CN116070281A - Data storage method and system of cloud management platform - Google Patents

Data storage method and system of cloud management platform Download PDF

Info

Publication number
CN116070281A
CN116070281A CN202310356467.9A CN202310356467A CN116070281A CN 116070281 A CN116070281 A CN 116070281A CN 202310356467 A CN202310356467 A CN 202310356467A CN 116070281 A CN116070281 A CN 116070281A
Authority
CN
China
Prior art keywords
data
signal
sub
storage
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310356467.9A
Other languages
Chinese (zh)
Other versions
CN116070281B (en
Inventor
毛玉姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruizhi Technology Group Co ltd
Original Assignee
Ruizhi Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruizhi Technology Group Co ltd filed Critical Ruizhi Technology Group Co ltd
Priority to CN202310356467.9A priority Critical patent/CN116070281B/en
Publication of CN116070281A publication Critical patent/CN116070281A/en
Application granted granted Critical
Publication of CN116070281B publication Critical patent/CN116070281B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2477Temporal data queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data storage method and a system of a cloud management platform, wherein the data storage system of the cloud management platform comprises the following steps: the cloud management system comprises at least one user side system and a cloud management platform; a client system includes: a plurality of sub servers; wherein, the sub-server: the method comprises the steps of sending an uploading request; cloud pipe platform: for performing the steps of: receiving an uploading request, wherein the uploading request at least comprises: sub-server information, data information and uploading data; pre-analyzing the uploaded data to obtain a pre-analysis result; and when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and storing the uploaded data according to the storage strategy. The method and the device can meet the requirements of enterprises/units, realize classified storage and access management of the uploaded data according to analysis of the uploading request, and improve the safety of the stored data.

Description

Data storage method and system of cloud management platform
Technical Field
The application relates to the technical field of computers, in particular to a data storage method and system of a cloud management platform.
Background
The cloud management platform is used for providing multi-user and multi-level resource storage and resource access management capability. The management interface of the current cloud pipe platform generally adopts a 'flattening' design mode, namely: one user can manage and view all types and all application resources under the current account, which is not matched with the requirement that large enterprises/institutions need multi-level and multi-application resource isolation management. The existing cloud management platform cannot adapt to the organization structure and management mode inside enterprises/units in terms of data storage and resource access management.
Therefore, there is an urgent need to provide a data storage method and system for a cloud management platform, which are used for solving the problems that the existing cloud management platform cannot be suitable for the needs of enterprises/units, and cannot realize classified storage and access management of uploaded data according to analysis of uploading requests, and improve the security of stored data.
Disclosure of Invention
The purpose of the application is to provide a data storage method and a system thereof of a cloud management platform, which can meet the requirements of enterprises/units, realize classified storage and access management of uploading data according to analysis of uploading requests, and improve the security of the stored data.
In order to achieve the above objective, the present application provides a data storage system of a cloud management platform, including: the cloud management system comprises at least one user side system and a cloud management platform; a client system includes: a plurality of sub servers; wherein, the sub-server: the method comprises the steps of sending an uploading request; cloud pipe platform: for performing the steps of: receiving an uploading request, wherein the uploading request at least comprises: sub-server information, data information and uploading data; pre-analyzing the uploaded data to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe; when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and storing the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
As above, the cloud tube platform at least includes: the system comprises a login module, a pre-analysis module, a management module and a storage module; a login module: the method is used for completing registration and login of the sub-servers; a pre-analysis module: after logging is completed, an uploading request is received, and pre-analysis is carried out on the uploading data to obtain a pre-analysis result; and a management module: when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and processing the uploaded data into storage data according to the storage strategy and storing the storage data in a storage module; and a storage module: the method is used for storing a user side information base; for storing the stored data.
As above, the pre-analysis module at least includes: the device comprises a plurality of detection simulators, a judging submodule, a cleaning submodule and a result submodule; wherein, detect the analog machine: carrying out security detection on the uploaded data to obtain a detection signal; and a judging sub-module: when the detection signal is a dangerous signal, the safety probability value of the sub-server is obtained, the safety probability value is judged by utilizing a preset safety threshold, when the safety probability value is greater than or equal to the safety threshold, the generated judgment signal is the safety signal, and when the safety probability value is less than the safety threshold, the generated judgment signal is the dangerous signal; cleaning submodule: when the signal is judged to be a safety signal, acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and when the antivirus processing is successful, generating a processing signal to be the safety signal; when the disinfection treatment fails, deleting the uploaded file, wherein the generated treatment signal is a dangerous signal; and (5) a result submodule: the device is used for generating a pre-analysis result, and when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
The application also provides a data storage method of the cloud management platform, which comprises the following steps: the cloud management platform receives an uploading request sent by a sub-server, wherein the uploading request at least comprises: sub-server information, data information and uploading data; yun Guanping the uploaded data is subjected to pre-analysis to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe; when the pre-analysis result is safe, the cloud management platform analyzes the data information and the sub-server information to obtain a storage strategy, and stores the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
As above, the steps of pre-analyzing the uploaded data by Yun Guanping stations to obtain a pre-analysis result are as follows: s2201: carrying out security detection on the uploaded data to obtain detection signals, wherein the detection signals are as follows: a hazard signal or a safety signal; s2202 is executed when the detection signal is a dangerous signal, and S2204 is executed when the detection signal is a safe signal; s2202: acquiring a safety probability value of the sub-server, judging the safety probability value by utilizing a preset safety threshold, when the safety probability value is greater than or equal to the safety threshold, generating a judging signal as a safety signal, executing S2203, and when the safety probability value is less than the safety threshold, generating the judging signal as a dangerous signal, executing S2204; s2203: acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and executing S2204 when the antivirus processing is successful, wherein the generated processing signal is a safety signal; when the disinfection process fails, deleting the uploaded file, and executing S2204, wherein the generated processing signal is a dangerous signal; s2204: generating a pre-analysis result, wherein when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
As above, the sub-steps of analyzing the data information and the sub-server information by the cloud management platform to obtain the storage policy are as follows: determining a storage path according to the data type in the data information, wherein the storage path at least comprises: shared path, public path and private path; determining a storage mode according to the data type in the data information, wherein the storage mode at least comprises: a sharing mode, a public mode, and a private mode; and determining execution subject information according to the storage mode and the sub-server information, and taking the storage path, the storage mode and the execution subject information as a storage strategy.
As above, wherein when the storage policy is: the sub-steps of storing the uploaded data when the path, the sharing mode and the execution subject information are shared are as follows: obtaining a sharing value of the affiliated user terminal system according to the information of the sub-server; analyzing the shared value by using a preset shared threshold, and if the shared value is greater than or equal to the shared threshold, taking the uploaded data as storage data and storing according to a shared path; if the sharing value is smaller than the sharing threshold value, marking the uploading data, taking the uploading data after marking as storage data, and storing according to the sharing path.
As above, the expression of the shared value is as follows:
Figure SMS_3
; wherein ,/>
Figure SMS_6
Is a shared value; />
Figure SMS_9
Storing the total number of data for the history of the user side system; />
Figure SMS_2
Storing the total number of times the data was acquired for the history; />
Figure SMS_5
A total number of times data is reported and/or complained for historic storage; />
Figure SMS_7
Is a natural constant; />
Figure SMS_8
and />
Figure SMS_1
Are all the weights of the materials,
Figure SMS_4
as above, the sub-server information includes at least: a sub-server name and a sub-server address.
As above, the data information at least includes: the data type and data size of the uploaded data.
The method and the device can meet the requirements of enterprises/units, realize classified storage and access management of the uploaded data according to analysis of the uploading request, and improve the safety of the stored data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description will briefly introduce the drawings that are required to be used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings may also be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1 is a schematic diagram of a data storage system of a cloud management platform according to an embodiment;
FIG. 2 is a flow chart of one embodiment of a data storage method of a cloud management platform.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the present application provides a data storage system of a cloud management platform, including: at least one client system 110 and a cloud management platform 120; a client system 110 comprising: a plurality of sub servers 1101.
Wherein, the sub-server 1101: for sending an upload request.
Cloud tube platform 120: for performing the steps of:
receiving an uploading request, wherein the uploading request at least comprises: sub-server information, data information and uploading data;
pre-analyzing the uploaded data to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe;
when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and storing the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
Specifically, as one embodiment, a client system 110 corresponds to an enterprise or a unit.
Further, the cloud tube platform 120 at least includes: the system comprises a login module, a pre-analysis module, a management module and a storage module.
A login module: for completing registration and login of the sub-servers.
A pre-analysis module: after logging is completed, an uploading request is received, and pre-analysis is carried out on the uploading data to obtain a pre-analysis result.
And a management module: and when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and processing the uploaded data into storage data according to the storage strategy and storing the storage data in the storage module.
And a storage module: the method is used for storing a user side information base; for storing the stored data.
Specifically, the client information base at least includes: the plurality of user side information, a user side information includes at least: the historical database at least comprises the total number of historical transmission of each sub-server, the historical state value of each sub-server transmitting the uploading data each time, the total number of the historical storage data acquired and the total number of the historical storage data reported and/or complained.
Further, the pre-analysis module at least includes: the device comprises a plurality of detection simulators, a judging sub-module, a cleaning sub-module and a result sub-module.
Wherein, detect the analog machine: and carrying out security detection on the uploaded data to obtain detection signals.
And a judging sub-module: when the detection signal is a dangerous signal, the safety probability value of the sub-server is obtained, the safety probability value is judged by utilizing a preset safety threshold, when the safety probability value is larger than or equal to the safety threshold, the generated judgment signal is the safety signal, and when the safety probability value is smaller than the safety threshold, the generated judgment signal is the dangerous signal.
Cleaning submodule: when the signal is judged to be a safety signal, acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and when the antivirus processing is successful, generating a processing signal to be the safety signal; when the disinfection processing fails, the uploaded file is deleted, and the generated processing signal is a dangerous signal.
And (5) a result submodule: the device is used for generating a pre-analysis result, and when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
As shown in fig. 2, the application provides a data storage method of a cloud management platform, which includes the following steps:
s210: the cloud management platform receives an uploading request sent by a sub-server, wherein the uploading request at least comprises: sub-server information, data information, and upload data.
Specifically, the sub-server finishes registration or login through the login module, and after finishing login, the sub-server sends an uploading request to the cloud management platform.
Wherein, the sub-server information at least comprises: a sub-server name and a sub-server address.
The data information is basic information of uploading data, and at least comprises: the data type and data size of the uploaded data.
S220: yun Guanping the uploaded data is subjected to pre-analysis to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe.
Further, the cloud pipe platform pre-analyzes the uploaded data, and the sub-steps for obtaining the pre-analysis result are as follows:
s2201: carrying out security detection on the uploaded data to obtain detection signals, wherein the detection signals are as follows: a hazard signal or a safety signal; when the detection signal is a dangerous signal, S2202 is executed, and when the detection signal is a safe signal, S2204 is executed.
Further, the sub-steps of performing security detection on the uploaded data and obtaining a detection signal are as follows:
s22011: and selecting one detection simulator, recording initial occupation data of the detection simulator, and obtaining occupation data according to the data sizes of the initial occupation data and the uploaded data.
Further, the expression of the occupancy data is:
Figure SMS_10
wherein ,
Figure SMS_11
for occupying data +.>
Figure SMS_12
For initial occupancy data->
Figure SMS_13
Is the expected occupancy data of the uploaded data.
Specifically, the initial occupation data is the occupation area of sector data before the detection simulator does not input the uploading data. The occupied data is the estimated occupied area of the total sector data after the uploading data is input to the detection simulator. The estimated occupied data is an estimated occupied area of the uploaded data according to a data size of the uploaded data.
S22012: and transmitting the uploaded data to a detection simulator, operating the uploaded data through the detection simulator, and obtaining operating data.
Specifically, the operation data is the occupied area of sector data after the detection simulator operates and uploads the data.
S22013: comparing the operation data with the occupied data, and if the operation data is inconsistent with the occupied data, generating a detection signal as a dangerous signal; and if the operation data and the occupied data are consistent, the generated detection signal is a safety signal.
Specifically, when the operation data and the occupation data are inconsistent, it means that the sector data are changed after operation, and the uploading data have virus files, so that the generated detection signal is a dangerous signal. When the operation data and the occupied data are consistent, the sector data are unchanged after operation, and no virus file exists in the uploaded data, so that the generated detection signal is a safety signal.
S2202: and S2203 is executed, and when the safety probability value is smaller than the safety threshold value, the generated judgment signal is a dangerous signal, and S2204 is executed.
Figure SMS_14
wherein ,
Figure SMS_15
is the security probability value of the sub-server, +.>
Figure SMS_18
Is the +.>
Figure SMS_22
Sub-server->
Figure SMS_17
Historical status value of the secondary transmission upload data, +.>
Figure SMS_19
,/>
Figure SMS_21
Is the +.>
Figure SMS_23
The total number of historical transmissions of the uploaded data by the sub-server,/->
Figure SMS_16
,/>
Figure SMS_20
For the current client systemTotal number of sub-servers.
Specifically, the judging sub-module accesses the history database in the storage module according to the sub-server information to obtain a history state value and the total number of history transmission.
The historical state value is the value of the detection state of the uploading data transmitted by the sub-server each time before the uploading data is transmitted, when the detection signal is a dangerous signal, the detection state of the uploading data is represented as having a virus file, the historical state value is equal to 0, when the detection signal is a safe signal, the detection state of the uploading data is represented as having no virus file, and the historical state value is equal to 1.
The total historical transmission times are the sum of the uploading times of the sub-server before the uploading data are transmitted.
S2203: acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and executing S2204 when the antivirus processing is successful, wherein the generated processing signal is a safety signal; when the disinfection process fails, the uploaded file is deleted, and the generated processing signal is a dangerous signal, and S2204 is executed.
S2204: generating a pre-analysis result, wherein when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
S230: when the pre-analysis result is safe, the cloud management platform analyzes the data information and the sub-server information to obtain a storage strategy, and stores the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
Further, the cloud management platform analyzes the data information and the sub-server information, and the sub-steps of obtaining the storage policy are as follows:
s2301: determining a storage path according to the data type in the data information, wherein the storage path at least comprises: shared path, public path, and private path.
Wherein, the data type at least comprises: shared, public, and private.
The shared uploading data not only allows all sub-servers in the current user side system to inquire, access and acquire the stored data after the uploading data is stored, but also allows sub-servers in other user side systems outside the current user side system to inquire, access and acquire the stored data after the uploading data is stored.
The public uploading data only allows all sub-servers in the current user side system to inquire, access and acquire the stored data after the uploading data is stored, and does not allow sub-servers in other user side systems outside the current user side system to inquire, access and acquire the stored data after the uploading data is stored.
The private uploading data only allows one or more designated sub-servers in the current user side system to inquire, access and acquire the stored data after the uploading data is stored, and the unspecified sub-servers in the current user side system and the sub-servers in other user side systems outside the current user side system are not allowed to inquire, access and acquire the stored data after the uploading data is stored.
Specifically, the current client system is the client system to which the sub-server currently transmitting the upload data belongs. When the data type is shared, the storage path is determined to be a shared path. And when the data type is public, determining the storage path as a public path. When the data type is private, the storage path is determined to be a private path. The method for acquiring the storage data comprises the following steps: downloading, collecting and sharing.
S2302: determining a storage mode according to the data type in the data information, wherein the storage mode at least comprises: sharing mode, public mode, and private mode.
Specifically, when the data type is a sharing mode, the storage mode is determined to be the sharing mode. When the data type is public, the storage mode is determined to be public. When the data type is private, the storage mode is determined to be private.
Wherein, sharing mode is: and directly analyzing the uploaded data according to the sub-server information to obtain storage data, and storing the storage data.
The public mode is as follows: and carrying out authority processing on the uploaded data to obtain storage data, and storing the storage data.
Private mode: and carrying out security processing on the uploaded data to obtain storage data, and storing the storage data.
S2303: and determining execution subject information according to the storage mode and the sub-server information, and taking the storage path, the storage mode and the execution subject information as a storage strategy.
Specifically, when the storage mode is the sharing mode and the public mode, the execution subject information is none, and when the storage mode is the private module, the client system to which the sub-server belongs is determined according to the sub-server information, and the sub-server information of all the sub-servers in the client system is used as the execution subject information.
Further, as an embodiment, when the storage policy is: the sub-steps of storing the uploaded data when the path, the sharing mode and the execution subject information are shared are as follows:
u1: and obtaining the sharing value of the affiliated user terminal system according to the information of the sub-server.
Further, the expression of the shared value is as follows:
Figure SMS_26
; wherein ,/>
Figure SMS_27
Is a shared value; />
Figure SMS_31
Storing the total number of data for the history of the user side system; />
Figure SMS_25
Storing the total number of times the data was acquired for the history; />
Figure SMS_28
A total number of times data is reported and/or complained for historic storage; />
Figure SMS_30
Is a natural constant; />
Figure SMS_32
and />
Figure SMS_24
All are weights, and are added with->
Figure SMS_29
All stored data before the current stored uploading data are historical stored data. The total times of the sub-server for acquiring the historical storage data comprise: the total number of times the historical stored data is downloaded, the total number of times the historical stored data is collected and the total number of times the historical stored data is shared.
Figure SMS_33
and />
Figure SMS_34
The specific values of (2) are determined according to the actual requirements.
U2: analyzing the shared value by using a preset shared threshold, and if the shared value is greater than or equal to the shared threshold, taking the uploaded data as storage data and storing according to a shared path; if the sharing value is smaller than the sharing threshold value, marking the uploading data, taking the uploading data after marking as storage data, and storing according to the sharing path.
Further, as an embodiment, when the storage policy is: the sub-steps of storing the uploaded data when the public path, the public mode and the execution subject information are not present are as follows:
u1': and determining a user side system to which the sub-server belongs according to the sub-server information, and acquiring the sub-server information of all the sub-servers in the user side system.
U2': performing authority setting on the uploaded data according to the sub-server information to obtain stored data, wherein the authority content is as follows: only the sub-server corresponding to the sub-server information is allowed to inquire, access and acquire the stored data.
U3': and storing the stored data according to the public path.
Further, as an embodiment, when the storage policy is: when the private path, the private mode and the execution subject information are the sub-server information of all sub-servers in the current user side system, the sub-steps of storing the uploading data are as follows:
u1': the cloud management platform divides the uploading data into a plurality of data blocks according to a preset dividing threshold value, marks the data blocks according to the dividing sequence, and obtains sub-data.
Specifically, the preset dividing threshold is the data size of the data block to be encrypted, the dividing threshold is smaller than the data size of the uploading data, and the number of the obtained sub data is determined according to the actual data size of the uploading data.
U2': and the cloud management platform selects a plurality of execution servers from all the sub servers of the user side system according to the total number of the sub data, and sends the sub data to the execution servers respectively.
Specifically, when the total data of the sub-data is greater than the total number of all sub-servers of the client system, each sub-server in the client system is used as an execution server, and one execution server receives at least one sub-data.
When the total number of the sub-servers is smaller than all the sub-servers of the user side system and larger than the total number of the sub-servers appointed by the user side system, selecting all the appointed sub-servers in the user side system as execution servers, and then selecting the rest number of sub-servers from the unspecified sub-servers as the execution servers, wherein each execution server receives one sub-data.
When the total number of the sub-data is smaller than or equal to the total number of the sub-servers designated by the user side system, selecting an execution server from the designated sub-servers, and receiving one sub-data by each execution server.
The designated sub-server is the sub-server in the user system which allows the query, access and acquisition of the stored data.
U3': the execution server encrypts the sub-data to obtain encrypted sub-data, sends the encrypted sub-data to the cloud management platform, and sends the first encrypted information to the appointed sub-server.
Specifically, the execution server sends the first encrypted information (such as a private key, etc.) to the sub-server through an internal network or a transmission interface of the client system, and the label of the first encrypted information is consistent with the label of the encrypted sub-data. The first encryption information is used to decrypt the encrypted sub-data.
U4': and the cloud management platform encrypts the encrypted sub-data again to obtain storage data, and stores the storage data according to the private path.
Specifically, the cloud management platform encrypts all the encrypted sub-data as one data packet, takes the encrypted data packet as storage data, and stores the storage data according to the private path.
U5': after the storage is completed, the cloud management platform sends the access link and the second encryption information to a designated sub-server, and the designated sub-server stores the access link, the first encryption information and the second encryption information in the sub-server as a storage data packet and adds the information of the storage data packet into a storage directory.
Specifically, the second encryption information is used for decrypting the acquired storage data. The storage catalog is used for recording information of the storage data, so that the sub-server is convenient to acquire the storage data, after the sub-server acquires the storage data, the sub-server firstly decrypts the storage data by utilizing the second encryption information to acquire a plurality of encrypted sub-data, then decrypts the encrypted sub-data by utilizing the first encryption information to acquire a plurality of sub-data, and combines the sub-data according to the sequence of the labels, so that complete uploading data is acquired.
The method and the device can meet the requirements of enterprises/units, realize classified storage and access management of the uploaded data according to analysis of the uploading request, and improve the safety of the stored data.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the scope of the present application be interpreted as including the preferred embodiments and all alterations and modifications that fall within the scope of the present application. It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the protection of the present application and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (10)

1. A data storage system of a cloud management platform, comprising: the cloud management system comprises at least one user side system and a cloud management platform; a client system includes: a plurality of sub servers;
wherein, the sub-server: the method comprises the steps of sending an uploading request;
cloud pipe platform: for performing the steps of:
receiving an uploading request, wherein the uploading request at least comprises: sub-server information, data information and uploading data;
pre-analyzing the uploaded data to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe;
when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and storing the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
2. The cloud management platform data storage system of claim 1, wherein the cloud management platform comprises at least: the system comprises a login module, a pre-analysis module, a management module and a storage module;
a login module: the method is used for completing registration and login of the sub-servers;
a pre-analysis module: after logging is completed, an uploading request is received, and pre-analysis is carried out on the uploading data to obtain a pre-analysis result;
and a management module: when the pre-analysis result is safe, analyzing the data information and the sub-server information to obtain a storage strategy, and processing the uploaded data into storage data according to the storage strategy and storing the storage data in a storage module;
and a storage module: the method is used for storing a user side information base; for storing the stored data.
3. The cloud management platform data storage system of claim 2, wherein the pre-analysis module comprises at least: the device comprises a plurality of detection simulators, a judging submodule, a cleaning submodule and a result submodule;
wherein, detect the analog machine: carrying out security detection on the uploaded data to obtain a detection signal;
and a judging sub-module: when the detection signal is a dangerous signal, the safety probability value of the sub-server is obtained, the safety probability value is judged by utilizing a preset safety threshold, when the safety probability value is greater than or equal to the safety threshold, the generated judgment signal is the safety signal, and when the safety probability value is less than the safety threshold, the generated judgment signal is the dangerous signal;
cleaning submodule: when the signal is judged to be a safety signal, acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and when the antivirus processing is successful, generating a processing signal to be the safety signal; when the disinfection treatment fails, deleting the uploaded file, wherein the generated treatment signal is a dangerous signal;
and (5) a result submodule: the device is used for generating a pre-analysis result, and when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
4. The data storage method of the cloud pipe platform is characterized by comprising the following steps of:
the cloud management platform receives an uploading request sent by a sub-server, wherein the uploading request at least comprises: sub-server information, data information and uploading data;
yun Guanping the uploaded data is subjected to pre-analysis to obtain a pre-analysis result, wherein the pre-analysis result is as follows: safe or unsafe;
when the pre-analysis result is safe, the cloud management platform analyzes the data information and the sub-server information to obtain a storage strategy, and stores the uploaded data according to the storage strategy, wherein the data information at least comprises: data type and data size.
5. The data storage method of the cloud platform as claimed in claim 4, wherein the step of pre-analyzing the uploaded data by the Yun Guanping platform to obtain a pre-analysis result is as follows:
s2201: carrying out security detection on the uploaded data to obtain detection signals, wherein the detection signals are as follows: a hazard signal or a safety signal; s2202 is executed when the detection signal is a dangerous signal, and S2204 is executed when the detection signal is a safe signal;
s2202: acquiring a safety probability value of the sub-server, judging the safety probability value by utilizing a preset safety threshold, when the safety probability value is greater than or equal to the safety threshold, generating a judging signal as a safety signal, executing S2203, and when the safety probability value is less than the safety threshold, generating the judging signal as a dangerous signal, executing S2204;
s2203: acquiring a virus file in the uploaded data, selecting a corresponding antivirus program according to the virus file to perform antivirus processing, and executing S2204 when the antivirus processing is successful, wherein the generated processing signal is a safety signal; when the disinfection process fails, deleting the uploaded file, and executing S2204, wherein the generated processing signal is a dangerous signal;
s2204: generating a pre-analysis result, wherein when the detection signal is a safety signal or the processing signal is a safety signal, the generated pre-analysis result is safe; when the signal is judged to be a dangerous signal or the processing signal is judged to be a dangerous signal, the generated pre-analysis result is unsafe.
6. The data storage method of the cloud management platform according to claim 5, wherein the sub-steps of analyzing the data information and the sub-server information by the cloud management platform to obtain the storage policy are as follows:
determining a storage path according to the data type in the data information, wherein the storage path at least comprises: shared path, public path and private path;
determining a storage mode according to the data type in the data information, wherein the storage mode at least comprises: a sharing mode, a public mode, and a private mode;
and determining execution subject information according to the storage mode and the sub-server information, and taking the storage path, the storage mode and the execution subject information as a storage strategy.
7. The method for data storage of a cloud management platform of claim 6, wherein when the storage policy is: the sub-steps of storing the uploaded data when the path, the sharing mode and the execution subject information are shared are as follows:
obtaining a sharing value of the affiliated user terminal system according to the information of the sub-server;
analyzing the shared value by using a preset shared threshold, and if the shared value is greater than or equal to the shared threshold, taking the uploaded data as storage data and storing according to a shared path; if the sharing value is smaller than the sharing threshold value, marking the uploading data, taking the uploading data after marking as storage data, and storing according to the sharing path.
8. The data storage method of the cloud management platform according to claim 7, wherein the expression of the shared value is as follows:
Figure QLYQS_1
wherein ,
Figure QLYQS_3
is a shared value; />
Figure QLYQS_5
Storing the total number of data for the history of the user side system; />
Figure QLYQS_7
Storing the total number of times the data was acquired for the history; />
Figure QLYQS_4
A total number of times data is reported and/or complained for historic storage; />
Figure QLYQS_6
Is a natural constant; />
Figure QLYQS_8
And
Figure QLYQS_9
all are weights, and are added with->
Figure QLYQS_2
9. The data storage method of the cloud management platform according to claim 4, wherein the sub-server information at least includes: a sub-server name and a sub-server address.
10. The data storage method of the cloud management platform according to claim 4, wherein the data information at least includes: the data type and data size of the uploaded data.
CN202310356467.9A 2023-04-06 2023-04-06 Data storage method and system of cloud management platform Active CN116070281B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310356467.9A CN116070281B (en) 2023-04-06 2023-04-06 Data storage method and system of cloud management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310356467.9A CN116070281B (en) 2023-04-06 2023-04-06 Data storage method and system of cloud management platform

Publications (2)

Publication Number Publication Date
CN116070281A true CN116070281A (en) 2023-05-05
CN116070281B CN116070281B (en) 2023-08-01

Family

ID=86173517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310356467.9A Active CN116070281B (en) 2023-04-06 2023-04-06 Data storage method and system of cloud management platform

Country Status (1)

Country Link
CN (1) CN116070281B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117319084A (en) * 2023-11-28 2023-12-29 遂宁市中心医院 Medical examination data sharing method and system based on cloud authentication
CN117997819A (en) * 2024-04-03 2024-05-07 天云融创数据科技(北京)有限公司 Data security management method and system based on cloud computing
CN117997819B (en) * 2024-04-03 2024-06-11 天云融创数据科技(北京)有限公司 Data security management method and system based on cloud computing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692737A (en) * 2009-08-07 2010-04-07 华南理工大学 Light weight data synchronous architecture opposite to mobile RFID
WO2018094764A1 (en) * 2016-11-23 2018-05-31 深圳大学 Method and device for pattern string match verification based on cloud service
CN111541567A (en) * 2020-04-22 2020-08-14 彭小雪 Artificial intelligence cloud computing big data management system and method
WO2021010896A1 (en) * 2019-07-12 2021-01-21 Nanyang Technological University Method and system for distributed data management
CN114385367A (en) * 2022-01-14 2022-04-22 黑龙江省政务大数据中心 Resource management system based on cloud management platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692737A (en) * 2009-08-07 2010-04-07 华南理工大学 Light weight data synchronous architecture opposite to mobile RFID
WO2018094764A1 (en) * 2016-11-23 2018-05-31 深圳大学 Method and device for pattern string match verification based on cloud service
WO2021010896A1 (en) * 2019-07-12 2021-01-21 Nanyang Technological University Method and system for distributed data management
CN111541567A (en) * 2020-04-22 2020-08-14 彭小雪 Artificial intelligence cloud computing big data management system and method
CN114385367A (en) * 2022-01-14 2022-04-22 黑龙江省政务大数据中心 Resource management system based on cloud management platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AARON ZIMBA等: "Cyber Attacks in Cloud Computing: Modelling Multi-stage Attacks using Probability Density Curves", 《I. J. COMPUTER NETWORK AND INFORMATION SECURITY》, pages 25 - 36 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117319084A (en) * 2023-11-28 2023-12-29 遂宁市中心医院 Medical examination data sharing method and system based on cloud authentication
CN117319084B (en) * 2023-11-28 2024-01-30 遂宁市中心医院 Medical examination data sharing method and system based on cloud authentication
CN117997819A (en) * 2024-04-03 2024-05-07 天云融创数据科技(北京)有限公司 Data security management method and system based on cloud computing
CN117997819B (en) * 2024-04-03 2024-06-11 天云融创数据科技(北京)有限公司 Data security management method and system based on cloud computing

Also Published As

Publication number Publication date
CN116070281B (en) 2023-08-01

Similar Documents

Publication Publication Date Title
CN102821096B (en) Distributed storage system and file sharing method thereof
CN105516110B (en) Mobile device security data transmission method
CN101404014B (en) Methods and systems for creating and updating approved-file and trusted-domain databases
CN111783075A (en) Authority management method, device and medium based on secret key and electronic equipment
CN104811428A (en) Method, device and system for verifying client identity by social relation data
WO2016128070A1 (en) Method for storing a data file of a client on a storage entity
CN110704375B (en) File management method, device, equipment and computer storage medium
CN108347428B (en) Registration system, method and device of application program based on block chain
CN116070281B (en) Data storage method and system of cloud management platform
US6697811B2 (en) Method and system for information management and distribution
CN112257048B (en) Information security protection method and device
CN113568882A (en) OSS-based resource sharing method and system
CN114547209A (en) Data sharing interaction method and system based on block chain
CN112308542B (en) Method and system for realizing intelligent and non-inductive data input
CN113836447A (en) Safe track similarity query method and system under cloud platform
CN110995454A (en) Service verification method and system
CN115982115A (en) Data sharing method
CN113468574B (en) Block chain data uplink method and device
US9825763B2 (en) Systems for automated forensic data capture
CN111682934B (en) Method and system for storing, accessing and sharing comprehensive energy metering data
CN108600149A (en) Cloud computing high availability cluster method for managing resource
TWI723622B (en) Data management method and system capable of safely accessing and deleting data
CN110647769A (en) Indoor air detection data chaining method and equipment of Internet of things by combining block chains
CN117335960B (en) Block chain-based carbon data sharing access method and device in zero trust network
CN116910788B (en) Searchable encryption management method and device for service data and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant