CN114594916B - Enterprise file storage management method and device, electronic equipment and storage medium - Google Patents

Enterprise file storage management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114594916B
CN114594916B CN202210272777.8A CN202210272777A CN114594916B CN 114594916 B CN114594916 B CN 114594916B CN 202210272777 A CN202210272777 A CN 202210272777A CN 114594916 B CN114594916 B CN 114594916B
Authority
CN
China
Prior art keywords
disk
file data
information
self
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210272777.8A
Other languages
Chinese (zh)
Other versions
CN114594916A (en
Inventor
袁帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Trilobite Information Technology Co ltd
Original Assignee
Shanxi Trilobite Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Trilobite Information Technology Co ltd filed Critical Shanxi Trilobite Information Technology Co ltd
Priority to CN202210272777.8A priority Critical patent/CN114594916B/en
Publication of CN114594916A publication Critical patent/CN114594916A/en
Application granted granted Critical
Publication of CN114594916B publication Critical patent/CN114594916B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The present application relates to the field of data storage, and in particular, to a method and apparatus for managing enterprise file storage, an electronic device, and a storage medium. The method comprises the following steps: obtaining disk information of a storage server and disk dividing information input by a user; dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information; acquiring IP address information of at least one employee side electronic device, and respectively mounting the self-use disc information into each electronic device according to the IP address information; and acquiring file data stored in the self-service disk by the user in the electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk. The application has the effect of improving the security of enterprise file data.

Description

Enterprise file storage management method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data storage, and in particular, to a method and apparatus for managing enterprise file storage, an electronic device, and a storage medium.
Background
A File server (File server), also known as an archive server, refers to a File storage device that is accessible to all users in a computer network environment. The file server is responsible for centrally storing and managing data files, allowing users to share information over a network without the need for physical transmission of information through floppy disks or other external storage devices, while other computers connected to the same network as the file server may also access files stored within the file server.
The access of important or related files of the enterprise by using the file server becomes a popular trend of medium and large enterprises, all departments in the enterprise encrypt and store the important files or the related files in the file server, and an enterprise manager can perform operations such as reading, writing, checking and the like according to the related files stored in the file server, so that unified management is facilitated.
The Leucavirus is a virus file, after the Leucavirus file is opened by a user, the Leucavirus traverses a series of files such as office documents, pictures and the like in all local magnetic disks, the formats of the files are tampered, the files are completely encrypted, and after encryption, most enterprises can only "redeem" the files by cracking keys or paying "redemption" to obtain keys, so that serious loss is caused to the enterprises.
However, when an enterprise builds a file server, the enterprise is often directly built on a computer host, all files are stored on one computer host, even if the files are backed up in a local system, the files can be found by the lux virus, and the security of the enterprise files is greatly threatened.
Disclosure of Invention
In order to improve the security of enterprise file storage, the application provides an enterprise file storage management method, an enterprise file storage management device, electronic equipment and a storage medium.
In a first aspect, the present application provides an enterprise file storage management method, which adopts the following technical scheme:
an enterprise file storage management method, comprising:
obtaining disk information of a storage server and disk dividing information input by a user;
dividing the disk information of the storage server into self-service disk information and spare disk information according to the disk information and the disk dividing information;
acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disk information into each electronic device according to the IP address information;
and acquiring file data to be stored in a self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk.
By adopting the technical scheme, the disk of the storage server is divided into the self-service disk and the standby disk according to the disk information of the storage server and the disk dividing information input by the user, the self-service disk is mounted on the electronic equipment of the staff side of the enterprise, after mounting, the electronic equipment side of the staff is provided with the condition for checking the information data in the self-service disk, and after mounting, if the staff stores the file data in the electronic equipment into the self-service disk, the file data is stored in the standby disk at the same time, the data in the self-service disk and the data in the standby disk are stored under the system of the storage server, when the Leucasian virus is infringed, the data in the standby disk is difficult to infringed by the Leucasian virus, and after the enterprise file is lost, the possibility of losing the file data of the enterprise can be reduced, and the safety of the file data of the enterprise is further improved.
In one possible implementation manner, the saving the file data into the spare disk and saving the file data into the spare disk simultaneously include:
the file data are stored in a preset solid state disk in advance;
acquiring an initial timing moment;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value, if so, acquiring all file data in the solid state disk, and then storing all the file data into the self-service disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the initial timing time begins to count.
By adopting the technical scheme, when the file data is stored, the file data is firstly stored in the solid state disk, and the file data in the solid state disk is stored in the self-use disk and the standby disk after time intervals of a preset time threshold value, so that the speed of storing the file data is improved.
In one possible implementation manner, the saving the file data into the spare disk and saving the file data into the spare disk simultaneously include:
And compressing the file data and storing the compressed file data into the self-service disk and the standby disk.
By adopting the technical scheme, when the file data is stored, the file data is compressed at first, and the compressed file data is stored in the self-service disk and the standby disk, so that the memory occupation of the storage server is reduced, and the memory utilization rate of the storage server is improved.
In one possible implementation manner, the storing the file data in the spare disk and simultaneously storing the file data in the spare disk further include:
acquiring position information corresponding to each employee respectively;
determining authority information corresponding to each piece of position information according to each piece of position information, wherein the authority information comprises a manageable catalog and usable operations;
according to the manageable catalogue, controlling each employee-side electronic device to display the catalogue of the corresponding self-use disk;
and setting the operation authority of each staff-side electronic device to the catalogue according to the usable operation.
By adopting the technical scheme, the operation authority of each employee to the information in the own disc and the part or all of catalogues in the viewable own disc are determined according to the positions of each employee, the operation of each employee to the own disc is limited, the possibility of data disclosure is reduced, and meanwhile the probability of deleting data by mistake is reduced.
In one possible implementation manner, the storing the file data in the spare disk and simultaneously storing the file data in the spare disk further include:
acquiring source information of each file data;
determining the security level of all the file data according to each source information;
determining abnormal file data according to all the file data and the security level thereof;
when a virus attack signal is obtained, feeding the abnormal file data and the corresponding security level back to the electronic equipment corresponding to the manager of the storage server;
the abnormal file data are data with low security level.
By adopting the technical scheme, the security level of each file data is determined according to the source information of each file data stored in the own disk, the file data with low security level is used as the abnormal file data, and when a virus attack signal is acquired, the abnormal file data and the corresponding security level are fed back to the electronic equipment of the manager so as to prompt the manager to perform virus searching and killing operation on the abnormal file data, and the probability that the virus file exists after the data is restored is reduced.
In one possible implementation manner, when the virus attack signal is obtained, the feeding back the abnormal file data and the corresponding security level thereof to the electronic device corresponding to the manager of the storage server includes:
when a virus attack signal is acquired, acquiring the current moment;
determining a period to be checked according to the current time;
acquiring all abnormal file data in the period to be checked;
feeding back all the abnormal file data in the period to be checked and the security level corresponding to the abnormal file data to the electronic equipment corresponding to the manager of the storage server;
the period to be checked is a period corresponding to a preset date range before the current time.
By adopting the technical scheme, after the virus attack, all abnormal file data in the period to be checked in the preset date range before the virus attack are fed back to the electronic equipment of the manager so as to check the abnormal file data close to the virus attack date, thereby reducing the number of file data for checking the virus of the data in the self-service disk and improving the efficiency of checking the virus.
In one possible implementation manner, the storing the file data in the spare disk and simultaneously storing the file data in the spare disk further include:
Acquiring all file data stored in a standby disk;
and uploading the file data to a cloud server.
By adopting the technical scheme, the file data in the standby disk are all uploaded to the cloud server, and are stored in the cloud server, so that a protection layer of the file data is added, and the security of the enterprise file data is further improved.
In a second aspect, the present application provides an enterprise file storage management apparatus, which adopts the following technical scheme:
an enterprise file storage management apparatus may include: the system comprises a first acquisition module, a disk dividing module, a second acquisition module and a file data storage module, wherein:
the first acquisition module is used for acquiring disk information of the storage server and disk dividing information input by a user;
the disk dividing module is used for dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
the second acquisition module is used for acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disc information into each electronic device according to the IP address information;
And the file data storage module is used for acquiring file data to be stored in the self-use disk from the employee side electronic equipment, storing the file data in the self-use disk, and simultaneously storing the file data in the standby disk.
By adopting the technical scheme, the disk dividing module divides the disk of the storage server into the self-service disk and the standby disk according to the disk information of the storage server acquired by the first acquisition module and the disk dividing information input by the user, the self-service disk is mounted on the electronic equipment of the enterprise employee by the second acquisition module, after mounting, the electronic equipment of the employee is provided with the condition for checking the information data in the self-service disk, and after mounting, the file data storage module stores the file data in the standby disk when the file data is stored in the electronic equipment of the employee into the self-service disk, the data in the self-service disk and the data in the standby disk are stored under the system of the storage server, when the file data is infringed by the Leuch virus, the possibility of losing the file data of the enterprise is reduced, and the safety of the file data of the enterprise is further improved.
In one possible implementation manner, the file data storage module is specifically configured to, when storing the file data in the spare disk while storing the file data in the spare disk:
The file data are stored in a preset solid state disk in advance;
acquiring an initial timing moment;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value, if so, acquiring all file data in the solid state disk, and then storing all the file data into the self-service disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the initial timing time begins to count.
In one possible implementation manner, the file data storage module is specifically configured to, when storing the file data in the spare disk while storing the file data in the spare disk:
and compressing the file data and storing the compressed file data into the self-service disk and the standby disk.
In one possible implementation, the apparatus further includes:
the job position acquisition module is used for acquiring job position information corresponding to each employee respectively;
the permission determining module is used for determining permission information corresponding to each piece of position information according to each piece of position information, and the permission information comprises a manageable catalog and usable operations;
The permission setting module is used for controlling each employee side electronic device to display the corresponding directory of the own disc according to the manageable directory;
the permission setting module is also used for setting the operation permission of each employee-side electronic device to the catalogue according to the usable operation.
In one possible implementation, the apparatus further includes:
the source acquisition module is used for acquiring source information of each file data;
the security level determining module is used for determining the security level of all the file data according to each source information;
the abnormal file determining module is used for determining abnormal file data according to all the file data and the security level thereof;
the feedback module is used for feeding the abnormal file data and the corresponding security level back to the electronic equipment corresponding to the manager of the storage server when the virus attack signal is acquired;
the abnormal file data are data with low security level.
In one possible implementation manner, when the feedback module feeds back the abnormal file data and the corresponding security level thereof to the electronic device corresponding to the manager of the storage server when the virus attack signal is acquired, the feedback module is specifically configured to:
When a virus attack signal is acquired, acquiring the current moment;
determining a period to be checked according to the current time;
acquiring all abnormal file data in the period to be checked;
feeding back all the abnormal file data in the period to be checked and the security level corresponding to the abnormal file data to the electronic equipment corresponding to the manager of the storage server;
the period to be checked is a period corresponding to a preset date range before the current time.
In one possible implementation, the apparatus further includes:
the third acquisition module is used for acquiring file data stored in the standby disk;
and the backup uploading module is used for uploading the file data to a cloud server.
In a third aspect, the present application provides an electronic device, which adopts the following technical scheme:
an electronic device, the electronic device comprising:
at least one processor;
a memory;
at least one application program, wherein the at least one application program is stored in the memory and configured to be executed by the at least one processor, the at least one application program configured to: and executing the method for managing the enterprise file storage.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
A computer-readable storage medium, comprising: a computer program capable of being loaded by a processor and executing the above-described enterprise file storage management method is stored.
In summary, the application has the following beneficial technical effects:
according to the disk information of the storage server and the disk dividing information input by a user, the disk of the storage server is divided into a self-service disk and a standby disk, the self-service disk is mounted on electronic equipment of an enterprise employee side, after mounting, the electronic equipment side of the employee side has the condition for checking information data in the self-service disk, and after mounting, if the employee stores file data in the electronic equipment into the self-service disk, the file data is stored in the standby disk, the data in the self-service disk and the data in the standby disk are stored in a system of the storage server, when the Leuch virus is infringed, the data in the standby disk is difficult to be infringed by the Leuch virus, the possibility of losing the file data of the enterprise is reduced, and the safety of the file data of the enterprise is further improved.
And determining the operation authority of each employee on the information in the own disc and part or all catalogues in the viewable own disc according to the position of each employee, limiting the operation of each employee on the own disc, reducing the possibility of data disclosure and simultaneously reducing the probability of deleting data by mistake.
Drawings
FIG. 1 is a flow chart of an enterprise file storage management method according to an embodiment of the present application;
FIG. 2 is a block diagram of an enterprise file storage management apparatus according to an embodiment of the present application;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to fig. 1-3.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In order to prevent the situation that most of file data of an enterprise are lost due to the Leucovirus or other human misoperation, the embodiment of the application designs a storage server, wherein the storage server is connected with computers and other electronic devices in the same area network in the enterprise, and the storage server adopts a FreeBSD system for storing the files of the enterprise.
The embodiment of the application provides an enterprise file storage management method, referring to fig. 1, which is executed by a storage server, and comprises the following steps:
step S101, disk information of a storage server and disk dividing information input by a user are acquired.
Step S102, dividing the disk information of the storage server into the self-use disk information and the standby disk information according to the disk information and the disk dividing information.
Specifically, the disk information is disk capacity information in a server, including total disk capacity and disk usage capacity, a preset storage system is installed in the storage server, and the storage server automatically reads the total disk capacity and the disk usage capacity to obtain the disk information.
After the storage system is installed in the storage server, a user can enter a disk division interface through a webpage, a disk division operation is performed on the disk division interface, the disk division interface displays disk information of the storage server, namely, the total capacity and the use capacity of the disk of the storage server are displayed, the user can input the disk division information on the disk division interface according to the displayed disk capacity and own requirements, and the storage server divides the disk into sub-disks according to the disk division information; the sub disk information comprises sub disk number information and sub disk capacity information, the storage server determines the number of the sub disks after division according to the sub disk number information, and determines the capacity of the sub disks after division according to the sub disk capacity information.
And determining a self-use disk and a standby disk according to each divided sub disk, wherein the self-use disk is used for directly storing enterprise files by a user, and the standby disk is used for backing up the stored enterprise files to generate backup files.
The disk of the storage server may be divided into two sub disks or may be a plurality of sub disks, the capacities of the sub disks may be the same or different, the division of the disks is performed according to different demands of users, and it is determined which of the disks are spare disks, for example, when the storage capacity demand of an enterprise user is greater, the disk is divided into two sub disks, the first sub disk is used for storing daily files, the capacity of the first sub disk occupies 80% of the total capacity, the second sub disk is only used for backing up important files, and the capacity of the second sub disk occupies 20% of the total capacity.
After the self-service disc and the standby disc are determined, the self-service disc and the standby disc correspond to each other, and files in the self-service disc are backed up to the corresponding standby disc, for example, the disc is divided into 2 sub-discs, one of the two sub-discs is the self-service disc, the other is the standby disc, the self-service disc corresponds to the standby disc, and the files in the self-service disc are backed up to the standby disc; if the disk is divided into 5 sub disks, if one sub disk is a spare disk, the remaining four sub disks are all spare disks, the spare disks correspond to the spare disks, if one sub disk is a spare disk, the four sub disks are the spare disks, and the data in the four spare disks are backed up to one spare disk; if the disk is divided into 4 sub-disks, two sub-disks are all used disks, the remaining two sub-disks are standby disks, each used disk corresponds to each standby disk one by one, and the data of the used disk is backed up into the corresponding standby disk.
For convenience of explanation, in the embodiment of the present application, a spare disc and a spare disc are described as an example, where the spare disc and the spare disc correspond.
The self-used disk and the standby disk are attributed to the same disk array, a built-in raid tool can be adopted in a dividing mode, and the self-used disk and the standby disk form a mirrored disk array by utilizing the raid1 mirrored disk array technology and pointing the data of the self-used disk to the position of the standby disk at the same position; when the user saves the enterprise file, the file data written in the self-use disk is copied to the standby disk in a percentile mode, and the percentile storage is realized on the data in the self-use disk.
When the data is read, the data in the spare disk is read first, the data in the spare disk is not read, and when the data in the spare disk is read failure, the data in the spare disk is read automatically.
Step S103, IP address information of at least one employee side electronic device is obtained, and the self-used disc information is respectively mounted in each electronic device according to the IP address information.
Specifically, a plurality of computers are configured in the enterprise, each employee corresponds to one computer, and the computer used by the employee is employee-side electronic equipment; the IP address information is the IP address of the employee computer, and the IP address information of each computer corresponds to one computer one by one.
The self-service disk is mounted on a computer system of an enterprise employee side, information of the self-service disk is displayed on a computer of a user, the user can check all files stored in the self-service disk after entering the self-service disk, and the user can save the files into the self-service disk through the self-service disk to realize sharing.
The mounting refers to a process that the operating system enables files and catalogues on a storage device to be accessed by a user through a computer file system, namely after a self-used disk of a storage server is mounted in the computer system of the user, a new shared disk is added on the computer of the user compared with a disk before mounting, the shared disk is the self-used disk, and the catalogues of the self-used disk and the files in the self-used disk can be used for the user to perform reading and writing operations in the computer file system.
Step S104, file data to be stored in the self-service disk is obtained from the employee side electronic equipment, the file data is stored in the self-service disk, and meanwhile the file data is stored in the standby disk.
Specifically, the user accesses the directory of the own disk displayed in the computer system through the original computer system, enters the corresponding directory of the own disk, can access the data of the enterprise files under the corresponding directory, can access the corresponding folders under the directory, saves the files to be saved to the corresponding directory to be saved, and the storage server saves the user to the own disk and simultaneously obtains the file data saved by the user.
Under the corresponding path of storing the acquired file data in the storage server, the self-service disk and the standby disk are mirror image disk arrays, so that when the file data is stored in the self-service disk, the file data is stored in the standby disk, finally the file data which an enterprise wants to store is stored in the storage server, two disks are stored separately, the data stored in the two disks are identical, and the standby disk plays a role in real-time backup.
When the lux virus appears, the lux virus traverses all local files in a windows system, but the data in the standby disk is still stored in a storage server, the storage server system is a FreeBSD system, and 90% of lux viruses can only operate in the windows system, so that the lux virus is difficult to traverse the system in the storage server, namely, the file data in the standby disk is difficult to lux.
After the lux viruses access all local files stored locally and files mounted in a self-service disk under the system, the data in the standby disk cannot be scanned by the lux viruses, and after the lux viruses invade, the data in the standby disk can be recovered by utilizing the file data in the standby disk, so that the security of enterprise file storage is improved.
The embodiment of the application provides an enterprise file storage management method, wherein a disk in a server is divided into two disks, one is a self-service disk, the other is a standby disk, the self-service disk and the standby disk are divided into a disk array by utilizing a raid tool, the self-service disk is mounted on a computer of an enterprise, when an enterprise user stores files, the files are stored in the self-service disk, the files are simultaneously and automatically stored to the standby disk, backup is realized, if the computer is infringed by a Leuch virus, the Leuch virus can only access data in a local disk of the enterprise computer, the files in the local disk are encrypted, the enterprise user can recover the data in the self-service disk and the standby disk, and the security of enterprise file storage is improved.
In step S104, storing the file data in the own disc and storing the file data in the corresponding spare disc simultaneously includes:
step S41a (not shown in the figure) stores the file data in advance in a preset solid state disk.
Specifically, the solid state disk is installed on the storage server, and the solid state disk is a storage device using the flash memory as a permanent memory, and has higher read-write speed compared with the traditional mechanical hard disk, so that when storing file data, the file data is directly stored in a storage space corresponding to the solid state disk, and the storage server has higher read-write speed when storing the file data.
The traditional mechanical hard disk comprises a motor, disk surfaces and magnetic heads, wherein the front side and the back side of each disk surface can store data, each disk surface corresponds to one magnetic head, the magnetic heads are used for reading and writing, all the magnetic heads are connected to a shared magnetic wall, when the magnetic arms move, all the magnetic heads do the same motion, the disk surfaces rotate continuously, the magnetic heads realize the operation of reading and writing data on the disk surfaces, and because the access speed of the magnetic disks during reading and writing data depends on the rotation speed of the magnetic disks and the position of the magnetic heads during the initial access, the magnetic heads need to be moved to the required track positions, the speed of the mechanical hard disk during reading and writing data is greatly influenced by seek and rotation delay, the linear motion of the magnetic wall and the rotation motion of the magnetic disks are both mechanical motion, and the reading and writing speed of the mechanical hard disk is greatly limited.
The solid state disk is used as a storage medium which does not adopt mechanical movement, adopts a disk constructed by the storage medium which is the same as or similar to a memory, and consists of a control unit and a storage unit, wherein the storage unit comprises a flash memory chip and a DRAM chip, and when reading and writing file data, the data storage is realized by utilizing an electric signal, so that the time influence of seek and rotation delay is reduced, and the reading and writing speed is improved.
Step S42a (not shown), acquiring an initial timing; starting timing from the initial timing moment to generate time information; and judging whether the time information is equal to a preset time threshold, if so, acquiring all file data in the solid state disk, and then storing all file data into the self-service disk and the standby disk.
Step S43a (not shown), taking the time when the time information is equal to the preset time threshold as the next timing time; the time information is reset to zero.
The steps S42a and S43a are executed in a loop with the next time as the initial time.
Specifically, after the solid state disk is installed on the storage server, the storage server regularly acquires data stored in the solid state disk, and stores all file data stored in the solid state disk into the self-use disk and simultaneously into the standby disk.
The initial timing time is the time when the solid state disk is installed and starts to be normally used; starting to count by the initial counting time to generate time information, when the time information is equal to a preset time threshold value, acquiring all file data stored in the solid state disk, storing all file data stored in the solid state disk into the self-service disk and the standby disk, resetting the counting, taking the time when the time information is equal to the preset time threshold value as the initial counting time, restarting to count, generating the time information, and continuously cycling until the storage space of the solid state disk is full.
When the file data of the user system is stored, the file data is firstly stored in the solid state disk, the reading and writing speed is accelerated, and when the data in the solid state disk is transferred to the self-use disk and the standby disk, the speed is correspondingly accelerated, and the solid state disk is used as a buffer disk, so that the effect of accelerating the storage speed is achieved.
Further, when the time information reaches the preset time threshold value, all file data in the solid state disk are required to be stored in the self-service disk and the standby disk, so that a lot of unnecessary waste of storage bandwidth is increased, and in order to improve the storage speed, when the time information reaches the preset time threshold value for the first time, all current file data are recorded; when each file data is stored, the storage time of each file data is recorded together, when each time of time information reaches a preset time threshold value, only the file data with the storage time in the current time period is acquired, and all the file data in the current time period are stored in the spare disk and the spare disk, so that the storage speed is improved.
In step S104, storing the file data in the own disc and storing the file data in the corresponding spare disc includes:
And compressing the file data and storing the compressed file data into the self-use disk and the standby disk.
When the file data is stored in the self-service disk and the standby disk from the computer system of the user, the file data is compressed first and then stored in the self-service disk and the standby disk, and compared with direct storage, the disk capacity in the self-service disk and the standby disk is saved in a mode of storing after compression, so that the service lives of the self-service disk and the standby disk are prolonged.
The file data in the computer is stored in a binary form, and the computer marks the same character string in the binary information of the file data with a special character and stores the same character string, so that the storage position of the same character string is reduced, and the file data is compressed.
One possible implementation manner of the embodiment of the present application further includes, after step S104:
step Sa1 (not shown in the figure) acquires position information corresponding to each employee.
Step Sa2 (not shown in the figure), determining authority information corresponding to each piece of position information according to each piece of position information, wherein the authority information comprises a manageable directory and a usable operation.
Step Sa3 (not shown in the figure) controls the device at each employee side to display the directory of the corresponding own disc according to the manageable directory.
Step Sa4 (not shown in the figure) sets the operation authority of the device on each employee side to the directory according to the usable operation.
In particular, most of the document data stored in the enterprise come from confidential or non-confidential documents generated by various staff of the enterprise in the actual life process, such as financial reports, invoices, contracts, technical documents, customer data and the like, and the document data are not only stored in an enterprise management layer, but also need to be stored and uploaded by other staff of the enterprise.
Therefore, the self-service disk is shared to the staff end according to the needs of enterprises, and the sharing mode can be SMB (Server Message Block) mode, ISCSI (Internet Small Computer System) protocol setting mode or NFS (Network File System ) sharing mode. After the self-service disk is shared to the staff end, the staff can see the shared disk on the computer, and then the operation of reading file data is carried out through the disk.
The permission refers to the operation limit of staff on files under the directory of the self-service disk, and comprises manageable directories and usable operations; the manageable catalog characterizes that a user can only check files under the manageable catalog and can only read file data under the manageable catalog; operations may be used to characterize operations that may only be used by the employee. For example: the highest management layer of the company can perform operations such as adding (uploading/saving), deleting (deleting), changing (modifying), reading (reading) and the like on all directories in the self-use disc and all files under all the directories; the basic staff can only read and upload the files in one of the folders under the directory.
The corresponding authorities are respectively set for staff of different positions and departments, so that the risk of secret document disclosure can be reduced, the probability of the staff deleting the secret document by mistake can be reduced, and the function of protecting enterprise documents is achieved.
Specifically, the position information is divided into departments and management levels in the enterprise, and the enterprise determines and inputs the position information by itself; illustrating: the enterprises comprise administrative departments, technical departments, manpower departments, market departments, financial departments and the like, and each level of administrative departments is divided into each level of administrative departments and each level of basic staff, and the job information comprises each department and the job division under each department.
When dividing rights for position information, firstly determining directory rights according to departments in the position information, namely: the method comprises the steps of firstly dividing the folder catalogs in the self-service disk, dividing the catalogs corresponding to each department, wherein the departments correspond to the catalogs one by one, and taking the catalogs corresponding to the departments in the self-service disk as manageable catalogs of the departments, namely determining the catalogs authority corresponding to the departments.
Illustrating: the enterprise comprises six departments of administrative, technical, manpower, market, finance and management layers, the catalog of the self-service disc comprises 8 folders of administrative 1, administrative 2, technical 1, technical 2, technical 3, manpower 1, market 1 and finance under the catalog of the self-service disc, and the catalog corresponding to the administrative departments is combined into administrative 1 and administrative 2; the catalogue combinations corresponding to the technical departments are technology 1, technology 2 and technology 3; the catalogue combination corresponding to the manpower department is manpower 1; the catalogs corresponding to market departments are combined into a market 1; the directory combination corresponding to the financial department is finance 1; the directory combination corresponding to the management layer is all folders composed of administrative 1, administrative 2, technology 1, technology 2, technology 3, manpower 1, market 1 and finance 1; all staff of the administrative department can only see the folders of the administrative department 1 and the administrative department 2 at the staff end, other folders are in a hidden state at the staff end of the administrative department, and the staff of the administrative department can only correspondingly operate the two folders of the administrative department 1 and the administrative department 2.
After the manageable catalogues of all departments are determined, the usable operation corresponding to each employee is determined as the operation authority according to the position allocation under the departments.
The method for determining the operation authority can be respectively determining the operations according to the levels, for example, four operations are opened at the highest level of the department, three operations are opened at the second level, two operations are opened at the third level, and one operation is opened at the fourth level; the method can also comprise four operations of adding, deleting and modifying for all manager under the department, and comprises two operations of adding and reading for all base staff under the department.
After the directory authority and the operation authority are determined, the authority setting of each employee is completed, and the following examples are: if the staff A is a manager of the administrative department and the staff B is a basic staff of the market department, the staff A can perform the operations of adding, deleting, reading and modifying all files under the directory of the two folders of the administrative 1 and the administrative 2; and the staff B can upload and download the files in the directory of the folder in the market 1. Therefore, staff only operate the files of the corresponding departments, the possibility that the files of other departments are tampered or confidential files are divulged is reduced, the operation authority of basic staff is limited, and the probability that the staff mistakenly changes and mistakenly deletes the original files is reduced.
One possible implementation manner of the embodiment of the present application further includes, after step S104:
step Sb1 (not shown), acquiring source information of each file data.
Step Sb2 (not shown), the security level of all the file data is determined based on each source information.
Step Sb3 (not shown in the figure), abnormal file data is determined from all file data and the security level thereof.
Step Sb4 (not shown in the figure), when the virus attack signal is obtained, the abnormal file data and the corresponding security level thereof are fed back to the electronic device corresponding to the manager of the storage server.
The abnormal file data is data with low security level.
Specifically, most of file data stored by staff ends are from webpage downloading, storage medium transmission, application software downloading and the like; viruses are usually originally sourced from files downloaded from a webpage, if staff carelessly downloads the virus files in the webpage, the possibility of damage to other files is increased, if staff unknowingly stores the virus files under the catalogue of the self-service disk, the virus files are hidden in the self-service disk and the standby disk, although the Lesu virus is difficult to attack the files under the system of a storage server, after the data is restored by using the standby disk, the virus files are stored in the system of an enterprise terminal, the files are damaged again, and secondary damage is caused to the enterprise, so that after the virus attack exists, the virus files need to be thoroughly cleaned and killed to reduce the damage to the enterprise.
The security level characterizes the security degree of the file and comprises a first level, a second level and a third level; the security level corresponding to the first level is highest, and the security level corresponding to the third level is lowest. The abnormal file data are file data with the security level being three-level corresponding to the security level.
When the file is saved in the self-service disk, the storage server firstly acquires the file source of the file, wherein the file source refers to the downloading source of the file, and after the downloading source is determined, the security level of the file is determined according to the downloading source.
When the file is initially stored to the local place by the webpage, the computer at the staff end accesses the link address of the file when the file is cached to the memory, and then the computer monitors the data flow when the file is stored, and marks the link address in the corresponding file; when a file is saved to the disk, the storage server will acquire the link address of the file as the file source of the file.
Judging the safety degree of the file by judging the source of the file when the source of the file is obtained, and marking the file as three stages when the file is sourced from a website with low safety level; when a file originates from an official website, marking the file as secondary; when the file is sourced from an internal website of a company, marking the file as a first level; after tagging, if the employee propagates the tagged file through the network or through third party software (e.g., QQ), the original file download source, i.e., the link tag at the time of download on the website, will be preserved. After the security level of the file is marked, the file is stored in the spare disk as well as the spare disk.
The virus attack signal is a signal sent by the virus when invading the computer system where the manager is located, and can be obtained by the storage server after the virus invades and when entering the storage server for data recovery. When the Leucasian virus or other viruses invade, the storage server calls the IP address of the pre-stored computer of the management layer, and through the IP address, the files with low security level, namely files marked as three levels, are fed back to the computer of the management layer and displayed in the computer of the management layer, so that the current files of the management layer can be reminded of the viruses, unsafe files can be checked, and the checking and killing operation of the virus files can be performed, so that the secondary influence of the viruses on enterprises can be reduced.
In step Sb4, when a virus attack signal is obtained, the method feeds back abnormal file data and a security level corresponding to the abnormal file data to an electronic device corresponding to a manager of a storage server, including:
step Sb41 (not shown), when a virus attack signal is acquired, acquires the current time.
Step Sb42 (not shown), determining the period to be checked according to the current time.
Step Sb43 (not shown), acquiring all abnormal file data in the period to be checked.
Step Sb44 (not shown in the figure), feeding back all the abnormal file data and the security level corresponding to the abnormal file data in the period to be checked to the electronic device corresponding to the manager of the storage server.
The period to be checked is a period corresponding to a preset date range before the current time.
In particular, the latency period of the virus is relatively short, for example, the occurrence of the Leucavirus is free of any sign, and after the computer is infected with the Leucavirus, the attack is usually completed within one minute or even less, so that when the data stored in an enterprise is checked and killed after the infection, the file data which is too long in past is not required to be checked and killed, for example, file data before one year or file data before half year, and the possibility of the existence of the virus is extremely low. If all the files are checked one by one, a large amount of time is consumed, and files with higher dangers and close dates are not screened preferentially during the checking.
Therefore, in order to improve the efficiency of virus investigation, when a virus attack signal is acquired, acquiring the moment of virus attack as the current moment; and determining a time period of which the date in the abnormal file data is close to the virus attack date according to the virus attack time, namely determining a period to be checked, determining all the abnormal file data in the period to be checked, and feeding back.
When the period to be checked is determined, a date range is preset in the storage server, and according to the date range, a period of time before the current time is determined as the period to be checked by taking the current time as a starting point and taking the date range as a period of time. For example, the current time is 10 in month 4 of 2001: 30, the preset date range is 2 months, and the period to be checked is 10 days of 6 months and 4 days in 2001: 30 to 8/4/10/2001: 30.
after determining the period to be checked, screening file data in the period to be checked from all abnormal file data, and specifically, generating a storage moment when each file data is stored in a storage server; each file data corresponds to one storage time, all file data in the period to be checked can be determined according to the period to be checked and the storage time of each file data, all abnormal file data in the period to be checked are screened out from all file data, all abnormal file data in the period to be checked are fed back to the electronic equipment of a storage server manager, firstly, the abnormal file data in the period to be checked is fed back, the checking of files with higher security level is reduced, and the efficiency of checking virus files is improved.
Further, if the abnormal file data in the period to be checked is checked, it is confirmed that all the abnormal file data in the period to be checked does not contain viruses, and the safety is reliable, then other file data in the period to be checked are fed back, and the other file data refer to non-abnormal file data in all the file data. If all the file data in the period to be checked do not contain the virus file, the file data in other dates are fed back to the electronic equipment of the manager for displaying the virus file to be checked.
Still further, to facilitate validation of the file data, each file data may be ordered. Specifically, each file data corresponds to one storage time, and each file data is ordered according to a preset arrangement rule based on the storage time and the current time corresponding to each file data; the preset arrangement rule is a rule which is orderly arranged according to the sequence from the storage time to the storage time. For example, file a is stored at a time of 1 month and 5 days 10:00, file b is stored at a time of 1 month and 6 days 15:00, and file c is stored at a time of 1 month and 5 days 20:00; the current time is 17:00 of 1 month and 6 days; the file data is ordered as follows: file b, file c, file a.
And the file data is sequenced according to the sequence of storage and then uploaded, so that virus searching and killing operation is facilitated, and the efficiency is improved.
One possible implementation manner of the embodiment of the present application further includes, after step S104:
acquiring all file data stored in a standby disk; and uploading the file data to a cloud server.
Specifically, cloud storage is a virtualized, easily-scalable pool of storage resources. Cloud storage is a third party maintained storage system for enabling remote storage of data rather than storing the data in a local storage device. After the enterprise file is stored in the storage server, if the storage device of the storage server is abnormal, the risk of losing the data exists, so that after the enterprise file is stored in the storage server, the data in the storage server are copied to the cloud server at intervals of a preset copying time interval, and a layer of protection of the enterprise file data is additionally added, and the security of the file data is improved.
The above embodiment describes a method for enterprise file storage management from the perspective of a method flow, and the following embodiment describes an apparatus for enterprise file storage management from the perspective of a virtual module or a virtual unit, and referring to fig. 2, the following embodiment is described in detail.
An enterprise file storage management apparatus 100 may specifically include: a first acquisition module 1001, a disk partition module 1002, a second acquisition module 1003, and a file data storage module 1004, wherein:
a first obtaining module 1001, configured to obtain disc information of a storage server and disc division information input by a user;
the disk dividing module 1002 is configured to divide disk information of the storage server into self-use disk information and spare disk information according to the disk information and the partition information;
a second obtaining module 1003, configured to obtain IP address information of at least one employee side electronic device, and mount the own disc information to each electronic device according to the IP address information;
the file data storage module 1004 is configured to obtain file data to be stored in the free disk from the employee side electronic device, store the file data in the free disk, and store the file data in the spare disk at the same time.
Specifically, the disk dividing module 1002 divides the disk of the storage server into a self-service disk and a standby disk according to the disk information of the storage server acquired by the first acquiring module 1001 and the disk dividing information input by the user, then the self-service disk is mounted on the electronic device of the employee side by the second acquiring module 1003, after mounting, the electronic device side of the employee side is provided with a condition for checking the information data in the self-service disk, and after mounting, the file data storage module 1004 stores the file data in the standby disk when the file data is stored in the employee electronic device into the self-service disk, the data in the self-service disk and the data in the standby disk are stored under the system of the storage server, when the file data is infringed by the file viruses, the possibility of losing the file data of the enterprise is reduced, and the security of the file data of the enterprise is further improved.
In one possible implementation manner of the embodiment of the present application, when the file data storage module 1004 stores file data in the spare disk and simultaneously stores file data in the spare disk, the file data storage module is specifically configured to:
the file data are stored in a preset solid state disk in advance;
acquiring an initial timing moment;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value, if so, acquiring all file data in the solid state disk, and then storing all file data into the self-service disk and the standby disk;
taking the moment when the time information is equal to the preset time threshold value as the next timing moment, and resetting the time information to zero;
and circularly executing the steps after the initial timing time begins to count by taking the next timing time as the initial timing time.
In one possible implementation manner of the embodiment of the present application, when the file data storage module 1004 stores file data in the spare disk and simultaneously stores file data in the spare disk, the file data storage module is specifically configured to:
and compressing the file data and storing the compressed file data into the self-use disk and the standby disk.
In one possible implementation manner of the embodiment of the present application, the apparatus 100 further includes:
The job position acquisition module is used for acquiring job position information corresponding to each employee respectively;
the permission determining module is used for determining permission information corresponding to each piece of position information according to each piece of position information, wherein the permission information comprises a manageable catalog and usable operations;
the permission setting module is used for controlling each employee-side electronic device to display the corresponding directory of the own disc according to the manageable directory;
the permission setting module is also used for setting the operation permission of each employee-side electronic device to the catalogue according to the usable operation.
In one possible implementation manner of the embodiment of the present application, the apparatus 100 further includes:
the source acquisition module is used for acquiring source information of each file data;
the security level determining module is used for determining the security level of all file data according to each source information;
the abnormal file determining module is used for determining abnormal file data according to all the file data and the security level thereof;
the feedback module is used for feeding back the abnormal file data and the corresponding security level thereof to the electronic equipment corresponding to the manager of the storage server when the virus attack signal is acquired;
the abnormal file data is data with low security level.
When a virus attack signal is acquired, a feedback module feeds back abnormal file data and a corresponding security level thereof to an electronic device corresponding to a manager of a storage server, wherein the feedback module is specifically configured to:
when a virus attack signal is acquired, acquiring the current moment;
determining a period to be checked according to the current time;
acquiring all abnormal file data in a period to be checked;
feeding back all the abnormal file data in the period to be checked and the security level corresponding to the abnormal file data to the electronic equipment corresponding to the manager of the storage server;
the period to be checked is a period corresponding to a preset date range before the current time.
In one possible implementation method of the embodiment of the present application, the apparatus 100 further includes:
the third acquisition module is used for acquiring file data stored in the standby disk;
and the backup uploading module is used for uploading the file data to the cloud server.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The embodiment of the present application also describes an electronic device from the perspective of a physical device, as shown in fig. 3, an electronic device 1100 shown in fig. 3 includes: a processor 1101 and a memory 1103. The processor 1101 is coupled to a memory 1103, such as via a bus 1102. Optionally, the electronic device 1100 may also include a transceiver 1104. It should be noted that, in practical applications, the transceiver 1104 is not limited to one, and the structure of the electronic device 1100 is not limited to the embodiment of the present application.
The processor 1101 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor 1101 may also be a combination that performs computing functions, such as a combination comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 1102 may include a path that communicates information between the components. Bus 1102 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect Standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. Bus 1102 may be divided into address bus, data bus, control bus, and the like. For ease of illustration, only one thick line is shown in fig. 3, but not only one bus or one type of bus.
The Memory 1103 may be, but is not limited to, a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory ), a CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 1103 is used for storing application program codes for executing the present application and is controlled to be executed by the processor 1101. The processor 1101 is configured to execute application code stored in the memory 1103 to implement what is shown in the foregoing method embodiment.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations should and are intended to be comprehended within the scope of the present application.

Claims (9)

1. An enterprise file storage management method, comprising:
obtaining disk information of a storage server and disk dividing information input by a user;
dividing the disk information of the storage server into self-service disk information and spare disk information according to the disk information and the disk dividing information;
acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disk information into each electronic device according to the IP address information;
acquiring file data to be stored in a self-service disk from the employee side electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk;
wherein, save the file data to the disk of using oneself, save the file data to the said spare disk at the same time, still include after that:
acquiring source information of each file data;
determining the security level of all the file data according to each source information;
determining abnormal file data according to all the file data and the security level thereof;
when a virus attack signal is obtained, the abnormal file data and the corresponding security level thereof are fed back to the electronic equipment corresponding to the manager of the storage server, so that the manager can check and kill unsafe files;
The abnormal file data are data with low security level.
2. The method of claim 1, wherein storing the file data in the spare disk while storing the file data in the spare disk comprises:
the file data are stored in a preset solid state disk in advance;
acquiring an initial timing moment;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value, if so, acquiring all file data in the solid state disk, and then storing all the file data into the self-service disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the initial timing time begins to count.
3. The method of claim 1, wherein storing the file data in the spare disk while storing the file data in the spare disk comprises:
and compressing the file data and storing the compressed file data into the self-service disk and the standby disk.
4. The method of claim 1, wherein the saving of the file data into the spare disk is performed simultaneously with the saving of the file data into the spare disk, and further comprising:
acquiring position information corresponding to each employee respectively;
determining authority information corresponding to each piece of position information according to each piece of position information, wherein the authority information comprises a manageable catalog and usable operations;
according to the manageable catalogue, controlling each employee side electronic device to display the catalogue of the corresponding self-use disk;
and setting the operation authority of each employee-side electronic device to the catalogue according to the usable operation.
5. The method according to claim 1, wherein feeding back the abnormal file data and the corresponding security level thereof to the electronic device corresponding to the manager of the storage server when the virus attack signal is acquired, comprises:
when a virus attack signal is acquired, acquiring the current moment;
determining a period to be checked according to the current time;
acquiring all abnormal file data in the period to be checked;
feeding back all the abnormal file data in the period to be checked and the security level corresponding to the abnormal file data to the electronic equipment corresponding to the manager of the storage server;
The period to be checked is a period corresponding to a preset date range before the current time.
6. The method of claim 1, wherein the saving of the file data into the spare disk is performed simultaneously with the saving of the file data into the spare disk, and further comprising:
acquiring file data stored in a standby disk;
and uploading the file data to a cloud server.
7. An enterprise file storage management apparatus, comprising:
the first acquisition module is used for acquiring disk information of the storage server and disk dividing information input by a user;
the disk dividing module is used for dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
the second acquisition module is used for acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disc information into each electronic device according to the IP address information;
the file data storage module is used for acquiring file data to be stored in the self-use disk from the employee side electronic equipment, storing the file data in the self-use disk, and simultaneously storing the file data in the standby disk;
The source acquisition module is used for acquiring source information of each file data;
the security level determining module is used for determining the security level of all the file data according to each source information;
the abnormal file determining module is used for determining abnormal file data according to all the file data and the security level thereof;
the feedback module is used for feeding the abnormal file data and the corresponding security level back to the electronic equipment corresponding to the manager of the storage server when the virus attack signal is acquired, so that the manager can check and kill unsafe files;
the abnormal file data are data with low security level.
8. An electronic device, comprising:
at least one processor;
a memory;
at least one application program, wherein the at least one application program is stored in the memory and configured to be executed by the at least one processor, the at least one application program configured to: an enterprise file storage management method according to any one of claims 1 to 6.
9. A computer-readable storage medium having stored thereon a computer program, characterized in that the computer program, when executed in a computer, causes the computer to perform the enterprise file storage management method of any of claims 1 to 6.
CN202210272777.8A 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium Active CN114594916B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210272777.8A CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210272777.8A CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114594916A CN114594916A (en) 2022-06-07
CN114594916B true CN114594916B (en) 2023-08-18

Family

ID=81810987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210272777.8A Active CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114594916B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707440A (en) * 2004-12-21 2005-12-14 西安三茗科技有限责任公司 Data backup recovery and authority control method for hard disk linux document system
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN103019890A (en) * 2012-12-24 2013-04-03 清华大学 Block-level disk data protection system and method thereof
CN103761478A (en) * 2014-01-07 2014-04-30 北京奇虎科技有限公司 Judging method and device of malicious files
WO2016180049A1 (en) * 2015-05-14 2016-11-17 中兴通讯股份有限公司 Storage management method and distributed file system
CN111538461A (en) * 2020-04-21 2020-08-14 招商局金融科技有限公司 Data reading and writing method and device based on solid state disk cache and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707440A (en) * 2004-12-21 2005-12-14 西安三茗科技有限责任公司 Data backup recovery and authority control method for hard disk linux document system
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN103019890A (en) * 2012-12-24 2013-04-03 清华大学 Block-level disk data protection system and method thereof
CN103761478A (en) * 2014-01-07 2014-04-30 北京奇虎科技有限公司 Judging method and device of malicious files
WO2016180049A1 (en) * 2015-05-14 2016-11-17 中兴通讯股份有限公司 Storage management method and distributed file system
CN111538461A (en) * 2020-04-21 2020-08-14 招商局金融科技有限公司 Data reading and writing method and device based on solid state disk cache and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
企业数据备份与容灾问题的探讨;赵妍;;电子世界(10);第93页 *

Also Published As

Publication number Publication date
CN114594916A (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US10169606B2 (en) Verifiable data destruction in a database
US9165002B1 (en) Inexpensive deletion in a data storage system
US8683228B2 (en) System and method for WORM data storage
US8706694B2 (en) Continuous data protection of files stored on a remote storage device
Kotla et al. SafeStore: A durable and practical storage system
US7720935B2 (en) Storage aggregator
US7725438B1 (en) Method and apparatus for efficiently creating backup files
US8612439B2 (en) Performing data storage operations in a cloud storage environment, including searching, encryption and indexing
AU2007295949B2 (en) Method system and apparatus for handling information
US20060010301A1 (en) Method and apparatus for file guard and file shredding
US11687417B2 (en) Secondary storage protection
EP1811378A2 (en) A computer system, a computer and a method of storing a data file
US8170991B1 (en) Method and apparatus for managing image data on a sequential storage device
US7441153B1 (en) Method and system for secure and reliable event logging
US11042507B2 (en) System and method of deletion of files and counteracting their restoration
JP2009526286A (en) Long-term backup on disk
RU2665272C1 (en) Method and apparatus for restoring deduplicated data
US7519610B2 (en) Method and apparatus for efficiently storing audit event data having diverse characteristics using tiered tables
US20220083507A1 (en) Trust chain for official data and documents
US11093290B1 (en) Backup server resource-aware discovery of client application resources
CN114594916B (en) Enterprise file storage management method and device, electronic equipment and storage medium
JP2005267599A (en) Storage area network and data write protection in coexisting environment of network attached storage
US20140215209A1 (en) Enterprise distributed free space file system
EP3674876B1 (en) System and method of deletion of files and counteracting their restoration
Mallery Secure file deletion: Fact or fiction?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant