processed, then stability parameters of the storage nodes are determined based on node information of each storage node in a cloud platform, the storage nodes and the file copy are matched based on the stability parameters of each storage node and the copy attribute corresponding to each file copy, the storage node corresponding to the file copy is determined, and finally, a node key of each storage node is sent to the corresponding storage node, so that the corresponding file copy is stored in the storage node based on the node key.
In the cloud security storage method of the file copies, the file is encoded based on the file attributes of the file to be processed to generate the corresponding file copies, and based on the node information of each storage node in the cloud platform, evaluating the stability parameters of the nodes, then matching according to the condition of the file copy and the stability parameters of the storage nodes, determining appropriate storage nodes for the file copies, finally encrypting and storing the stored file copies based on the corresponding keys stored, by the method, the file attribute of the file to be processed is considered, the node attribute of the storage node is considered in the storage of the file copy, the corresponding storage nodes are determined according to the file copies under different conditions, so that the stability and the storage efficiency of the file copy storage are improved, and finally, the safety and the reliability of the file copy storage are improved in an encryption mode.
The implementation details of the technical solution of the embodiment of the present application are set forth in detail below:
fig. 2 shows a flowchart of a method for cloud-safe storage of a copy of a file according to an embodiment of the present application. Referring to fig. 2, the cloud security storage method for file copies at least includes steps S210 to S240, which are described in detail as follows:
in step S210, the encoding module encodes the file to be processed based on a file attribute of the file to be processed, and generates a file copy of the file to be processed, where the file attribute includes a file data size and an importance level.
In an embodiment of the application, the file to be processed is used for representing a file which needs to be stored through a cloud, and attributes of the file to be processed include file data volume, importance level and the like, and may further include file types and the like. The file data size represents a storage space required for the file, and the importance level represents an importance level of the file, and is generally set by a human.
In this embodiment, the method for encoding the file to be processed may be performed by using a fountain code, which may generate a string of infinite encoded symbol sequences from a given set of source symbols, and in an ideal case, only an arbitrary subset of encoded symbols having the same size as or a slightly larger size than the source symbols is required to be obtained to recover the source symbols.
Optionally, in this embodiment, the number of file copies obtained by encoding may be the same or different. Meanwhile, when the file copy is generated, the name of the file copy and the original file name are mutually associated, so that the computer processing and the user identification are facilitated.
In an embodiment of the present application, as shown in fig. 3, the process of encoding the file to be processed based on the file attribute of the file to be processed in step S210 to generate the file copy of the file to be processed includes the following steps:
s211, acquiring file attributes of the file to be processed, wherein the file attributes comprise file data volume and importance level;
s212, determining the copy number of the file copy corresponding to the file at the agent based on the file data volume and the importance level;
s213, encoding the file to be processed to generate the file copy corresponding to the copy number.
In an embodiment of the present application, based on the file data amount and the importance level, the number of copies of the file corresponding to the file at the agent is determined, and the number of copies of the file may be calculated by the following formula:
Figure 402469DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 696047DEST_PATH_IMAGE002
a factor representing the number of settings is given,
Figure 549734DEST_PATH_IMAGE003
indicating the number of copies of the file copy,
Figure 536144DEST_PATH_IMAGE004
indicates the level of importance of the document to be processed,
Figure 170388DEST_PATH_IMAGE005
indicating the amount of file data.
The importance level of the file to be processed in this embodiment may be set by a user, for example, the importance level in this embodiment may include 1-10 levels, and the like, and the numerical value of the importance level corresponds to a specific level number size.
In the embodiment, the number of the file copies which can be coded by one file to be processed is evaluated through the importance level and the file data volume, and the attribute of the file is considered in the generation process of the file copies, so that the reliability and the safety of the storage of the file to be processed are improved.
In step S220, the node management module obtains node information of each storage node in the cloud platform, and determines a stability parameter of the storage node based on the node information.
In an embodiment of the present application, the node management module is configured to perform statistics and management on states of each storage node. In this embodiment, node information of each storage node in the cloud platform is acquired by the node management module, so as to determine the stability parameter of the storage node based on the node information. The stability parameter in this embodiment is used to indicate the data storage capacity and the data transmission capacity of the storage node, and the higher the stability parameter is, the stronger the node capacity is.
In an embodiment of the present application, as shown in fig. 4, the process of acquiring node information of each storage node in the cloud platform in step S220 and determining the stability parameter of the storage node based on the node information includes the following steps:
s221, acquiring node information of each storage node in the cloud platform, wherein the node information comprises a node storage threshold, a current storage amount and a data transmission frequency;
s222, determining storage parameters of the storage nodes based on node storage threshold values and current storage amount in the node information;
s223, determining the stability parameter of the storage node based on the storage parameter and the data transmission frequency.
In an embodiment of the application, node performance of storage nodes is evaluated by acquiring node information of each storage node in a cloud platform. The node information in this embodiment includes a storage threshold, a current storage amount, and a data transmission frequency. The storage threshold value represents the highest storage capacity of the node, the current storage capacity represents the number of the nodes which have been stored currently, and the data transmission frequency is used for representing the data transmission quantity of the nodes in the unit time of the current time period.
In an embodiment of the present application, based on a node storage threshold and a current storage amount in the node information, a storage parameter of the storage node is determined as follows:
Figure 392291DEST_PATH_IMAGE006
wherein the content of the first and second substances,
Figure 959538DEST_PATH_IMAGE007
which is indicative of a storage parameter,
Figure 257795DEST_PATH_IMAGE008
a storage factor representing the setting is stored in the memory,
Figure 176073DEST_PATH_IMAGE009
indicates the current storage amount,
Figure 14716DEST_PATH_IMAGE010
Representing a storage threshold.
In an embodiment of the present application, based on the storage parameter and the data transmission frequency, a stability parameter of the storage node is determined by:
Figure 328148DEST_PATH_IMAGE011
wherein the content of the first and second substances,
Figure 921940DEST_PATH_IMAGE012
the stability parameter is represented by a value representing,
Figure 937301DEST_PATH_IMAGE013
which is indicative of a stability factor to be set,
Figure 641952DEST_PATH_IMAGE014
which is indicative of a storage parameter,
Figure 387054DEST_PATH_IMAGE015
representing the data transmission frequency.
In the embodiment, the node performance of the storage node is measured and evaluated through the node storage threshold value, the current storage amount and the data transmission frequency of the storage node, so that the current condition of the storage node can be comprehensively and objectively obtained, and then the corresponding file copy is distributed to the storage node based on the current condition of the storage node, so that the storage efficiency of the file copy is improved, and the utilization rate of the storage node is improved.
In step S230, the file management module matches the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determines the storage nodes corresponding to the file copies.
In an embodiment of the application, after the stability parameters and the file copies of the storage nodes are obtained, the storage nodes and the file copies are matched based on the stability parameters and the copy attributes to determine the storage nodes corresponding to the file copies, and then the file copies are stored in the corresponding storage nodes.
In an embodiment of the present application, in step S230, based on the stability parameter of each storage node and the copy attribute corresponding to each file copy, a process of matching the storage node and the file copy and determining a storage node corresponding to the file copy includes the following steps:
s231, sorting the storage nodes according to the descending order of the stability parameters to obtain a first queue;
s232, sorting the file copies according to the sequence that the data volume of the file copies is from large to small; obtaining a second queue; the data volume belongs to the replica attribute;
and S233, matching the storage node and the file copy based on the first queue and the second queue, and determining the storage node corresponding to the file copy.
In an embodiment of the present application, the copy attribute of the file copy includes at least one of: amount of data, type of data, and the like.
In an embodiment of the application, based on the stability parameters, the storage nodes are firstly sorted according to the descending order of the stability parameters to obtain a first queue; then, based on the data volume of the file copies, the data volumes of the file copies are sequenced in the descending order to obtain a second queue; and matching the storage nodes and the file copies based on the first queue and the second queue, and determining the storage nodes corresponding to the file copies.
The specific matching mode may be to allocate a file copy with a large data size to a storage node with a high stability parameter, so as to ensure reliability and stability of data storage.
After determining the storage node corresponding to each file copy, the storage node sends the corresponding file copy name to the server, so as to facilitate server query and recording.
In step S240, the node storage module sends the node key of each storage node to the corresponding storage node, so as to store a corresponding file copy in the storage node based on the node key.
In an embodiment of the present application, node information of the storage nodes may be obtained, and then a node key of each storage node is generated based on the node information. Specifically, the node information in this embodiment may include a node identifier, a node type, a node capacity, and the like. After the node information is acquired, the node information is subjected to standardization processing to obtain a character string. And then combining the character string associations to obtain a node sequence corresponding to the combined node, wherein the node sequence is unique. And finally, generating a node key corresponding to the node sequence through a key generator based on the node sequence so as to store a corresponding file copy based on the node key.
In an embodiment of the present application, when a terminal needs to acquire a file, a file request is sent to a server, where the file request may include a file identifier. When a server acquires a file request triggered by a terminal, determining a storage node corresponding to a file identifier based on the file identifier in the file request. And acquiring a file copy corresponding to the file identifier from the storage node, then verifying the file copy, and after the verification is passed, sending a file formed by the file copy to the terminal.
The specific verification method may be to combine all the acquired file copies to obtain a text to be verified, and perform hash processing on the text to be verified to obtain a hash value to be verified. And comparing the hash value to be verified with a hash value corresponding to a pre-stored file to be processed, if the hash value to be verified is the same as the hash value corresponding to the pre-stored file to be processed, indicating that verification is passed, and sending the file formed by the file copy to the terminal. The security and reliability of file storage, transmission and processing are ensured through the method.
In the cloud security storage method of the file copies, the file is encoded based on the file attributes of the file to be processed to generate the corresponding file copies, and based on the node information of each storage node in the cloud platform, evaluating the stability parameters of the nodes, then matching according to the condition of the file copy and the stability parameters of the storage nodes, determining appropriate storage nodes for the file copies, finally encrypting and storing the stored file copies based on the corresponding keys stored, by the method, the file attribute of the file to be processed is considered, the node attribute of the storage node is considered in the storage of the file copy, the corresponding storage nodes are determined according to the file copies under different conditions, so that the stability and the storage efficiency of the file copy storage are improved, and finally, the safety and the reliability of the file copy storage are improved in an encryption mode.
The following describes an embodiment of an apparatus of the present application, which may be used to execute a cloud security storage method for a file copy in the foregoing embodiment of the present application. It will be appreciated that the apparatus may be a computer program (comprising program code) running on a computer device, for example an application software; the apparatus may be used to perform the corresponding steps in the methods provided by the embodiments of the present application. For details that are not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the cloud security storage method of the file copy described above in the present application.
FIG. 5 illustrates a block diagram of a cloud secure storage system for copies of files according to one embodiment of the present application.
Referring to fig. 5, a cloud secure storage system 300 for file copies according to an embodiment of the present application includes:
the encoding module 310 is configured to encode a file to be processed based on a file attribute of the file to be processed, and generate a file copy of the file to be processed, where the file attribute includes a file data size and an importance level;
the node management module 320 is configured to acquire node information of each storage node in the cloud platform, and determine a stability parameter of the storage node based on the node information;
the file management module 330 is configured to match the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determine the storage nodes corresponding to the file copies;
the node storage module 340 is configured to send the node key of each storage node to the corresponding storage node, so as to store a corresponding file copy in the storage node based on the node key.
In some embodiments of the present application, based on the foregoing scheme, the encoding the file to be processed based on the file attribute of the file to be processed to generate a file copy of the file to be processed includes: acquiring file attributes of the file to be processed, wherein the file attributes comprise file data volume and importance level; determining the copy number of the file copy corresponding to the file at the agent based on the file data volume and the importance level; and coding the file to be processed to generate file copies corresponding to the number of the copies.
In some embodiments of the present application, based on the foregoing scheme, the number of copies of the file is calculated by the following formula:
Figure 10802DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 903672DEST_PATH_IMAGE002
the number factor is expressed in terms of a number factor,
Figure 756221DEST_PATH_IMAGE003
indicating the number of copies of the file copy,
Figure 621409DEST_PATH_IMAGE004
indicates the level of importance of the document to be processed,
Figure 291425DEST_PATH_IMAGE005
indicating the amount of file data.
In some embodiments of the present application, based on the foregoing scheme, the obtaining node information of each storage node in the cloud platform, and determining the stability parameter of the storage node based on the node information includes: acquiring node information of each storage node in the cloud platform, wherein the node information comprises a node storage threshold, a current storage amount and data transmission frequency; determining storage parameters of the storage nodes based on node storage threshold values and current storage amount in the node information; determining a stability parameter for the storage node based on the storage parameter and the data transmission frequency.
In some embodiments of the present application, based on the foregoing solution, the matching, performed on the storage nodes and the file copies, based on the stability parameters of each storage node and the copy attributes corresponding to each file copy, and determining the storage node corresponding to the file copy includes: sorting the storage nodes according to the sequence of the stability parameters from large to small to obtain a first queue; sequencing the file copies according to the sequence of the data volume of the file copies from large to small; obtaining a second queue; the data volume belongs to the replica attribute; and matching the storage nodes and the file copies based on the first queue and the second queue, and determining the storage nodes corresponding to the file copies.
In some embodiments of the present application, based on the foregoing solution, the method further comprises: acquiring node information of the storage node; and generating a node key of each storage node based on the node information.
In some embodiments of the present application, based on the foregoing solution, the method further comprises: when a file request triggered by a terminal is acquired; determining a storage node corresponding to the file identifier based on the file identifier in the file request; acquiring a file copy corresponding to the file identifier from the storage node; and checking the file copies, and sending files formed by the file copies to the terminal after the file copies pass the checking.
In the cloud security storage method of the file copies, the file is encoded based on the file attributes of the file to be processed to generate the corresponding file copies, and based on the node information of each storage node in the cloud platform, evaluating the stability parameters of the nodes, then matching according to the condition of the file copy and the stability parameters of the storage nodes, determining appropriate storage nodes for the file copies, finally encrypting and storing the stored file copies based on the corresponding keys stored, by the method, the file attribute of the file to be processed is considered, the node attribute of the storage node is considered in the storage of the file copy, the corresponding storage nodes are determined according to the file copies under different conditions, so that the stability and the storage efficiency of the file copy storage are improved, and finally, the safety and the reliability of the file copy storage are improved in an encryption mode.
FIG. 6 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system 400 of the electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system 400 includes a Central Processing Unit (CPU) 401, which can perform various appropriate actions and processes, such as executing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for system operation are also stored. The CPU 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An Input/Output (I/O) interface 405 is also connected to the bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a Display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411. The computer program executes various functions defined in the system of the present application when executed by a Central Processing Unit (CPU) 401.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with a computer program embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
According to an aspect of the application, a computer program product or computer program is provided, comprising computer instructions, the computer instructions being stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method provided in the various alternative implementations described above.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A cloud security storage method of file copies is characterized by comprising the following steps:
the method comprises the steps that an encoding module encodes a file to be processed based on file attributes of the file to be processed to generate a file copy of the file to be processed, wherein the file attributes comprise file data volume and importance level;
the method comprises the steps that a node management module obtains node information of each storage node in a cloud platform, and stability parameters of the storage nodes are determined based on the node information;
the file management module matches the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determines the storage nodes corresponding to the file copies;
and the node storage module sends the node key of each storage node to the corresponding storage node so as to store the corresponding file copy in the storage node based on the node key.
2. The method according to claim 1, wherein encoding the file to be processed based on file attributes of the file to be processed to generate a file copy of the file to be processed comprises:
acquiring file attributes of the file to be processed, wherein the file attributes comprise file data volume and importance level;
determining the copy number of the file copy corresponding to the file at the agent based on the file data volume and the importance level;
and coding the file to be processed to generate file copies corresponding to the number of the copies.
3. The method of claim 2, wherein the number of copies of the file is calculated by the following formula:
Figure 243688DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 696666DEST_PATH_IMAGE002
the number factor is expressed in terms of a number factor,
Figure 416361DEST_PATH_IMAGE003
indicating the number of copies of the file copy,
Figure 381911DEST_PATH_IMAGE004
indicates the level of importance of the document to be processed,
Figure 983794DEST_PATH_IMAGE005
indicating the amount of file data.
4. The method of claim 1, wherein obtaining node information of each storage node in a cloud platform and determining stability parameters of the storage nodes based on the node information comprises:
acquiring node information of each storage node in the cloud platform, wherein the node information comprises a node storage threshold, a current storage amount and data transmission frequency;
determining storage parameters of the storage nodes based on node storage threshold values and current storage amount in the node information;
determining a stability parameter for the storage node based on the storage parameter and the data transmission frequency.
5. The method of claim 1, wherein matching the storage nodes and the file copies based on stability parameters of each of the storage nodes and copy attributes corresponding to each of the file copies to determine the storage nodes corresponding to the file copies comprises:
sorting the storage nodes according to the sequence of the stability parameters from large to small to obtain a first queue;
sequencing the file copies according to the sequence of the data volume of the file copies from large to small; obtaining a second queue; the data volume belongs to the replica attribute;
and matching the storage nodes and the file copies based on the first queue and the second queue, and determining the storage nodes corresponding to the file copies.
6. The method of claim 1, further comprising:
acquiring node information of the storage node;
and generating a node key of each storage node based on the node information.
7. The method of any of claims 1-6, further comprising:
when a file request triggered by a terminal is acquired;
determining a storage node corresponding to the file identifier based on the file identifier in the file request;
acquiring a file copy corresponding to the file identifier from the storage node;
and checking the file copies, and sending files formed by the file copies to the terminal after the file copies pass the checking.
8. A cloud security storage system of file copies, comprising:
the system comprises an encoding module, a storage module and a processing module, wherein the encoding module is used for encoding a file to be processed based on file attributes of the file to be processed to generate a file copy of the file to be processed, and the file attributes comprise file data volume and importance level;
the node management module is used for acquiring node information of each storage node in the cloud platform and determining stability parameters of the storage nodes based on the node information;
the file management module is used for matching the storage nodes and the file copies based on the stability parameters of the storage nodes and the copy attributes corresponding to the file copies, and determining the storage nodes corresponding to the file copies;
and the node storage module is used for sending the node key of each storage node to the corresponding storage node so as to store the corresponding file copy in the storage node based on the node key.
9. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, implements a cloud-secure storage method of a copy of a file according to any one of claims 1 to 7.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the cloud-secured storage method of a copy of a file as claimed in any one of claims 1 to 7.
CN202111615301.1A 2021-12-28 2021-12-28 Cloud security storage method, system, medium and electronic device for file copies Active CN114006914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111615301.1A CN114006914B (en) 2021-12-28 2021-12-28 Cloud security storage method, system, medium and electronic device for file copies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111615301.1A CN114006914B (en) 2021-12-28 2021-12-28 Cloud security storage method, system, medium and electronic device for file copies

Publications (2)

Publication Number Publication Date
CN114006914A true CN114006914A (en) 2022-02-01
CN114006914B CN114006914B (en) 2022-03-22

Family

ID=79932087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111615301.1A Active CN114006914B (en) 2021-12-28 2021-12-28 Cloud security storage method, system, medium and electronic device for file copies

Country Status (1)

Country Link
CN (1) CN114006914B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370030A (en) * 2008-09-24 2009-02-18 东南大学 Resource load stabilization method based on contents duplication
CN102075582A (en) * 2011-01-26 2011-05-25 南京财经大学 Storage method for data storage model of credible cloud storage system
CN102984188A (en) * 2011-09-06 2013-03-20 中国科学院声学研究所 Content replica placement method and content replica placement system used in content delivery network (CDN)
CN108200169A (en) * 2017-12-30 2018-06-22 广东技术师范学院 A kind of first Placement Strategy control method of the copy of cloud storage system
CN111447055A (en) * 2019-01-17 2020-07-24 华为技术有限公司 Block chain account book storage method and device
WO2021034274A1 (en) * 2019-08-20 2021-02-25 Singapore University Of Technology And Design Blockchain for operational data security in industrial control systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370030A (en) * 2008-09-24 2009-02-18 东南大学 Resource load stabilization method based on contents duplication
CN102075582A (en) * 2011-01-26 2011-05-25 南京财经大学 Storage method for data storage model of credible cloud storage system
CN102984188A (en) * 2011-09-06 2013-03-20 中国科学院声学研究所 Content replica placement method and content replica placement system used in content delivery network (CDN)
CN108200169A (en) * 2017-12-30 2018-06-22 广东技术师范学院 A kind of first Placement Strategy control method of the copy of cloud storage system
CN111447055A (en) * 2019-01-17 2020-07-24 华为技术有限公司 Block chain account book storage method and device
WO2021034274A1 (en) * 2019-08-20 2021-02-25 Singapore University Of Technology And Design Blockchain for operational data security in industrial control systems

Also Published As

Publication number Publication date
CN114006914B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
CN107145395B (en) Method and device for processing task
CN111898137A (en) Private data processing method, equipment and system for federated learning
CN108390872B (en) Certificate management method, device, medium and electronic equipment
WO2018206408A1 (en) Management of interoperating machine leaning algorithms
WO2018206406A1 (en) Adaptation of machine learning algorithms
CN108491267B (en) Method and apparatus for generating information
CN105339924A (en) Efficient data compression and analysis as a service
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN112328876A (en) Electronic card generation and pushing method and device based on knowledge graph
CN114781351B (en) Bid file analysis method, device, equipment and medium based on power data
US10114879B2 (en) Systems and methods for generating pluggable domain-specific data types
CN111177740A (en) Data confusion processing method, system and computer readable medium
CN114006914B (en) Cloud security storage method, system, medium and electronic device for file copies
CN112162859A (en) Data processing method and device, computer readable medium and electronic equipment
CN110505289B (en) File downloading method and device, computer readable medium and wireless communication equipment
CN109582967B (en) Public opinion abstract extraction method, device, equipment and computer readable storage medium
CN112235409A (en) File uploading method and device, electronic equipment and computer readable storage medium
CN111881469A (en) Data processing method and device
CN111046010A (en) Log storage method, device, system, electronic equipment and computer readable medium
US20220405473A1 (en) Machine learning for training nlp agent
CN113918517A (en) Multi-type file centralized management method, device, equipment and storage medium
CN112131468A (en) Data processing method and device in recommendation system
CN113282471B (en) Equipment performance testing method and device and terminal equipment
CN112612451B (en) Interface generation method, device, equipment and computer readable storage medium
CN115147963B (en) Vehicle digital key data change analysis method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220302

Address after: 518000 1506, building 2, COFCO Chuangzhi factory, zone 67, Xingdong community, Xin'an street, Bao'an District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Huasheng Zhilian Technology Co.,Ltd.

Address before: Room 101, building 1, No.19, 1st Road, Sanjiang Industrial Zone, Hengli Town, Dongguan City, Guangdong Province, 523000

Applicant before: Hongtai Intelligent Technology (Dongguan) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant