CN114398005A - Data secure migration method and device and storage medium - Google Patents
Data secure migration method and device and storage medium Download PDFInfo
- Publication number
- CN114398005A CN114398005A CN202111581676.0A CN202111581676A CN114398005A CN 114398005 A CN114398005 A CN 114398005A CN 202111581676 A CN202111581676 A CN 202111581676A CN 114398005 A CN114398005 A CN 114398005A
- Authority
- CN
- China
- Prior art keywords
- migration
- data
- time
- security information
- safety information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013508 migration Methods 0.000 title claims abstract description 303
- 230000005012 migration Effects 0.000 title claims abstract description 302
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000006243 chemical reaction Methods 0.000 claims description 29
- 238000004590 computer program Methods 0.000 claims description 15
- 238000012546 transfer Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0647—Migration mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a data safe migration method, a device and a storage medium, wherein a migration path of migration data is established according to an initial position and a target position, and the migration data is transferred to the target position; acquiring a data name, a data size, migration starting time and migration finishing time of migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy; and locking the migrated data based on the safety information. According to the invention, the corresponding safety information is generated according to the data name size, and particularly, the corresponding safety information is generated according to the data size, the migration time and the migration completion time, so that the data migration safety is improved, and the data migration and the data safety after the migration are more effectively ensured.
Description
Technical Field
The present invention relates to computer data processing technologies, and in particular, to a method and an apparatus for secure data migration, and a storage medium.
Background
Data migration refers to the offloading of data from one system to another system, or from one location to another location in the same system.
With the popularization and popularity of computers, when users find that own stored data needs to be transferred, the users can migrate the own data to a storage position with a higher security level. Data migration is an important service of storage. It is therefore particularly important how to ensure the security of data migration.
However, in the existing data migration, only data in an old position is directly migrated to a new position, and corresponding security detection is not performed on the data and the like in the migration process, so that the risk of virus propagation through migration exists, and great potential safety hazards exist.
Disclosure of Invention
Embodiments of the present invention provide a method and an apparatus for secure data migration, and a storage medium, where corresponding security information is generated according to a data name size, and especially, corresponding security information is generated according to a data size, a migration time, and a migration completion time, so that security of data migration is improved, and migration of data and security of data after migration are ensured more effectively.
In a first aspect of the embodiments of the present invention, a method for safely migrating data is provided, including:
establishing a migration path of migration data according to the initial position and the target position, and transferring the migration data to the target position;
acquiring a data name, a data size, migration starting time and migration finishing time of migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy;
and locking the migrated data based on the safety information.
Optionally, in a possible implementation manner of the first aspect, the generating the security information by the migration start time, the migration completion time, and the preset policy includes:
generating first safety information according to the data name;
generating second safety information according to the data size, the migration starting time and the migration finishing time;
generating the security information based on the first security information and the second security information.
Optionally, in a possible implementation manner of the first aspect, generating the first security information according to the data name includes:
acquiring a plurality of keywords at preset positions in the data name;
if the keyword is not a Chinese character, taking the keyword as the first safety information;
if the key word is a Chinese character, the key word is converted into pinyin, and the first letter of the pinyin is used as the first safety information.
Optionally, in a possible implementation manner of the first aspect, the migration data includes a plurality of child data;
generating second safety information according to the data size, the migration starting time and the migration finishing time, wherein the steps of:
acquiring subdata in the migration data;
and acquiring the data size, the migration starting time and the migration finishing time of each subdata, and generating second safety information according to the data size, the migration starting time and the migration finishing time of each subdata.
Optionally, in a possible implementation manner of the first aspect, after obtaining the migration start time and the migration completion time of the sub data, the method further includes:
and performing conversion processing on the migration starting time and the migration finishing time to obtain conversion values of the migration starting time and the migration finishing time.
Optionally, in a possible implementation manner of the first aspect, generating second security information according to the data size of each of the sub-data, the migration start time, and the migration completion time includes:
wherein, M represents the second security information, Dx represents the conversion value of the xth sub-data size, S2 represents the conversion value of the migration completion time of the sub-data, S1 represents the conversion value of the migration start time of the sub-data, N, u, N, K all represent the total number of the sub-data, and Wl is the conversion values of the migration start time and the migration completion time.
Optionally, in a possible implementation manner of the first aspect, after the locking processing is performed on the migrated data based on the security information, the method further includes:
and sending the safety information to a preset terminal for storage.
In a second aspect of the embodiments of the present invention, a data secure migration apparatus is provided, including:
the transfer module is used for establishing a transfer path of the transfer data according to the initial position and the destination position and transferring the transfer data to the destination position;
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a data name, a data size, migration starting time and migration finishing time of migration data and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy;
and the locking module is used for locking the migrated data based on the safety information.
In a third aspect of the embodiments of the present invention, there is provided a data secure migration apparatus, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
According to the data safe migration method, the data safe migration device and the storage medium, the migration path of the migration data is established according to the initial position and the target position, and the migration data is transferred to the target position; acquiring a data name, a data size, migration starting time and migration finishing time of migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy; and locking the migrated data based on the safety information. According to the invention, the corresponding safety information is generated according to the data name size, and particularly, the corresponding safety information is generated according to the data size, the migration time and the migration completion time, so that the data migration safety is improved, and the data migration and the data safety after the migration are more effectively ensured.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a method for securely migrating data according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a data security migration apparatus according to an embodiment of the present invention;
fig. 4 is a schematic hardware structure diagram of a data secure migration system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that all three of A, B, C comprise, "comprises A, B or C" means that one of A, B, C comprises, "comprises A, B and/or C" means that any 1 or any 2 or 3 of A, B, C comprises.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Data migration refers to the offloading of data from one system to another system, or from one location to another location in the same system. With the popularization and popularity of computers, when users find that own stored data needs to be transferred, the users can migrate the own data to a storage position with a higher security level. Data migration is an important service of storage. It is therefore particularly important how to ensure the security of data migration. However, in the existing data migration, only data in an old position is directly migrated to a new position, and corresponding security detection is not performed on the data and the like in the migration process, so that the risk of virus propagation through migration exists, and great potential safety hazards exist.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present invention. As shown in fig. 1, the present invention obtains migration data 01, an initial position 02 and a target position 03 of the migration data, establishes a migration path of the migration data according to the initial position and the target position, and transfers the migration data to the target position; acquiring a data name, a data size, migration starting time and migration finishing time of migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy; and locking the migrated data based on the safety information. Finally, migration of the migration data 01 from the initial location 02 to the target location 03 is safely achieved.
According to the invention, the corresponding safety information is generated according to the data name size, and particularly, the corresponding safety information is generated according to the data size, the migration time and the migration completion time, so that the data migration safety is improved, and the data migration and the data safety after the migration are more effectively ensured.
Fig. 2 is a flowchart of a data secure migration method according to an embodiment of the present invention, and as shown in fig. 2, the data secure migration method according to the embodiment may include steps S101 to S103, which are specifically as follows:
s101, establishing a migration path of migration data according to the initial position and the target position, and transferring the migration data to the target position.
In this embodiment, for example, data stored in a folder of the electronic device needs to be migrated from an initial location to a destination location, for example, from a location of the electronic device a to a location of the electronic device B. The electronic devices may include the same electronic device or different electronic devices, and the electronic devices may include, for example, a computer, a smart phone, a Personal Digital Assistant (PDA), an iPad, a hard disk, a usb disk (universal serial bus disk), and the like.
In this embodiment, a migration path of migration data may be established according to an initial position and a destination position of data to be migrated, for example, a folder a1 with an initial position being an electronic device a and a folder B1 with a destination position being an electronic device B are obtained, so that the migration path of migration data is obtained by migrating from a folder a1 of the electronic device a to a folder B1 of the electronic device B, and data in the folder a1 may be transferred to the destination position. Wherein the data in the folder may include at least one of text, voice, picture, and video, and the storage form includes, but is not limited to, office format, PDF, JPEG, GIF, PSD, CDA, WAV, MP3/MP3 Pro, WMA, MPEG, AVI, 3GP, RM (RMVB), WMV, FLV (F4V), and Blu-ray (BD), MKV, and the like.
S102, acquiring a data name, a data size, migration starting time and migration finishing time of the migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy.
With the above embodiment, by acquiring the data name, the data size, the migration start time, and the migration completion time of the migration data, the security information may be generated according to the data name, the data size, the migration start time, the migration completion time, and the preset policy.
Specifically, the security information is used to ensure the security of the data in the folder during the data migration process and the security of the data after the data migration. In some embodiments, the data name may be obtained by the name of a file, voice, video, etc. in a folder, for example, the data name xxx. In some embodiments, the data size represents the size of the memory space occupied by the data, and may be, for example, in bytes (B), Kilobytes (KB), Megabytes (MB), kyotobytes (GB), Terabytes (TB), bat bytes (PB), octets (EB), Zetbytes (ZB), and Yao Bytes (YB). In some embodiments, the size of the memory space occupied by the data needs to be unified into a standard system for representation, for example, an MB may be uniformly converted into a KB representation. Wherein, 1KB is 1024B, 1MB is 1024KB, 1GB is 1024MB, and 1TB is 1024 GB.
In some embodiments, the migration start time and the migration completion time may be expressed in a 12-hour system or a 24-hour system. For example, the migration start time is 8:00 and the migration completion time is 8: 03.
In some embodiments, the preset policy may include setting of security information for a data name, a data size, a migration start time, a migration completion time, and the like. For example, security information may be set for the data name, and security information may be set for the data size, the migration start time, and the migration completion time.
In this embodiment, for example, the data name is xxx, the data size is 3k, the migration start time is 8:00, and the migration completion time is 8: 03; and respectively obtaining the security information corresponding to the data name xxx, the security information corresponding to the data size 3k, the migration start time 8:00 and the migration finish time 8:03, and finally generating the security information of the current data migration.
S103, locking the migrated data based on the safety information.
With the above embodiment, the migrated data may be locked according to the finally obtained security information, that is, the migrated data may not be modified.
According to the invention, the corresponding safety information is generated according to the data name size, and particularly, the corresponding safety information is generated according to the data size, the migration time and the migration completion time, so that the data migration safety is improved, and the data migration and the data safety after the migration are more effectively ensured.
In some embodiments, after performing lock processing on the migrated data based on the security information, the method further includes:
and sending the safety information to a preset terminal for storage.
With the above embodiment, the migration data is migrated from the initial position to the target position, and the security information in the migration process may also be sent to the preset terminal after data migration for storage along with the migration of the data. The preset terminal is the electronic device after data migration.
On the basis of the foregoing embodiment, an implementation manner of generating the security information according to the data name, the data size, the migration start time, the migration completion time, and the preset policy in step S102 may include step S1021 (not shown), step S1022 (not shown), and step S1023 (not shown), specifically as follows:
and S1021, generating first safety information according to the data name. S1022, second safety information is generated according to the data size, the migration starting time and the migration finishing time. S1023, generating the safety information based on the first safety information and the second safety information.
Specifically, the preset policy may include setting of security information for a data name, a data size, a migration start time, a migration completion time, and the like, respectively. For example, security information may be set for the data name, and security information may be set for the data size, the migration start time, and the migration completion time.
In this embodiment, the first security information is generated according to the data name. And generating second safety information according to the data size, the migration starting time and the migration finishing time. And finally, generating the safety information in the migration process and after the migration according to the first safety information and the second safety information. Wherein finally generating the security information from the first security information and the second security information may generate the security information by arranging the first security information and the second security information in an order, e.g. the second security information is arranged before the first security information. The security information may also be generated by comparing the sizes of the first security information and the second security information, for example, if the first security information has a larger memory, the first security information may be set before the second security information, or the second security information may be set before the first security information. The first security information and the second security information may be randomly combined to generate security information, and the like.
For example, first security information is generated from the data name xxx, second security information is generated from the data size 3k, the migration start time 8:00, the migration completion time 8:03, and the like, and finally, the migration process and the post-migration security information are generated based on the first security information and the second security information. For example, the first security information is arranged before the second security information in the security information.
In this embodiment, steps S1021 and S1022 are not limited by the described sequence of actions, and steps S1021 and S1022 may be performed in other sequences or simultaneously.
Specifically, with reference to the foregoing embodiment, step S1021, generating first security information according to the data name, includes:
acquiring a plurality of keywords at preset positions in the data name;
if the keyword is not a Chinese character, taking the keyword as the first safety information;
if the key word is a Chinese character, the key word is converted into pinyin, and the first letter of the pinyin is used as the first safety information.
Specifically, the data name may have characters in more than one position, and thus the first security information may be generated by acquiring a plurality of keywords at preset positions in the data name. For example, the presence of characters at multiple locations in the data name, i.e., multiple keywords, may be detected. In some embodiments, the keywords may be chinese characters or non-chinese characters, such as arabic numerals, english characters, greek characters, etc., which are not limited herein, i.e., other characters except for chinese characters are suitable for the present invention.
In some embodiments, a plurality of keywords corresponding to preset positions in the data name are obtained, for example, the keywords corresponding to the second position and the third position in the data name may be obtained, and it is further required to determine whether the keywords are chinese characters. If the key words are not Chinese characters, the first safety information is generated by using the key words which are Chinese characters. If the keywords are judged to be Chinese characters, the keywords are converted into pinyin, and therefore first safety information is generated according to the first letters of the pinyin. The preset position may be specifically set according to actual requirements, and is not specifically limited herein.
For example, the keywords at the third position and the fourth position in the data name "folder one" are respectively "folder" and "one", and then the keywords are judged to be Chinese characters, the keywords are converted into pinyin, and the first letters of the pinyin are used as first safety information, for example, the first safety information is JY.
In some embodiments, the migration data comprises a plurality of child data;
generating second safety information according to the data size, the migration starting time and the migration finishing time, wherein the steps of:
acquiring subdata in the migration data;
and acquiring the data size, the migration starting time and the migration finishing time of each subdata, and generating second safety information according to the data size, the migration starting time and the migration finishing time of each subdata.
The folder in which data is migrated in conjunction with the above embodiments has a plurality of sub data, which may include at least one of a plurality of documents, voice, pictures, or video, for example. For example, the folder of the migration data includes one picture, one document, and one video, which are 3 pieces of sub data. And then generating second safety information according to the data size, the migration starting time and the migration finishing time, wherein the steps of: acquiring subdata in the migration data; and acquiring the data size, the migration starting time and the migration finishing time of each subdata, and generating second safety information according to the data size, the migration starting time and the migration finishing time of each subdata.
For example, the 3 pieces of sub-data are based on one picture, one document, and one video. And respectively acquiring the data size, the migration start time and the migration completion time corresponding to each subdata, and further generating second safety information according to the data size, the migration start time and the migration completion time of each subdata. The manner in which the second security information is generated according to the data size, the migration start time, and the migration completion time of each sub-data is similar to the process of generating the security information from the first security information and the second security information. For example, the data size of the picture is 106K, the migration start time is 8:00, and the migration completion time is 8: 01; the data size of the document is 48K, the migration time is 8:00, and the migration completion time is 8: 02; the data size of the video is 1M, the migration start time is 8:01, and the migration completion time is 8: 05. The picture generation sub security information is x1, the document generation sub security information is y2, and the video generation sub security information is zz, etc. Wherein the sub-security information corresponds to the sub-data, and finally the second security information is generated from the sub-security information. In some embodiments, the second security information may be generated by sorting the sub-security information, for example by sorting x1y2zz correspondingly in turn. In another embodiment, the second security information may be finally generated according to the size of each piece of sub-security information, for example, the largest piece of sub-security information is placed at the front end, and then the sub-security information is sequentially sorted from large to small according to the size of the sub-security information, so as to finally generate the second security information. For example, the sub-security information generated by the video is zz, the sub-security information generated by the zz video is zz, the corresponding occupied memory is the largest, the size sequence of the rest sub-security information is y2 and x1, and finally the generated second security information is zzy2x 1. In another embodiment, the sub security information corresponding to each sub data may be randomly allocated, and finally, the second security information may be generated. For example, the random second security information is finally obtained as zzx1y 2. In some other embodiments, the second security information is generated by using a calculation formula in a quantized form according to the data size, the migration start time, and the migration completion time of each sub-data, which is described in the following formula i in detail and is not described herein again.
According to the embodiment of the invention, the corresponding safety information is respectively obtained from the subdata in the migration data, and the second safety information is finally generated according to the data size, the migration time and the migration completion time of the subdata, so that the second safety information can be obtained in real time, and the data migration method has the advantages of higher safety of data migration, more effective guarantee of data migration and safety of the migrated data by obtaining the second safety information in real time and not only having the first safety information generated through the data name.
In some embodiments, after obtaining the migration start time and the migration completion time of the sub data, the method further includes:
and performing conversion processing on the migration starting time and the migration finishing time to obtain conversion values of the migration starting time and the migration finishing time.
Specifically, the migration start time and the migration completion time may be expressed in a 12-hour system or a 24-hour system, and therefore, after the migration start time and the migration completion time are obtained, the time expression system is subjected to a unified conversion process, that is, conversion values of the migration start time and the migration completion time are obtained. In some embodiments, the transition value for the migration start time and the migration completion time is the migration completion time minus the migration start time.
For example, if the migration start time and the migration completion time are both expressed in 24-hour system or 12-hour system, the conversion values of the migration start time and the migration completion time are the migration completion time directly subtracted from the migration start time. For example, a migration start time of 20:00 and a migration completion time of 20:03, a corresponding transformation value of 3 is obtained.
For another example, if the migration start time is expressed by a 24-hour system and the migration completion time is expressed by a 12-hour system, the migration completion needs to be unified into the 24-hour system, and then the corresponding conversion value is obtained. The migration start time is 12:00, the migration completion time is 0:10 pm, the migration completion times are unified to 24 hours and are expressed as 12:10, and finally the corresponding conversion value is obtained as 10.
In some embodiments, generating second security information according to the data size of each of the sub data, the migration start time, and the migration completion time includes:
wherein, M represents the second security information, Dx represents the conversion value of the xth sub-data size, S2 represents the conversion value of the migration completion time of the sub-data, S1 represents the conversion value of the migration start time of the sub-data, N, u, N, K all represent the total number of the sub-data, and Wl is the conversion values of the migration start time and the migration completion time.
For example, the migration data includes 2 sub data, for example, the sub data includes a first sub data and a second sub data, i.e., N, u, N, and K are all 2. The data size of the first subdata is 1Mb, the unified standard of the first subdata is 1024kb, and the corresponding conversion value is 1024; the data size of the second sub-data is 48kb, and the corresponding transformation value is 48. And Dx represents the size conversion value of the xth sub-data, namely, the xth sub-data is represented by a standard and then a corresponding numerical value is taken.
The first sub data migration completion time is expressed in 12 hours, for example, S2 is 1:30 pm. The first sub data migration start time is expressed in 24 hours, for example, 13: 05. The migration start time or the migration completion time needs to be represented by a unified standard time system, and any one of the migration start time or the migration completion time may be converted by a unified standard according to a specific situation, which is not specifically limited herein. For example, in this embodiment, the migration completion time of the first sub-data is converted into a 24-hour system, that is, the migration completion time is 13:30, the conversion value of the obtained first sub-data migration completion time S2 is 30, the conversion value of the first sub-data migration start time S1 is 05, and further W1 is 30-05 is 25.
Similarly, the second sub data migration completion time is expressed in 24 hours, for example, 15:20 at S2. The second sub data migration start time is also expressed in 24 hours, and is 14:55, for example. In this embodiment, the conversion value of the migration completion time S2 of the second sub data is 80, the conversion value of the migration start time S1 of the second sub data is 55, and W2 is further obtained as 80-55 as 25. And finally, M536 × 25 13400, so as to obtain the second safety information according to the formula I.
Fig. 3 is a schematic diagram of a data secure migration apparatus according to an embodiment of the present invention, and as shown in fig. 3, the apparatus 10 may include:
the transfer module 11 is configured to establish a transfer path of the transfer data according to the initial position and the destination position, and transfer the transfer data to the destination position;
the obtaining module 12 is configured to obtain a data name, a data size, migration start time, and migration completion time of migration data, and generate security information according to the data name, the data size, the migration start time, the migration completion time, and a preset policy;
and the locking module 13 is configured to perform locking processing on the migrated data based on the security information.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 2, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 4 is a schematic hardware structure diagram of a data secure migration system according to an embodiment of the present invention, where the data secure migration system 20 includes: a processor 21, a memory 22 and a computer program; wherein
A memory 22 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
A processor 21 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 22 may be separate or integrated with the processor 21.
When the memory 22 is a device independent of the processor 21, the apparatus may further include:
a bus 23 for connecting the memory 22 and the processor 21.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A method for secure migration of data, comprising:
establishing a migration path of migration data according to the initial position and the target position, and transferring the migration data to the target position;
acquiring a data name, a data size, migration starting time and migration finishing time of migration data, and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy;
and locking the migrated data based on the safety information.
2. The method of claim 1, wherein generating security information according to the data name, the data size, the migration start time, the migration completion time, and a preset policy comprises:
generating first safety information according to the data name;
generating second safety information according to the data size, the migration starting time and the migration finishing time;
generating the security information based on the first security information and the second security information.
3. The method of claim 2, wherein generating first security information from the data name comprises:
acquiring a plurality of keywords at preset positions in the data name;
if the keyword is not a Chinese character, taking the keyword as the first safety information;
if the key word is a Chinese character, the key word is converted into pinyin, and the first letter of the pinyin is used as the first safety information.
4. The method of claim 2, wherein the migration data comprises a plurality of child data;
generating second safety information according to the data size, the migration starting time and the migration finishing time, wherein the steps of:
acquiring subdata in the migration data;
and acquiring the data size, the migration starting time and the migration finishing time of each subdata, and generating second safety information according to the data size, the migration starting time and the migration finishing time of each subdata.
5. The method of claim 4, after obtaining the migration start time and the migration completion time of the sub data, further comprising:
and performing conversion processing on the migration starting time and the migration finishing time to obtain conversion values of the migration starting time and the migration finishing time.
6. The method of claim 5, wherein generating second security information according to the data size, the migration start time, and the migration completion time of each of the sub-data comprises:
wherein, M represents the second security information, Dx represents the conversion value of the xth sub-data size, S2 represents the conversion value of the migration completion time of the sub-data, S1 represents the conversion value of the migration start time of the sub-data, N, u, N, K all represent the total number of the sub-data, and Wl is the conversion values of the migration start time and the migration completion time.
7. The method of claim 1, further comprising, after the locking the migrated data based on the security information:
and sending the safety information to a preset terminal for storage.
8. A secure migration apparatus for data, comprising:
the transfer module is used for establishing a transfer path of the transfer data according to the initial position and the destination position and transferring the transfer data to the destination position;
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a data name, a data size, migration starting time and migration finishing time of migration data and generating safety information according to the data name, the data size, the migration starting time, the migration finishing time and a preset strategy;
and the locking module is used for locking the migrated data based on the safety information.
9. A secure data migration apparatus, comprising: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of any of claims 1 to 7.
10. A readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111581676.0A CN114398005B (en) | 2021-12-22 | 2021-12-22 | Data security migration method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111581676.0A CN114398005B (en) | 2021-12-22 | 2021-12-22 | Data security migration method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114398005A true CN114398005A (en) | 2022-04-26 |
CN114398005B CN114398005B (en) | 2024-08-13 |
Family
ID=81226131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111581676.0A Active CN114398005B (en) | 2021-12-22 | 2021-12-22 | Data security migration method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114398005B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060288048A1 (en) * | 2005-06-15 | 2006-12-21 | Toshiki Kamohara | Storage system and storage system data migration method |
US20080201542A1 (en) * | 2007-02-16 | 2008-08-21 | Tetsuya Maruyama | Data migrating method taking end time into consideration |
CN101945131A (en) * | 2010-09-16 | 2011-01-12 | 华中科技大学 | Storage virtualization-based data migration method |
CN202663444U (en) * | 2012-06-29 | 2013-01-09 | 上海海事大学 | Cloud safety data migration model |
JP2013041526A (en) * | 2011-08-19 | 2013-02-28 | Pfu Ltd | Information processing device, and generation method and program for data migration tool |
CN106855871A (en) * | 2015-12-09 | 2017-06-16 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus of Data Migration |
CN106953893A (en) * | 2017-02-15 | 2017-07-14 | 北京百度网讯科技有限公司 | Data Migration between cloud storage system |
CN107643880A (en) * | 2017-09-27 | 2018-01-30 | 郑州云海信息技术有限公司 | The method and device of file data migration based on distributed file system |
CN109450997A (en) * | 2018-10-26 | 2019-03-08 | 平安科技(深圳)有限公司 | Data cross-terminal moving method, device, computer equipment and storage medium |
CN109933287A (en) * | 2019-03-05 | 2019-06-25 | 中国联合网络通信集团有限公司 | Data migration method, device and equipment based on Internet of Things |
CN110928860A (en) * | 2019-11-27 | 2020-03-27 | 中国银行股份有限公司 | Data migration method and device |
-
2021
- 2021-12-22 CN CN202111581676.0A patent/CN114398005B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060288048A1 (en) * | 2005-06-15 | 2006-12-21 | Toshiki Kamohara | Storage system and storage system data migration method |
US20080201542A1 (en) * | 2007-02-16 | 2008-08-21 | Tetsuya Maruyama | Data migrating method taking end time into consideration |
CN101945131A (en) * | 2010-09-16 | 2011-01-12 | 华中科技大学 | Storage virtualization-based data migration method |
JP2013041526A (en) * | 2011-08-19 | 2013-02-28 | Pfu Ltd | Information processing device, and generation method and program for data migration tool |
CN202663444U (en) * | 2012-06-29 | 2013-01-09 | 上海海事大学 | Cloud safety data migration model |
CN106855871A (en) * | 2015-12-09 | 2017-06-16 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus of Data Migration |
CN106953893A (en) * | 2017-02-15 | 2017-07-14 | 北京百度网讯科技有限公司 | Data Migration between cloud storage system |
CN107643880A (en) * | 2017-09-27 | 2018-01-30 | 郑州云海信息技术有限公司 | The method and device of file data migration based on distributed file system |
CN109450997A (en) * | 2018-10-26 | 2019-03-08 | 平安科技(深圳)有限公司 | Data cross-terminal moving method, device, computer equipment and storage medium |
CN109933287A (en) * | 2019-03-05 | 2019-06-25 | 中国联合网络通信集团有限公司 | Data migration method, device and equipment based on Internet of Things |
CN110928860A (en) * | 2019-11-27 | 2020-03-27 | 中国银行股份有限公司 | Data migration method and device |
Also Published As
Publication number | Publication date |
---|---|
CN114398005B (en) | 2024-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2798561B1 (en) | Biometric cloud communication and data movement | |
US20070208826A1 (en) | System and method of storing data files at a remote storage facility | |
US8600970B2 (en) | Server-side search of email attachments | |
CN103942292A (en) | Virtual machine mirror image document processing method, device and system | |
CN106156755A (en) | Similarity calculating method in a kind of recognition of face and system | |
TW201033900A (en) | Methods and systems for power consumption management of a pattern-recognition processor | |
CN111163072B (en) | Method and device for determining characteristic value in machine learning model and electronic equipment | |
WO2015139539A1 (en) | Video information push method and device | |
US20170199889A1 (en) | Method and device for identifying junk picture files | |
US10902018B2 (en) | Synchronizing in-use source data and an unmodified migrated copy thereof | |
CN111259282A (en) | URL duplicate removal method and device, electronic equipment and computer readable storage medium | |
CN112416858A (en) | Document storage method and device, electronic equipment and computer readable storage medium | |
WO2016206389A1 (en) | Url matching method and apparatus | |
CN110352410A (en) | Track the access module and preextraction index node of index node | |
CN101917438A (en) | Access control method and system in network communication system | |
CN113810375B (en) | Webshell detection method, device and equipment and readable storage medium | |
US9785724B2 (en) | Secondary queue for index process | |
CN106484691A (en) | The date storage method of mobile terminal and device | |
CN114398005A (en) | Data secure migration method and device and storage medium | |
CN110147531B (en) | Method, device and storage medium for identifying similar text content | |
CN112799872A (en) | Erasure code encoding method and device based on key value pair storage system | |
CN103827854A (en) | Search method and information management device | |
US10311087B1 (en) | Systems and methods for determining topics of data artifacts | |
US10061815B1 (en) | Systems and methods for displaying search results | |
CN112181863B (en) | Page recycling method, device, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 210 Liangjing Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Applicant after: Shanghai Jinshida Software Technology Co.,Ltd. Address before: 210 Liangjing Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Applicant before: Shanghai Kingstar Software Technology Co.,Ltd. Country or region before: China |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |