CN116204357B - Mobile phone terminal data backup method and system based on hong Monte-go system - Google Patents

Mobile phone terminal data backup method and system based on hong Monte-go system Download PDF

Info

Publication number
CN116204357B
CN116204357B CN202310468900.8A CN202310468900A CN116204357B CN 116204357 B CN116204357 B CN 116204357B CN 202310468900 A CN202310468900 A CN 202310468900A CN 116204357 B CN116204357 B CN 116204357B
Authority
CN
China
Prior art keywords
data
backup
mobile phone
phone terminal
terminal user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310468900.8A
Other languages
Chinese (zh)
Other versions
CN116204357A (en
Inventor
王宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youbo Life Technology Co ltd
Original Assignee
Shenzhen Youbo Life Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youbo Life Technology Co ltd filed Critical Shenzhen Youbo Life Technology Co ltd
Priority to CN202310468900.8A priority Critical patent/CN116204357B/en
Publication of CN116204357A publication Critical patent/CN116204357A/en
Application granted granted Critical
Publication of CN116204357B publication Critical patent/CN116204357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

In the method and the system for backing up the mobile phone terminal data based on the hong Mongolian system, when the operation event of the mobile phone terminal user on the data set is monitored, the operation event on the data set is recorded in an operation log; obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log; inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree; collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center; the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup, so that unnecessary data backup is avoided, data redundancy is effectively reduced, and the practicability and efficiency of the backup data are improved.

Description

Mobile phone terminal data backup method and system based on hong Monte-go system
Technical Field
The application relates to the technical field of mobile phone terminal data backup, in particular to a mobile phone terminal data backup method and system based on a hong Monte system.
Background
With the continuous promotion and improvement of technology, the mobile phone has more and more powerful functions. People increasingly rely on the use of mobile phones for communication, office, information acquisition, entertainment, and other activities. The mobile phone provides convenience for life, and the mobile phone terminal necessarily bears a large amount of private information of the user. Leakage or loss of mobile phone data may cause leakage or loss of private information, resulting in irrecoverable serious consequences.
In order to ensure the real-time performance and the safety of user data backup to the maximum extent, a plurality of mobile phone data backup methods appear, and the mobile phone backup method based on the hong Mongolian system in the prior art mainly adopts a mobile phone incremental backup technology, namely, all data selected by a user independently are backed up when the user is backed up for the first time, then the data needing incremental backup is backed up to a server according to the setting timing of the user or when the incremental data reaches a preset value, and when the backed up data needs to be restored, the data can be downloaded from the server for restoration. However, in this prior art, all incremental data is backed up, but many backed up data are not important or necessary for the user in fact, and do not need to be backed up, and if all incremental data are backed up, a great deal of data redundancy is caused.
Disclosure of Invention
The application provides a mobile phone terminal data backup method and system based on a hong Mongolian system, which are used for solving the technical problem of data redundancy caused by the backup of all incremental data in the prior art.
In order to solve the technical problems, the application adopts the following technical scheme:
in a first aspect, the present application provides a mobile phone terminal data backup method based on a hong Mongolian system, including the following steps:
carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored;
obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree;
collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center;
and the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup.
In some embodiments, when the operation event of the mobile phone terminal user on the data set is monitored, recording the operation event on the data set in the operation log specifically includes:
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
In some embodiments, determining the current backup recommendation level according to the data privacy tag and the operation log of the mobile phone terminal user specifically includes:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>
According to the operation logAverage data privacy label rating of item +.>Said->Item data to data set with highest data privacy label ratingDistance of data of>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination, namely:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Is the data in the dataset with the highest data privacy label rating.
In some embodiments, collecting backup data and encrypting the backup data specifically includes:
collecting data information according to the data indexes in the data backup set to generate a data plaintext;
determining a general secret key;
calculating a time key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log;
and encrypting the data plaintext by the universal key and the time key to obtain ciphertext.
In some embodiments, the encrypting the collected backup data by the trusted data center specifically includes:
the trusted data center generates a re-encryption public key and a private key, wherein the re-encryption public key is used for encrypting data, the re-encryption private key is used for decrypting data, ciphertext uploaded by the mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted.
In some embodiments, the trusted data center further comprises, after re-encrypting the collected backup data:
and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set.
In some embodiments, the operations of the mobile phone terminal user on the data set include operations of creating, modifying and deleting the data set.
In a second aspect, the present application provides a mobile phone terminal data backup system based on a hong Monte system, including:
the data full backup module is used for carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module is used for monitoring operation events of a mobile phone terminal user, and when the operation events of the mobile phone terminal user on the data set are monitored, the operation events of the data set are recorded in an operation log;
the backup recommendation degree determining module is used for obtaining the data privacy label of the mobile phone terminal user every time a backup time period passes and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
the data backup set generation module is used for inputting the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module is used for collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to the trusted data center;
and the data backup module is used for uploading the collected backup data to the hong Meng Yun backup server for backup after the trusted data center re-encrypts the backup data.
In a third aspect, the present application provides a computer device comprising a memory and a processor; the memory stores codes, and the processor is configured to acquire the codes and execute the mobile phone terminal data backup method based on the hong Monte-Menu system.
In a fourth aspect, the present application provides a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the foregoing method for backing up data of a mobile phone terminal based on a hong Mongolian system.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
in the mobile phone terminal data backup method and system based on the hong system, all data selected to be backed up by a mobile phone terminal user for the first time are fully backed up, and a data set is generated, wherein the data set comprises a data privacy label of the mobile phone terminal user; monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored; obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log; inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree; collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center; the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to a hong Meng Yun backup server for backup, wherein the current backup recommendation degree is determined according to the data privacy label of the mobile phone terminal user and the operation log, namely, the demand of the user on the data is predicted through the data privacy label and the operation log, the data importance degree, the operation frequency of the user on the data and the like are included, the current backup recommendation degree is determined, the current backup recommendation degree is input into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree; and collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to a trusted data center, so that unnecessary data backup is avoided, and all incremental data are not backed up, thereby effectively reducing data redundancy and improving the practicability and efficiency of the backup data.
Drawings
FIG. 1 is an exemplary flow chart of a method for backing up data for a cellular phone terminal based on a hong system according to some embodiments of the present application;
FIG. 2 is a schematic diagram of a network architecture of a mobile phone terminal data backup system based on a hong Monte-cover system according to some embodiments of the present application;
fig. 3 is a schematic diagram of functional modules of a data backup system of a mobile phone terminal based on a hong and Monte-cover system according to some embodiments of the present application;
fig. 4 is a schematic diagram of an exemplary architecture of a computer device implementing a method for backing up data for a cellular phone terminal based on a hong system according to some embodiments of the present application.
Description of the embodiments
Referring to fig. 1, the flowchart of a specific embodiment of a mobile phone terminal data backup method based on the hong Monte system in the present application mainly includes the following steps:
in step S101, the mobile terminal user selects all the data to be backed up for the first time to perform full backup and generate a data set, where the data set includes a data privacy tag of the mobile terminal user, and in specific implementation, the data set may be generated by the following manner:
firstly, determining data which need to be backed up and are selected by a mobile phone terminal user, including but not limited to photos, videos, music, documents and the like;
secondly, carrying out full backup on the data to be backed up selected by the mobile phone terminal, namely, completely copying one copy of the data, and uploading the data to a hong Mongolian server for backup, wherein each backup data can be marked with a data privacy label, and the privacy grade degree of the data is marked;
and storing the backup data and the data privacy label into a data set, and establishing an index, so that backup and retrieval are facilitated.
It should be noted that, the types of data to be backed up selected by the user mainly include contacts, information, recorders, applications and data, memos, wi-Fi, cell phone households, scene intelligence, clocks, weather, desktops, harassment interception, etc., while the data privacy label represents the importance of the user to the data, the higher the data privacy grade of the data privacy label is set than the data privacy grade of the data privacy label which is not set, the more important the data privacy label is, the less tolerant to be lost, and the privacy grade is set by the data privacy label, so that the data with the highest priority privacy grade can be backed up, the flexibility of incremental backup of the user data is increased, and details are omitted.
In step S102, the operation event of the mobile terminal user is monitored, and when the operation event of the mobile terminal user on the data set is monitored, the operation event of the data set is recorded in an operation log, and the following manner is adopted when the operation log is specifically implemented:
monitoring an operation event of a mobile phone terminal user on a data set and modifying operation on a data privacy label;
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
It should be noted that, in the present application, the operation of the mobile phone terminal user on the data set may include operations of creating, modifying, and deleting the data set, which is not limited herein specifically.
In step S103, each time a backup time period passes, a data privacy label of the mobile phone terminal user is obtained, and the current backup recommendation degree is determined according to the data privacy label of the mobile phone terminal user and the operation log, and the following implementation method is adopted, namely:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>
According to the operation logAverage data privacy label rating of item +.>Said->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation, wherein the current backup recommendation isBackup recommendation degree->The following formula is adopted for determination, namely:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Is the data in the dataset with the highest data privacy label rating.
In the prior art, in order to backup mobile phone data, a preset backup period is generally set, that is, the time interval of the backup period is fixed. However, this approach may result in different data sizes for each backup. If the granularity of the backup time is set to be too small, a large amount of data fragments can be generated, a large amount of bandwidth and transmission time are occupied, and the normal use of the mobile phone can be influenced; if the granularity of the backup time is set too large, the computing capacity of the mobile phone terminal is limited, and when a large amount of data is processed at one time, the backup delay is serious, and meanwhile, the backup files are larger, so that the storage and transmission are not facilitated. Therefore, a balance needs to be achieved between the backup period and the data size to achieve the optimal backup effect, and the operation log is used in the present applicationAverage data privacy label rating of item +.>Said->Item data to dataset havingDistance of data of highest data privacy label level +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>The method has the advantages that the current backup recommendation degree is determined, the data backup set can be generated by combining the past historical backup data information and the current equipment incremental backup data information, the data size when past data transmission is successfully referenced by the historical backup data experience is fully considered in the determination of the current backup recommendation degree, the backup period can be calculated in a self-adaptive mode, the problems of data fragments and overlong transmission time caused by too small or too large time granularity are avoided, and therefore the backup efficiency and the data transmission success rate are improved.
In addition, the determination of the current backup recommendation degree fully considers the private data grade and the distance between the private data in the current backup data, and can control the length of the data sheet uploaded each time to be uniform while ensuring the priority uploading of important data.
In step S104, the determined current backup recommendation is input to a content backup calculator, which generates a data backup set according to the current backup recommendation, and in specific implementation, the content backup calculator may generate the data backup set according to the current backup recommendation in a plurality of ways, for example, by constructing a decision tree model, using the backup recommendation as an input variable, selecting backup data according to the value of the variable, thereby generating the data backup set, or by clustering backup data, classifying similar data into a group, and then determining which groups of data need to be backed up according to the backup recommendation, thereby generating the data backup set.
In some embodiments, the following description is providedIf the current backup recommendation degree reaches the historical backup recommendation degree measurement value, the operation log information contained in the registration data of the highest data privacy label in the current operation log from the first data behind the preamble backup node can be intercepted; then forming a pre-backup data set according to data corresponding to the record of the creation, modification and deletion operation of the data set in the operation log; finally, searching the data content abstract in the preliminary data set, deleting the repeated data content, obtaining a data backup set, and updating the historical backup recommendation degree measurement value; wherein historical backup recommendation metricsCan be determined according to the following formula:
wherein ,is->And the secondary historical backup recommendation degree measurement value, wherein n is the historical backup times.
In the above embodiment, in order to avoid the interference of the data backup recommendation caused by the extreme situation, such as long-time no data privacy label or all high data privacy label information, the historical backup recommendation measurement is adopted, and because the backup recommendation in the initialization is credible, the method can avoid the influence of the extreme situation, and generate the corresponding data backup set by calculating the reasonable backup recommendation.
In step S105, the backup data is collected according to the data backup set, encrypted and uploaded to the trusted data center, and in specific implementation, the method may be implemented as follows:
firstly, data information is collected according to data indexes in a data backup set to generate a data plaintext, a file access interface of a mobile phone terminal can be accessed according to the index information in the data backup set, backup data are connected end to end according to the sequence in the data backup set, and then the data are fragmented again according to the requirement of an encryption algorithm; collecting data information according to the data indexes in the data backup set processed by the steps to obtain a data plaintext;
secondly, determining a general secret key, and calculating a time secret key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log, wherein the time stamp can be used as a private key because the time for writing the operation of a user to the data set into the log is arbitrary and unknown;
and encrypting the data plaintext through the universal key and the time key to obtain a ciphertext, namely combining the universal key and the time key to obtain a subkey, replacing the subkey to obtain a replacement key, and encrypting the data plaintext through the replacement key to obtain the ciphertext.
In the encryption process, the mobile phone terminal can upload the encrypted data sheet to the trusted data center, namely, encrypt the data sheet and upload the encrypted data sheet.
It should be noted that, considering that the computing power of the mobile phone is limited, in some embodiments, a symmetric encryption algorithm is adopted, and according to the algorithm characteristics, the data slice may be set to 64 bits, which is not limited herein.
In step S106, the trusted data center re-encrypts the collected backup data and then uploads the encrypted backup data to the hong Meng Yun backup server for backup, which may be specifically implemented by the following ways:
the trusted data center firstly receives all ciphertext uploaded by equipment in a private network through the private network, then re-encrypts the ciphertext, and particularly generates a re-encrypted public key and a private key during re-encryption, wherein the re-encrypted public key is used for encrypting data, the re-encrypted private key is used for decrypting the data, the ciphertext uploaded by a mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted, which is not repeated here.
It should be noted that, as a preferred embodiment, the trusted data center in the present application may further include, after re-encrypting the collected backup data: and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set, namely, performs feature reconstruction on the re-encrypted data, and finally fuses the data through features and uploads the data to the hong Meng Yun server for backup.
In some embodiments, data fusion may be achieved in the following manner:
sequentially storing the re-encrypted data in a re-encryption array which is definedA plurality of bit arrays, the bits in each array being initialized to 0;
calculating the data in the re-encrypted data one by one through modulo arithmetic (MOD) to obtain a function value, and recording the function value in a defined bit array;
taking the result expressed by the bit array as a new feature vector, and inputting the new feature vector into a feature reconstruction mechanism;
the feature reconstruction mechanism compresses the new data feature vector and fuses the data according to the result to obtain a fused data set.
It should be noted that in the prior art, the backup data is simply and symmetrically encrypted only at the mobile phone terminal, such as encryption by an advanced encryption standard (Advanced Encryption Standard, AES) algorithm, etc., the encryption mode is relatively simple, if the backup data is intercepted in the process of uploading a key, encryption invalidation will be caused, and unexpected serious consequences are caused.
In addition, the method and the device for processing the data in the private network have the advantages that the trusted data center is introduced to fuse, re-encrypt and block transmission of the backup data in the private network, so that the data processing pressure of the mobile phone terminal is released, when the re-encrypted data are fused, the data are subjected to characteristic reconstruction, the data are fused, system resources can be fully utilized, the occupation of the data on the storage resources of the cloud is reduced, and due to the fact that the data characteristics are extracted, the associated data are stored in the same area more easily, and the data collection efficiency of the system can be improved when the data are restored.
When the mobile phone terminal user sends a data backup and restore request, the hong Meng Yun backup server restores the mobile phone backup data of the mobile phone terminal user according to the data backup and restore request, specifically, the hong Meng Yun backup server can establish a link with the trusted data center, receive and store the fusion data set uploaded by the trusted data center through the data transmission channel, and when the mobile phone terminal user sends a data backup and restore request, restore the mobile phone backup data of the mobile phone terminal user according to the data backup and restore request.
Referring to fig. 2, which is a network architecture diagram of a mobile phone terminal data backup system based on the hong system of the present application, a network architecture 200 of the mobile phone terminal data backup system based on the hong system of the present embodiment mainly includes: the mobile phone terminal 201, the trusted data center 202 and the hong Meng Yun backup server 203 are respectively described as follows:
the mobile phone terminal 201, in this application, the mobile phone terminal 201 is a client for realizing backup, and can backup and restore data on the mobile phone, and the backup data is uploaded to the hong Meng Yun backup server 203 for cloud backup, so as to ensure the safety and durability of the data;
the trusted data center 202, in this application, the trusted data center 202 refers to a data storage, management and processing center with high guarantee in terms of security, reliability, availability, compliance and the like, and the trusted data center 202 generally adopts strict security measures, including various measures such as physical security, logical security, network security and the like, so as to ensure the security and confidentiality of data, and in this application, the mobile phone terminal 201 uploads backup data to the hong Meng Yun backup server 203 through the trusted data center 202 for cloud backup;
hong Meng Yun backup server 203, hong Meng Yun backup server 203 in the present application is a cloud backup server based on hong Mongolian system, and is mainly used for storing and managing data backup of mobile phone terminal 201. The server provides high-efficiency, safe and reliable data backup service, so that a user can backup and restore mobile phone data anytime and anywhere, the hong Meng Yun backup server 203 can adopt a distributed architecture, has high availability and fault tolerance and can ensure the reliability and the integrity of the backup data.
Referring to fig. 3, the functional module of the mobile phone terminal data backup system based on the hong system according to some embodiments of the present application mainly includes: the data full backup module 301, the operation event monitoring module 302, the backup recommendation degree determining module 303, the data backup set generating module 304, the backup data collecting module 305 and the data backup module 306 are respectively described as follows:
the data full backup module 301 is mainly used for carrying out full backup on all data selected to be backed up by a mobile phone terminal user for the first time and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module 302, where the operation event monitoring module 302 is mainly configured to monitor an operation event of a mobile phone terminal user, and record the operation event of the data set in an operation log when the operation event of the mobile phone terminal user on the data set is monitored;
the backup recommendation degree determining module 303, where the backup recommendation degree determining module 303 is mainly configured to obtain a data privacy label of the mobile phone terminal user after each backup time period, and determine a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
the data backup set generating module 304, where the data backup set generating module 304 is mainly configured to input the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module 305, where the backup data collection module 305 is mainly configured to collect backup data according to the data backup set, encrypt the collected backup data, and upload the encrypted backup data to a trusted data center;
the data backup module 306, in this application, the data backup module 306 is mainly used for encrypting the collected backup data again by the trusted data center and uploading the encrypted backup data to the hong Meng Yun backup server for backup.
In some embodiments, the present application also provides a computer device comprising a memory and a processor; the memory stores codes, and the processor is configured to acquire the codes and execute the data backup method of the mobile phone terminal based on the hong Monte system.
Referring to fig. 4, the structure of a computer device for implementing the data backup method of a mobile phone terminal based on the hong system according to the embodiment of the present application is shown, where the data backup method of a mobile phone terminal based on the hong system in the above embodiment may be implemented by the computer device shown in fig. 4, and the computer device includes at least one processor 401, a communication bus 402, a memory 403, and at least one communication interface 404.
The processor 401 may be a general purpose central processing unit (central processing unit, CPU), application-specific integrated circuit (ASIC) or one or more of the methods for controlling the execution of the data backup method of the cellular phone terminal based on the hong system in the present application.
Communication bus 402 may include a path to transfer information between the aforementioned components.
The Memory 403 may be, but is not limited to, a read-only Memory (ROM) or other type of static storage device that can store static information and instructions, a random access Memory (random access Memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only Memory (electrically erasable programmable read-only Memory, EEPROM), a compact disc (compact disc read-only Memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 403 may be self-contained and be coupled to the processor 401 via the communication bus 402. Memory 403 may also be integrated with processor 401.
The memory 403 is used for storing program codes for executing the embodiments of the present application, and is controlled by the processor 401 to execute the embodiments. The processor 401 is used to execute program code stored in the memory 403. One or more software modules may be included in the program code. The determination of backup recommendation in the above embodiments may be implemented by one or more software modules in the processor 401 and program code in the memory 403.
The communication interface 404 uses any transceiver-like device for communicating with other devices or communication networks, such as ethernet, wireless access ((radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
In a specific implementation, as an embodiment, a computer device may include a plurality of processors, where each of the processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The computer device may be a general purpose computer device or a special purpose computer device. In particular implementations, the computer device may be a desktop, laptop, web server, palmtop (personal digital assistant, PDA), mobile handset, tablet, wireless terminal device, communication device, or embedded device. Embodiments of the present application are not limited in the type of computer device.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
For example, in some embodiments, the present application further provides a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the foregoing method for backing up data of a mobile phone terminal based on a hong Monte-Menu system.
The foregoing description of the preferred embodiments of the present application is not intended to be limiting, but rather is intended to cover any and all modifications, equivalents, alternatives, and improvements within the spirit and principles of the present application.

Claims (9)

1. A mobile phone terminal data backup method based on a hong Monte-Meng system is characterized by comprising the following steps:
carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored;
obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log, wherein determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log specifically comprises:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>
According to the operation logAverage data privacy label rating of item +.>Said->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination:
wherein ,/>For the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Data with the highest data privacy label level in the data set;
inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree;
collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center;
and the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup.
2. The method of claim 1, wherein when an operational event of the data set by a mobile phone end user is monitored, recording the operational event of the data set in an operation log specifically comprises:
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
3. The method of claim 1, wherein collecting backup data and encrypting the backup data specifically comprises:
collecting data information according to the data indexes in the data backup set to generate a data plaintext;
determining a general secret key;
calculating a time key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log;
and encrypting the data plaintext by the universal key and the time key to obtain ciphertext.
4. The method of claim 1, wherein the trusted data center re-encrypts the collected backup data specifically comprises:
the trusted data center generates a re-encryption public key and a private key, wherein the re-encryption public key is used for encrypting data, the re-encryption private key is used for decrypting data, ciphertext uploaded by the mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted.
5. The method of claim 1, wherein the trusted data center further comprises, after re-encrypting the collected backup data:
and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set.
6. The method of claim 1, wherein the operation of the data set by the mobile phone end user includes a create, modify, delete operation of the data set.
7. A mobile phone terminal data backup system based on a hong Monte system is characterized by comprising:
the data full backup module is used for carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module is used for monitoring operation events of a mobile phone terminal user, and when the operation events of the mobile phone terminal user on the data set are monitored, the operation events of the data set are recorded in an operation log;
the backup recommendation degree determining module is configured to obtain a data privacy label of the mobile phone terminal user every time a backup time period elapses, determine a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log, where determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log specifically includes: retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log; updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record; before determining the current operation logAverage data privacy label rating of item +.>The method comprises the steps of carrying out a first treatment on the surface of the Retrieving data with the highest data privacy label level in the current operation log; confirm->Distance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>The method comprises the steps of carrying out a first treatment on the surface of the According to the operation log ∈>Average data privacy label rating for itemsSaid->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Data with the highest data privacy label level in the data set;
the data backup set generation module is used for inputting the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module is used for collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to the trusted data center;
and the data backup module is used for uploading the collected backup data to the hong Meng Yun backup server for backup after the trusted data center re-encrypts the backup data.
8. A computer device, the computer device comprising a memory and a processor; the memory stores code, and the processor is configured to acquire the code and perform the method for backing up data of a cellular phone terminal based on the hong system as claimed in any one of claims 1 to 6.
9. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the method for backing up data of a cellular phone terminal based on the hong system as claimed in any one of claims 1 to 6.
CN202310468900.8A 2023-04-27 2023-04-27 Mobile phone terminal data backup method and system based on hong Monte-go system Active CN116204357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310468900.8A CN116204357B (en) 2023-04-27 2023-04-27 Mobile phone terminal data backup method and system based on hong Monte-go system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310468900.8A CN116204357B (en) 2023-04-27 2023-04-27 Mobile phone terminal data backup method and system based on hong Monte-go system

Publications (2)

Publication Number Publication Date
CN116204357A CN116204357A (en) 2023-06-02
CN116204357B true CN116204357B (en) 2023-08-04

Family

ID=86517581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310468900.8A Active CN116204357B (en) 2023-04-27 2023-04-27 Mobile phone terminal data backup method and system based on hong Monte-go system

Country Status (1)

Country Link
CN (1) CN116204357B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778395A (en) * 1995-10-23 1998-07-07 Stac, Inc. System for backing up files from disk volumes on multiple nodes of a computer network
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007521552A (en) * 2003-06-25 2007-08-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Automatic and selective backup system on home network
US7392356B1 (en) * 2005-09-06 2008-06-24 Symantec Corporation Promotion or demotion of backup data in a storage hierarchy based on significance and redundancy of the backup data
US20080046483A1 (en) * 2006-08-16 2008-02-21 Lehr Douglas L Method and system for selecting the timing of data backups based on dynamic factors
CN105183584A (en) * 2015-08-18 2015-12-23 深圳市雪球科技有限公司 Application cloud backup method and system thereof
US11030054B2 (en) * 2019-01-25 2021-06-08 International Business Machines Corporation Methods and systems for data backup based on data classification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778395A (en) * 1995-10-23 1998-07-07 Stac, Inc. System for backing up files from disk volumes on multiple nodes of a computer network
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component

Also Published As

Publication number Publication date
CN116204357A (en) 2023-06-02

Similar Documents

Publication Publication Date Title
Celesti et al. Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems
US9396341B1 (en) Data encryption in a de-duplicating storage in a multi-tenant environment
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
Fan et al. Hybrid data deduplication in cloud environment
Virvilis et al. Secure cloud storage: Available infrastructures and architectures review and evaluation
Marques et al. Secure deduplication on mobile devices
Pandian et al. Effective fragmentation minimization by cloud enabled back up storage
CN103678570B (en) The multi-level storage of journal file in cloud environment and restoration methods and system
KR101553986B1 (en) System and method of distrubuted data storage, restoration
Xie et al. Security-aware and efficient data deduplication for edge-assisted cloud storage systems
CN116204357B (en) Mobile phone terminal data backup method and system based on hong Monte-go system
KR102216869B1 (en) Apparatus and method for decrypting end-to-end encrypted files
US20090103723A1 (en) System And Method For Secure Storage Of Data
Kirubakaran et al. A cloud based model for deduplication of large data
CN116910781B (en) Mobile phone backup data searching device based on background password verification
CN116915501B (en) Internet of things information security management method and system
CN109660604B (en) Data access method and equipment
Sugumar et al. Performance Analysis of Fragmentation and Replicating Data Over Multi-clouds with Security
Reddy et al. A survey on secure cloud storage with techniques like data deduplication and convergent key management
Bhavya et al. Improving Storage Efficiency with Multi-cluster Deduplication and Achieving High-Data Availability in Cloud
Nandhini et al. A review of hilevel authorized deduplication method for cloud storage system
Al_Hachemi Cloud Computing Services with Minimal Redundancy, Storage, and Effective Processing Capabilities
Bernstein Predicting performance for post-quantum encrypted-file systems
Rahman et al. Real time compressed sensory data processing framework to integrate wireless sensory networks with mobile cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant