CN114374702B - Analysis and presentation method for disaster recovery data - Google Patents

Analysis and presentation method for disaster recovery data Download PDF

Info

Publication number
CN114374702B
CN114374702B CN202111609126.5A CN202111609126A CN114374702B CN 114374702 B CN114374702 B CN 114374702B CN 202111609126 A CN202111609126 A CN 202111609126A CN 114374702 B CN114374702 B CN 114374702B
Authority
CN
China
Prior art keywords
data
disaster recovery
client
backup
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111609126.5A
Other languages
Chinese (zh)
Other versions
CN114374702A (en
Inventor
宛亚东
刘胜军
谢飞
李晓洁
李海松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei City Cloud Data Center Co ltd
Original Assignee
Hefei City Cloud Data Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei City Cloud Data Center Co ltd filed Critical Hefei City Cloud Data Center Co ltd
Priority to CN202111609126.5A priority Critical patent/CN114374702B/en
Publication of CN114374702A publication Critical patent/CN114374702A/en
Application granted granted Critical
Publication of CN114374702B publication Critical patent/CN114374702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms

Abstract

Compared with the prior art, the invention solves the defects that different disaster recovery backup products are difficult to be presented on the same platform and plaintext is adopted for data transmission. The invention comprises the following steps: backup processing of the base node; the connection of the client; encrypting, decrypting and transmitting disaster-tolerant data; and analyzing and presenting disaster recovery data. According to the invention, different disaster recovery backup products can be selected and accessed according to different disaster recovery backup scenes, and the client and the application server perform data transmission in a WebSocket mode and an asymmetric encryption mode, so that the safety of the data is ensured, and the visual presentation of disaster recovery data is realized.

Description

Analysis and presentation method for disaster recovery data
Technical Field
The invention relates to the technical field of disaster recovery data analysis, in particular to an analysis and presentation method of disaster recovery data.
Background
With the development of informatization, no matter whether natural disasters occur, artificial misoperation or invasion occurs, data are lost, and further, unpredictable losses are brought, and faults are generally classified into system faults, object faults and medium faults, however, data disaster recovery is the last measure for guaranteeing data safety, and if no data backup disaster recovery is adopted, and data recovery measures often lead to overall loss and damage of data.
Although there are many backup disaster recovery products in the market at present, there are some problems, such as no visual display system, for operators to know the disaster recovery backup situation. Most of the methods adopt modes such as mail, short message and the like, and only when a problem occurs, the problem is known. This results in either no ability to predict problems in advance for the system, or some manufacturers have visualization systems but cannot blend multiple products. When a plurality of products are used in disaster recovery backup, different visual interfaces need to be opened simultaneously to watch the problem.
Most of visual presentation systems display large screens and data, and data is requested to an application server in a timing mode in a polling mode, so that the cost of hardware such as bandwidth and memory is greatly increased. This approach also has a situation where there is a delay cue in the visualization system when there is a problem with the data. Since the back-end data is acquired only by a prescribed time, the operator delays the operation.
The method has the problem that most of backup disaster recovery system clients and application servers in the market at present and most of backup disaster recovery servers and application servers adopt a plaintext mode for data transmission, so that the system is easy to attack, and an attacker can easily acquire related data.
Therefore, how to develop an analysis and presentation method for disaster recovery data has become an urgent technical problem to be solved.
Disclosure of Invention
The invention aims to solve the defect that different disaster recovery backup products are difficult to present on the same platform and data transmission adopts plaintext in the prior art, and provides an analysis and presentation method of disaster recovery data to solve the problems.
In order to achieve the above object, the technical scheme of the present invention is as follows:
the disaster recovery data system comprises a disaster recovery end, an application server, an infrastructure node and a client, wherein the disaster recovery end is used for backing up and recovering related data, the application server is used for recording the disaster recovery end and backup end records, configuring and alarming information of the backup end and the disaster recovery end, the client is used for displaying a disaster recovery large screen and disaster recovery record and visualizing operation, the disaster recovery end is connected with the client through the application server, the infrastructure node is connected with the disaster recovery end and the application server through the backup end,
the analysis and presentation method of disaster recovery data comprises the following steps:
backup processing of the base node;
the connection of the client;
encrypting, decrypting and transmitting disaster-tolerant data;
analysis and presentation of disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when access is presented, data is obtained from localFoage.
The backup processing of the base node comprises the following steps:
the infrastructure node performs backup operation in a local machine room;
the infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
if the backup end needs disaster recovery, the data of the backup end is backed up to the disaster recovery end in different places through the disaster recovery backup tool, and meanwhile information is recorded in the application server.
The connection of the client comprises the following steps:
the client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key publickey of the client to an application server;
the application server inquires account passwords and ip information in the system, stores the public key of the client if the account passwords and the ip information exist, and simultaneously transmits the public key of the application server and a secret key symmetrically encrypted by the client to the client in a websocket mode;
after the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
The encryption and decryption transmission of the disaster recovery data comprises the following steps:
the client requests the application server to encrypt the data by the public key of the application server and then pushes the encrypted data to the application server;
the application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
after the client acquires the data, the data is decrypted through the private key, and after the decryption is completed, the data is classified, encrypted according to the symmetric encryption key transmitted by the server, and then stored in the localForage.
Advantageous effects
Compared with the prior art, the analysis and presentation method for disaster recovery data can select different disaster recovery backup products according to different disaster recovery backup scenes, and the client and the application server perform data transmission in a WebSocket mode and an asymmetric encryption mode, so that the safety of the data is ensured, and the visual presentation of the disaster recovery data is realized.
The analysis and presentation system based on disaster recovery data can be compatible with different disaster recovery products, such as nbu, ding Jia, rose and other current main stream disaster recovery backup products, meanwhile, long-term links can be established between a client and an application server by adopting a WebSocket mode to perform data interaction, the client can actively request the data of the server and the server can also actively push the data to the client, so that the abnormal data of disaster recovery can be actively pushed to different clients once the application server acquires.
Meanwhile, the data is ensured to be safe by adopting an asymmetric encryption mode when the data is transmitted between the client and the application server, the data is backup data or disaster-tolerant data is classified and encrypted for the first time, the localForage is stored in the client, when new data exists in the server, the new data is pushed to the client through the WebSocket server, the client decrypts the data of the server again and encrypts the data according to the encryption mode of the client, and therefore the effect of double encryption is achieved, the safety of the data is ensured, and meanwhile, the data delay condition of the client and the application server is also solved.
The disaster recovery presenting method has different presenting ends, and disaster recovery operators can more intuitively watch and know the problems, so that the problems can be rapidly prejudged and processed in time; because the system adopts a localForage front end storage mode to carry out data encryption storage, when the visual system is disconnected, the condition that the large screen of the system and visual data cannot be checked does not occur.
Drawings
FIG. 1 is a process sequence diagram of the present invention;
fig. 2 is a schematic block diagram of the method of the present invention.
Description of the embodiments
For a further understanding and appreciation of the structural features and advantages achieved by the present invention, the following description is provided in connection with the accompanying drawings, which are presently preferred embodiments and are incorporated in the accompanying drawings, in which:
as shown in fig. 2, the disaster recovery data system of the present invention includes a disaster recovery end, an application server, an infrastructure node and a client, where the disaster recovery end is used for backing up and recovering related data, the application server is used for recording the disaster recovery end and backup end records, configuring and alarming information of the backup end and the disaster recovery end, the client is used for displaying disaster recovery large screen and disaster recovery record and part of visualization operation, the disaster recovery end is connected with the client through the application server, and the infrastructure node is connected with the disaster recovery end and the application server through the backup end.
As shown in fig. 1, the analysis and presentation method of disaster recovery data includes the following steps:
first, the backup processing of the base node. By adopting the mode, the backup and disaster recovery operation can be completed under the condition that the code and the running environment of the production environment are not influenced. The method comprises the following specific steps:
(1) The infrastructure node performs backup operation in a local machine room;
(2) The infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
(3) If the backup end needs disaster recovery, the data of the backup end is backed up to the disaster recovery end in different places through the disaster recovery backup tool, and meanwhile information is recorded in the application server.
And secondly, connecting the client. By adopting the method, the data security can be ensured, and meanwhile, the application server can record the currently accessed account number and the ip supply later-period traceability related information. The method comprises the following specific steps:
(1) The client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key publickey of the client to an application server;
(2) The application server inquires account passwords and ip information in the system, stores the public key of the client if the account passwords and the ip information exist, and simultaneously transmits the public key of the application server and a secret key symmetrically encrypted by the client to the client in a websocket mode;
(3) After the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
Thirdly, encrypting, decrypting and transmitting disaster recovery data. By adopting the mode, the data security is well ensured, meanwhile, the main stream browser on the market at present supports the function, and the data storage quantity is much larger than that of cookies. The method comprises the following specific steps:
(1) The client requests the application server to encrypt the data by the public key of the application server and then pushes the encrypted data to the application server;
(2) The application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
(3) After the client acquires the data, the data is decrypted through the private key, and after the decryption is completed, the data is classified, encrypted according to the symmetric encryption key transmitted by the server, and then stored in the localForage.
Fourthly, analyzing and presenting disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when access is presented, data is obtained from localFoage.
The computer end is presented in a browser, and the development and use technology is mainly developed in a mode of vue +echartes+websockt+localforage. The mobile phone terminal is mainly divided into two modes to be presented, wherein the first mode is that an applet is mainly researched and developed in a mode of webpages, websockt and localForage, and the second mode is that an android app is adopted for display and an acoustic android is adopted for development. The two presentation modes are encrypted by adopting an encryption mode corresponding to websocket, decryption is needed when the used presentation segments are displayed, and corresponding data are stored in localForage in a symmetrical encryption mode. When the data is changed, the server pushes the data to the client for display through websocket, and the data in the localform is updated so as to be directly obtained from the localform next time and then directly presented.
The disaster recovery data management platform formed by the method mainly comprises a large screen of a disaster recovery cloud service management platform, service access, monitoring management, a work order center and a report center. The large screen mainly displays the content of the enterprise number, the backup client number, the disaster recovery client number and the disaster recovery backup condition trend chart, and the map displays the node distribution condition of each disaster recovery backup stack point, and displays the relevant information of each stack point when clicking each stack point. Service access is mainly responsible for accessing relevant stack point information. The monitoring management mainly displays the monitoring information of each stack point, and the work order center is mainly responsible for displaying the situation that the related problems are processed. The report center is mainly responsible for displaying different inspection conditions of each stack point. The disaster recovery platform exchanges secret keys after displaying related information for the first time, and transmits the secret keys for storing the data of the localFoage to the client, the client obtains the related data and stores the related data locally, encryption and decryption are needed in the process of data transmission in the process, meanwhile, the client classifies the decrypted data, then stores the classified data in the localFoage, and the data is directly obtained from the localFoage in the later period, but symmetric decryption is needed before the data is presented from the localFoage each time, and then the data is presented. And at the later stage, if the application server pushes new data through webcookie, displaying the new data and updating the localFoage data. By adopting the mode, the safety in the data transmission process is well ensured, the frequency of continuously requesting data to the server is reduced, and hardware resources such as bandwidth, memory and the like are well reduced.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made therein without departing from the spirit and scope of the invention, which is defined by the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (2)

1. The disaster recovery data system comprises a disaster recovery end, an application server, an infrastructure node and a client, wherein the disaster recovery end is used for backing up and recovering related data, the application server is used for recording and configuring and alarming information of the disaster recovery end and the backup end, the client is used for displaying a disaster recovery large screen and the disaster recovery record and visualizing operation, the disaster recovery end is connected with the client through the application server, the infrastructure node is connected with the disaster recovery end and the application server through the backup end,
the analysis and presentation method of disaster recovery data is characterized by comprising the following steps:
11 Backup processing of the base node; the backup processing of the base node comprises the following steps:
111 The infrastructure node performs backup operation in a local machine room;
112 The infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
113 If the backup end needs disaster recovery, carrying out remote backup on the data of the backup end to the disaster recovery end through a disaster recovery backup tool, and simultaneously recording information into an application server;
12 A connection of the client;
13 Encryption and decryption transmission of disaster recovery data; the encryption and decryption transmission of the disaster recovery data comprises the following steps:
131 The client requests the application server to encrypt the data through the public key of the application server and then pushes the encrypted data to the application server;
132 The application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
133 After the data is obtained by the client, the data is decrypted through the private key of the client, after the decryption is completed, the data is classified, the data is encrypted according to the symmetric encryption key transmitted by the server, and then the data is stored in the localForage;
14 Analysis presentation of disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when accessing the presentation, obtaining data from localFoage;
the disaster recovery data management platform formed by the method comprises a disaster recovery cloud service management platform large screen, service access, monitoring management, a work order center and a report center; the large screen displays the content of enterprise number, backup customer number, disaster recovery customer number and disaster recovery backup condition trend chart, and the map displays the node distribution condition of each disaster recovery backup stack point, and displays the information of each stack point when clicking each stack point; service access is responsible for accessing stack point information; monitoring management displays the monitoring information of each stack point, and a work order center is responsible for displaying the situation that the related problems are processed; the report center is responsible for displaying different inspection conditions of each stack point; the disaster recovery platform exchanges secret keys after displaying information for the first time, and transmits the secret keys for storing the data of the localFoage to the client, the client obtains related data and stores the related data locally, encryption and decryption are carried out in the process of data transmission in the process, meanwhile, the client classifies the decrypted data, then stores the classified data in the localFoage, and the data is directly obtained from the localFoage in the later period, but symmetric decryption is carried out from the localFoage before the presentation every time, and then the presentation is carried out.
2. The analysis and presentation method of disaster recovery data according to claim 1, wherein the connection of the client comprises the steps of:
21 The client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key of the client to an application server;
22 If the client public key exists, the client public key is stored, and the client public key and a secret key which is symmetrically encrypted by the client are transmitted to the client in a websocket mode;
23 After the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
CN202111609126.5A 2021-12-27 2021-12-27 Analysis and presentation method for disaster recovery data Active CN114374702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111609126.5A CN114374702B (en) 2021-12-27 2021-12-27 Analysis and presentation method for disaster recovery data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111609126.5A CN114374702B (en) 2021-12-27 2021-12-27 Analysis and presentation method for disaster recovery data

Publications (2)

Publication Number Publication Date
CN114374702A CN114374702A (en) 2022-04-19
CN114374702B true CN114374702B (en) 2024-01-30

Family

ID=81142291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111609126.5A Active CN114374702B (en) 2021-12-27 2021-12-27 Analysis and presentation method for disaster recovery data

Country Status (1)

Country Link
CN (1) CN114374702B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101918927A (en) * 2008-01-18 2010-12-15 Tivo有限公司 Distributed backup and retrieval system
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system
CN104243195A (en) * 2013-06-19 2014-12-24 国家电网公司 Remote disaster recovery processing method and device
CN108255641A (en) * 2017-12-25 2018-07-06 南京壹进制信息技术股份有限公司 A kind of CDP disaster recovery methods based on cloud platform
CN111147420A (en) * 2018-11-02 2020-05-12 深信服科技股份有限公司 Data disaster tolerance method, device, system, equipment and computer readable storage medium
CN113268378A (en) * 2021-05-18 2021-08-17 Oppo广东移动通信有限公司 Data disaster tolerance method and device, storage medium and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101918927A (en) * 2008-01-18 2010-12-15 Tivo有限公司 Distributed backup and retrieval system
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system
CN104243195A (en) * 2013-06-19 2014-12-24 国家电网公司 Remote disaster recovery processing method and device
CN108255641A (en) * 2017-12-25 2018-07-06 南京壹进制信息技术股份有限公司 A kind of CDP disaster recovery methods based on cloud platform
CN111147420A (en) * 2018-11-02 2020-05-12 深信服科技股份有限公司 Data disaster tolerance method, device, system, equipment and computer readable storage medium
CN113268378A (en) * 2021-05-18 2021-08-17 Oppo广东移动通信有限公司 Data disaster tolerance method and device, storage medium and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Securing Remote Backup Files From Man in the Middle Attacks by using Encryption and Compression Mechanisms;Karim Usman;《 International Journal of Advanced Studies in Computer Science and Engineering》;第9-15页 *
基于区块链的数据灾备网络设计;刘坤灿;《电子世界》;全文 *

Also Published As

Publication number Publication date
CN114374702A (en) 2022-04-19

Similar Documents

Publication Publication Date Title
EP3598714A1 (en) Method, device, and system for encrypting secret key
CN113140079B (en) Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system
CN113301431A (en) Video data encryption and decryption method and device, electronic equipment and system
CN109063011B (en) Log processing method, electronic device and computer readable storage medium
CN104092672A (en) Method for encrypting and decrypting information by means of ciphertext storage gateway
CN110888778B (en) Cloud desktop-based log file monitoring system and method
CN110399150B (en) Bios upgrading method, system, device and computer storage medium
CN114221927A (en) Mail encryption service system and method based on national encryption algorithm
CN111585998B (en) Audit data secure transmission method and system
CN112671876B (en) Method and equipment for page operation and maintenance
CN114374702B (en) Analysis and presentation method for disaster recovery data
CN113656713A (en) Network resource processing method, device and system
CN116663030A (en) Desensitization processing method and device for interactive data
CN208227203U (en) A kind of security video monitor supervision platform automatic test software service
CN113609147A (en) Data sharing method and device and electronic equipment
CN108183923B (en) Production traceability system and working method thereof
CN113132369A (en) Android mobile phone password automatic filling method and device
CN108390917B (en) Intelligent message sending method and device
CN115981986B (en) User behavior scene reproduction method in app
CN111130788A (en) Data processing method and system, data reading method and iSCSI server
CN109660604B (en) Data access method and equipment
CN111147296B (en) Information acquisition method and device
CN110784602B (en) Soft telephone communication method, device, terminal and storage medium
CN110022247B (en) APP data encryption transmission test method
CN112118208B (en) Method and device for reporting data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant