CN116204357B - Mobile phone terminal data backup method and system based on hong Monte-go system - Google Patents
Mobile phone terminal data backup method and system based on hong Monte-go system Download PDFInfo
- Publication number
- CN116204357B CN116204357B CN202310468900.8A CN202310468900A CN116204357B CN 116204357 B CN116204357 B CN 116204357B CN 202310468900 A CN202310468900 A CN 202310468900A CN 116204357 B CN116204357 B CN 116204357B
- Authority
- CN
- China
- Prior art keywords
- data
- backup
- mobile phone
- phone terminal
- terminal user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012544 monitoring process Methods 0.000 claims description 11
- 238000012986 modification Methods 0.000 claims description 10
- 230000004048 modification Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 9
- 230000004927 fusion Effects 0.000 claims description 8
- 230000001413 cellular effect Effects 0.000 claims description 5
- 238000013480 data collection Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000005259 measurement Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000003066 decision tree Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
In the method and the system for backing up the mobile phone terminal data based on the hong Mongolian system, when the operation event of the mobile phone terminal user on the data set is monitored, the operation event on the data set is recorded in an operation log; obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log; inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree; collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center; the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup, so that unnecessary data backup is avoided, data redundancy is effectively reduced, and the practicability and efficiency of the backup data are improved.
Description
Technical Field
The application relates to the technical field of mobile phone terminal data backup, in particular to a mobile phone terminal data backup method and system based on a hong Monte system.
Background
With the continuous promotion and improvement of technology, the mobile phone has more and more powerful functions. People increasingly rely on the use of mobile phones for communication, office, information acquisition, entertainment, and other activities. The mobile phone provides convenience for life, and the mobile phone terminal necessarily bears a large amount of private information of the user. Leakage or loss of mobile phone data may cause leakage or loss of private information, resulting in irrecoverable serious consequences.
In order to ensure the real-time performance and the safety of user data backup to the maximum extent, a plurality of mobile phone data backup methods appear, and the mobile phone backup method based on the hong Mongolian system in the prior art mainly adopts a mobile phone incremental backup technology, namely, all data selected by a user independently are backed up when the user is backed up for the first time, then the data needing incremental backup is backed up to a server according to the setting timing of the user or when the incremental data reaches a preset value, and when the backed up data needs to be restored, the data can be downloaded from the server for restoration. However, in this prior art, all incremental data is backed up, but many backed up data are not important or necessary for the user in fact, and do not need to be backed up, and if all incremental data are backed up, a great deal of data redundancy is caused.
Disclosure of Invention
The application provides a mobile phone terminal data backup method and system based on a hong Mongolian system, which are used for solving the technical problem of data redundancy caused by the backup of all incremental data in the prior art.
In order to solve the technical problems, the application adopts the following technical scheme:
in a first aspect, the present application provides a mobile phone terminal data backup method based on a hong Mongolian system, including the following steps:
carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored;
obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree;
collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center;
and the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup.
In some embodiments, when the operation event of the mobile phone terminal user on the data set is monitored, recording the operation event on the data set in the operation log specifically includes:
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
In some embodiments, determining the current backup recommendation level according to the data privacy tag and the operation log of the mobile phone terminal user specifically includes:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>;
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>;
According to the operation logAverage data privacy label rating of item +.>Said->Item data to data set with highest data privacy label ratingDistance of data of>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination, namely:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Is the data in the dataset with the highest data privacy label rating.
In some embodiments, collecting backup data and encrypting the backup data specifically includes:
collecting data information according to the data indexes in the data backup set to generate a data plaintext;
determining a general secret key;
calculating a time key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log;
and encrypting the data plaintext by the universal key and the time key to obtain ciphertext.
In some embodiments, the encrypting the collected backup data by the trusted data center specifically includes:
the trusted data center generates a re-encryption public key and a private key, wherein the re-encryption public key is used for encrypting data, the re-encryption private key is used for decrypting data, ciphertext uploaded by the mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted.
In some embodiments, the trusted data center further comprises, after re-encrypting the collected backup data:
and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set.
In some embodiments, the operations of the mobile phone terminal user on the data set include operations of creating, modifying and deleting the data set.
In a second aspect, the present application provides a mobile phone terminal data backup system based on a hong Monte system, including:
the data full backup module is used for carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module is used for monitoring operation events of a mobile phone terminal user, and when the operation events of the mobile phone terminal user on the data set are monitored, the operation events of the data set are recorded in an operation log;
the backup recommendation degree determining module is used for obtaining the data privacy label of the mobile phone terminal user every time a backup time period passes and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
the data backup set generation module is used for inputting the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module is used for collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to the trusted data center;
and the data backup module is used for uploading the collected backup data to the hong Meng Yun backup server for backup after the trusted data center re-encrypts the backup data.
In a third aspect, the present application provides a computer device comprising a memory and a processor; the memory stores codes, and the processor is configured to acquire the codes and execute the mobile phone terminal data backup method based on the hong Monte-Menu system.
In a fourth aspect, the present application provides a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the foregoing method for backing up data of a mobile phone terminal based on a hong Mongolian system.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
in the mobile phone terminal data backup method and system based on the hong system, all data selected to be backed up by a mobile phone terminal user for the first time are fully backed up, and a data set is generated, wherein the data set comprises a data privacy label of the mobile phone terminal user; monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored; obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log; inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree; collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center; the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to a hong Meng Yun backup server for backup, wherein the current backup recommendation degree is determined according to the data privacy label of the mobile phone terminal user and the operation log, namely, the demand of the user on the data is predicted through the data privacy label and the operation log, the data importance degree, the operation frequency of the user on the data and the like are included, the current backup recommendation degree is determined, the current backup recommendation degree is input into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree; and collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to a trusted data center, so that unnecessary data backup is avoided, and all incremental data are not backed up, thereby effectively reducing data redundancy and improving the practicability and efficiency of the backup data.
Drawings
FIG. 1 is an exemplary flow chart of a method for backing up data for a cellular phone terminal based on a hong system according to some embodiments of the present application;
FIG. 2 is a schematic diagram of a network architecture of a mobile phone terminal data backup system based on a hong Monte-cover system according to some embodiments of the present application;
fig. 3 is a schematic diagram of functional modules of a data backup system of a mobile phone terminal based on a hong and Monte-cover system according to some embodiments of the present application;
fig. 4 is a schematic diagram of an exemplary architecture of a computer device implementing a method for backing up data for a cellular phone terminal based on a hong system according to some embodiments of the present application.
Description of the embodiments
Referring to fig. 1, the flowchart of a specific embodiment of a mobile phone terminal data backup method based on the hong Monte system in the present application mainly includes the following steps:
in step S101, the mobile terminal user selects all the data to be backed up for the first time to perform full backup and generate a data set, where the data set includes a data privacy tag of the mobile terminal user, and in specific implementation, the data set may be generated by the following manner:
firstly, determining data which need to be backed up and are selected by a mobile phone terminal user, including but not limited to photos, videos, music, documents and the like;
secondly, carrying out full backup on the data to be backed up selected by the mobile phone terminal, namely, completely copying one copy of the data, and uploading the data to a hong Mongolian server for backup, wherein each backup data can be marked with a data privacy label, and the privacy grade degree of the data is marked;
and storing the backup data and the data privacy label into a data set, and establishing an index, so that backup and retrieval are facilitated.
It should be noted that, the types of data to be backed up selected by the user mainly include contacts, information, recorders, applications and data, memos, wi-Fi, cell phone households, scene intelligence, clocks, weather, desktops, harassment interception, etc., while the data privacy label represents the importance of the user to the data, the higher the data privacy grade of the data privacy label is set than the data privacy grade of the data privacy label which is not set, the more important the data privacy label is, the less tolerant to be lost, and the privacy grade is set by the data privacy label, so that the data with the highest priority privacy grade can be backed up, the flexibility of incremental backup of the user data is increased, and details are omitted.
In step S102, the operation event of the mobile terminal user is monitored, and when the operation event of the mobile terminal user on the data set is monitored, the operation event of the data set is recorded in an operation log, and the following manner is adopted when the operation log is specifically implemented:
monitoring an operation event of a mobile phone terminal user on a data set and modifying operation on a data privacy label;
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
It should be noted that, in the present application, the operation of the mobile phone terminal user on the data set may include operations of creating, modifying, and deleting the data set, which is not limited herein specifically.
In step S103, each time a backup time period passes, a data privacy label of the mobile phone terminal user is obtained, and the current backup recommendation degree is determined according to the data privacy label of the mobile phone terminal user and the operation log, and the following implementation method is adopted, namely:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>;
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>;
According to the operation logAverage data privacy label rating of item +.>Said->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation, wherein the current backup recommendation isBackup recommendation degree->The following formula is adopted for determination, namely:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Is the data in the dataset with the highest data privacy label rating.
In the prior art, in order to backup mobile phone data, a preset backup period is generally set, that is, the time interval of the backup period is fixed. However, this approach may result in different data sizes for each backup. If the granularity of the backup time is set to be too small, a large amount of data fragments can be generated, a large amount of bandwidth and transmission time are occupied, and the normal use of the mobile phone can be influenced; if the granularity of the backup time is set too large, the computing capacity of the mobile phone terminal is limited, and when a large amount of data is processed at one time, the backup delay is serious, and meanwhile, the backup files are larger, so that the storage and transmission are not facilitated. Therefore, a balance needs to be achieved between the backup period and the data size to achieve the optimal backup effect, and the operation log is used in the present applicationAverage data privacy label rating of item +.>Said->Item data to dataset havingDistance of data of highest data privacy label level +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>The method has the advantages that the current backup recommendation degree is determined, the data backup set can be generated by combining the past historical backup data information and the current equipment incremental backup data information, the data size when past data transmission is successfully referenced by the historical backup data experience is fully considered in the determination of the current backup recommendation degree, the backup period can be calculated in a self-adaptive mode, the problems of data fragments and overlong transmission time caused by too small or too large time granularity are avoided, and therefore the backup efficiency and the data transmission success rate are improved.
In addition, the determination of the current backup recommendation degree fully considers the private data grade and the distance between the private data in the current backup data, and can control the length of the data sheet uploaded each time to be uniform while ensuring the priority uploading of important data.
In step S104, the determined current backup recommendation is input to a content backup calculator, which generates a data backup set according to the current backup recommendation, and in specific implementation, the content backup calculator may generate the data backup set according to the current backup recommendation in a plurality of ways, for example, by constructing a decision tree model, using the backup recommendation as an input variable, selecting backup data according to the value of the variable, thereby generating the data backup set, or by clustering backup data, classifying similar data into a group, and then determining which groups of data need to be backed up according to the backup recommendation, thereby generating the data backup set.
In some embodiments, the following description is providedIf the current backup recommendation degree reaches the historical backup recommendation degree measurement value, the operation log information contained in the registration data of the highest data privacy label in the current operation log from the first data behind the preamble backup node can be intercepted; then forming a pre-backup data set according to data corresponding to the record of the creation, modification and deletion operation of the data set in the operation log; finally, searching the data content abstract in the preliminary data set, deleting the repeated data content, obtaining a data backup set, and updating the historical backup recommendation degree measurement value; wherein historical backup recommendation metricsCan be determined according to the following formula:
wherein ,is->And the secondary historical backup recommendation degree measurement value, wherein n is the historical backup times.
In the above embodiment, in order to avoid the interference of the data backup recommendation caused by the extreme situation, such as long-time no data privacy label or all high data privacy label information, the historical backup recommendation measurement is adopted, and because the backup recommendation in the initialization is credible, the method can avoid the influence of the extreme situation, and generate the corresponding data backup set by calculating the reasonable backup recommendation.
In step S105, the backup data is collected according to the data backup set, encrypted and uploaded to the trusted data center, and in specific implementation, the method may be implemented as follows:
firstly, data information is collected according to data indexes in a data backup set to generate a data plaintext, a file access interface of a mobile phone terminal can be accessed according to the index information in the data backup set, backup data are connected end to end according to the sequence in the data backup set, and then the data are fragmented again according to the requirement of an encryption algorithm; collecting data information according to the data indexes in the data backup set processed by the steps to obtain a data plaintext;
secondly, determining a general secret key, and calculating a time secret key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log, wherein the time stamp can be used as a private key because the time for writing the operation of a user to the data set into the log is arbitrary and unknown;
and encrypting the data plaintext through the universal key and the time key to obtain a ciphertext, namely combining the universal key and the time key to obtain a subkey, replacing the subkey to obtain a replacement key, and encrypting the data plaintext through the replacement key to obtain the ciphertext.
In the encryption process, the mobile phone terminal can upload the encrypted data sheet to the trusted data center, namely, encrypt the data sheet and upload the encrypted data sheet.
It should be noted that, considering that the computing power of the mobile phone is limited, in some embodiments, a symmetric encryption algorithm is adopted, and according to the algorithm characteristics, the data slice may be set to 64 bits, which is not limited herein.
In step S106, the trusted data center re-encrypts the collected backup data and then uploads the encrypted backup data to the hong Meng Yun backup server for backup, which may be specifically implemented by the following ways:
the trusted data center firstly receives all ciphertext uploaded by equipment in a private network through the private network, then re-encrypts the ciphertext, and particularly generates a re-encrypted public key and a private key during re-encryption, wherein the re-encrypted public key is used for encrypting data, the re-encrypted private key is used for decrypting the data, the ciphertext uploaded by a mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted, which is not repeated here.
It should be noted that, as a preferred embodiment, the trusted data center in the present application may further include, after re-encrypting the collected backup data: and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set, namely, performs feature reconstruction on the re-encrypted data, and finally fuses the data through features and uploads the data to the hong Meng Yun server for backup.
In some embodiments, data fusion may be achieved in the following manner:
sequentially storing the re-encrypted data in a re-encryption array which is definedA plurality of bit arrays, the bits in each array being initialized to 0;
calculating the data in the re-encrypted data one by one through modulo arithmetic (MOD) to obtain a function value, and recording the function value in a defined bit array;
taking the result expressed by the bit array as a new feature vector, and inputting the new feature vector into a feature reconstruction mechanism;
the feature reconstruction mechanism compresses the new data feature vector and fuses the data according to the result to obtain a fused data set.
It should be noted that in the prior art, the backup data is simply and symmetrically encrypted only at the mobile phone terminal, such as encryption by an advanced encryption standard (Advanced Encryption Standard, AES) algorithm, etc., the encryption mode is relatively simple, if the backup data is intercepted in the process of uploading a key, encryption invalidation will be caused, and unexpected serious consequences are caused.
In addition, the method and the device for processing the data in the private network have the advantages that the trusted data center is introduced to fuse, re-encrypt and block transmission of the backup data in the private network, so that the data processing pressure of the mobile phone terminal is released, when the re-encrypted data are fused, the data are subjected to characteristic reconstruction, the data are fused, system resources can be fully utilized, the occupation of the data on the storage resources of the cloud is reduced, and due to the fact that the data characteristics are extracted, the associated data are stored in the same area more easily, and the data collection efficiency of the system can be improved when the data are restored.
When the mobile phone terminal user sends a data backup and restore request, the hong Meng Yun backup server restores the mobile phone backup data of the mobile phone terminal user according to the data backup and restore request, specifically, the hong Meng Yun backup server can establish a link with the trusted data center, receive and store the fusion data set uploaded by the trusted data center through the data transmission channel, and when the mobile phone terminal user sends a data backup and restore request, restore the mobile phone backup data of the mobile phone terminal user according to the data backup and restore request.
Referring to fig. 2, which is a network architecture diagram of a mobile phone terminal data backup system based on the hong system of the present application, a network architecture 200 of the mobile phone terminal data backup system based on the hong system of the present embodiment mainly includes: the mobile phone terminal 201, the trusted data center 202 and the hong Meng Yun backup server 203 are respectively described as follows:
the mobile phone terminal 201, in this application, the mobile phone terminal 201 is a client for realizing backup, and can backup and restore data on the mobile phone, and the backup data is uploaded to the hong Meng Yun backup server 203 for cloud backup, so as to ensure the safety and durability of the data;
the trusted data center 202, in this application, the trusted data center 202 refers to a data storage, management and processing center with high guarantee in terms of security, reliability, availability, compliance and the like, and the trusted data center 202 generally adopts strict security measures, including various measures such as physical security, logical security, network security and the like, so as to ensure the security and confidentiality of data, and in this application, the mobile phone terminal 201 uploads backup data to the hong Meng Yun backup server 203 through the trusted data center 202 for cloud backup;
hong Meng Yun backup server 203, hong Meng Yun backup server 203 in the present application is a cloud backup server based on hong Mongolian system, and is mainly used for storing and managing data backup of mobile phone terminal 201. The server provides high-efficiency, safe and reliable data backup service, so that a user can backup and restore mobile phone data anytime and anywhere, the hong Meng Yun backup server 203 can adopt a distributed architecture, has high availability and fault tolerance and can ensure the reliability and the integrity of the backup data.
Referring to fig. 3, the functional module of the mobile phone terminal data backup system based on the hong system according to some embodiments of the present application mainly includes: the data full backup module 301, the operation event monitoring module 302, the backup recommendation degree determining module 303, the data backup set generating module 304, the backup data collecting module 305 and the data backup module 306 are respectively described as follows:
the data full backup module 301 is mainly used for carrying out full backup on all data selected to be backed up by a mobile phone terminal user for the first time and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module 302, where the operation event monitoring module 302 is mainly configured to monitor an operation event of a mobile phone terminal user, and record the operation event of the data set in an operation log when the operation event of the mobile phone terminal user on the data set is monitored;
the backup recommendation degree determining module 303, where the backup recommendation degree determining module 303 is mainly configured to obtain a data privacy label of the mobile phone terminal user after each backup time period, and determine a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log;
the data backup set generating module 304, where the data backup set generating module 304 is mainly configured to input the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module 305, where the backup data collection module 305 is mainly configured to collect backup data according to the data backup set, encrypt the collected backup data, and upload the encrypted backup data to a trusted data center;
the data backup module 306, in this application, the data backup module 306 is mainly used for encrypting the collected backup data again by the trusted data center and uploading the encrypted backup data to the hong Meng Yun backup server for backup.
In some embodiments, the present application also provides a computer device comprising a memory and a processor; the memory stores codes, and the processor is configured to acquire the codes and execute the data backup method of the mobile phone terminal based on the hong Monte system.
Referring to fig. 4, the structure of a computer device for implementing the data backup method of a mobile phone terminal based on the hong system according to the embodiment of the present application is shown, where the data backup method of a mobile phone terminal based on the hong system in the above embodiment may be implemented by the computer device shown in fig. 4, and the computer device includes at least one processor 401, a communication bus 402, a memory 403, and at least one communication interface 404.
The processor 401 may be a general purpose central processing unit (central processing unit, CPU), application-specific integrated circuit (ASIC) or one or more of the methods for controlling the execution of the data backup method of the cellular phone terminal based on the hong system in the present application.
Communication bus 402 may include a path to transfer information between the aforementioned components.
The Memory 403 may be, but is not limited to, a read-only Memory (ROM) or other type of static storage device that can store static information and instructions, a random access Memory (random access Memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only Memory (electrically erasable programmable read-only Memory, EEPROM), a compact disc (compact disc read-only Memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 403 may be self-contained and be coupled to the processor 401 via the communication bus 402. Memory 403 may also be integrated with processor 401.
The memory 403 is used for storing program codes for executing the embodiments of the present application, and is controlled by the processor 401 to execute the embodiments. The processor 401 is used to execute program code stored in the memory 403. One or more software modules may be included in the program code. The determination of backup recommendation in the above embodiments may be implemented by one or more software modules in the processor 401 and program code in the memory 403.
The communication interface 404 uses any transceiver-like device for communicating with other devices or communication networks, such as ethernet, wireless access ((radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
In a specific implementation, as an embodiment, a computer device may include a plurality of processors, where each of the processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The computer device may be a general purpose computer device or a special purpose computer device. In particular implementations, the computer device may be a desktop, laptop, web server, palmtop (personal digital assistant, PDA), mobile handset, tablet, wireless terminal device, communication device, or embedded device. Embodiments of the present application are not limited in the type of computer device.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
For example, in some embodiments, the present application further provides a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the foregoing method for backing up data of a mobile phone terminal based on a hong Monte-Menu system.
The foregoing description of the preferred embodiments of the present application is not intended to be limiting, but rather is intended to cover any and all modifications, equivalents, alternatives, and improvements within the spirit and principles of the present application.
Claims (9)
1. A mobile phone terminal data backup method based on a hong Monte-Meng system is characterized by comprising the following steps:
carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
monitoring operation events of a mobile phone terminal user, and recording the operation events of the data set in an operation log when the operation events of the mobile phone terminal user on the data set are monitored;
obtaining a data privacy label of the mobile phone terminal user after each backup time period, and determining a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log, wherein determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log specifically comprises:
retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log;
updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record;
before determining the current operation logAverage data privacy label rating of item +.>;
Retrieving data with the highest data privacy label level in the current operation log;
determination of the firstDistance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>;
According to the operation logAverage data privacy label rating of item +.>Said->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination:
wherein ,/>For the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Data with the highest data privacy label level in the data set;
inputting the current backup recommendation degree into a content backup calculator, and generating a data backup set by the content backup calculator according to the current backup recommendation degree;
collecting backup data according to the data backup set, encrypting the collected backup data, and uploading the encrypted backup data to a trusted data center;
and the trusted data center re-encrypts the collected backup data and then uploads the re-encrypted backup data to the hong Meng Yun backup server for backup.
2. The method of claim 1, wherein when an operational event of the data set by a mobile phone end user is monitored, recording the operational event of the data set in an operation log specifically comprises:
when the operation event of the mobile phone terminal user on the data set is monitored, index information and a data privacy label of the operated data are searched in the data set, and the index information, the data privacy label, the data content abstract, the timestamp of the current moment and the user ID of the data are recorded in an operation log.
3. The method of claim 1, wherein collecting backup data and encrypting the backup data specifically comprises:
collecting data information according to the data indexes in the data backup set to generate a data plaintext;
determining a general secret key;
calculating a time key by taking a time stamp as a parameter for the highest data privacy label grade data in the current operation log;
and encrypting the data plaintext by the universal key and the time key to obtain ciphertext.
4. The method of claim 1, wherein the trusted data center re-encrypts the collected backup data specifically comprises:
the trusted data center generates a re-encryption public key and a private key, wherein the re-encryption public key is used for encrypting data, the re-encryption private key is used for decrypting data, ciphertext uploaded by the mobile phone terminal is decrypted to obtain plaintext backup data, and the plaintext backup data is re-encrypted.
5. The method of claim 1, wherein the trusted data center further comprises, after re-encrypting the collected backup data:
and the trusted data center performs data fusion on the re-encrypted data to obtain a fusion data set.
6. The method of claim 1, wherein the operation of the data set by the mobile phone end user includes a create, modify, delete operation of the data set.
7. A mobile phone terminal data backup system based on a hong Monte system is characterized by comprising:
the data full backup module is used for carrying out full backup on all data selected to be backed up for the first time by a mobile phone terminal user and generating a data set, wherein the data set comprises a data privacy label of the mobile phone terminal user;
the operation event monitoring module is used for monitoring operation events of a mobile phone terminal user, and when the operation events of the mobile phone terminal user on the data set are monitored, the operation events of the data set are recorded in an operation log;
the backup recommendation degree determining module is configured to obtain a data privacy label of the mobile phone terminal user every time a backup time period elapses, determine a current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log, where determining the current backup recommendation degree according to the data privacy label of the mobile phone terminal user and the operation log specifically includes: retrieving all modification records of the data privacy labels of the mobile phone terminal user in the current operation log; updating the data privacy label data of the mobile phone terminal user again according to the retrieved modification record; before determining the current operation logAverage data privacy label rating of item +.>The method comprises the steps of carrying out a first treatment on the surface of the Retrieving data with the highest data privacy label level in the current operation log; confirm->Distance of item data to data with highest data privacy tag class in data set +.>And distance +.f. of data with highest data privacy label level to first piece of data>The method comprises the steps of carrying out a first treatment on the surface of the According to the operation log ∈>Average data privacy label rating for itemsSaid->Distance of item data to data with highest data privacy tag class in data set +.>And the distance of the data with the highest data privacy label level to the first piece of data +.>Determining a current backup recommendation degree, wherein the current backup recommendation degree is +.>The following formula is adopted for determination:
wherein ,for the number of data pieces to be recommended for backup, +.>For the number of all data in the dataset, +.>Data with the highest data privacy label level in the data set;
the data backup set generation module is used for inputting the current backup recommendation degree into a content backup calculator, and the content backup calculator generates a data backup set according to the current backup recommendation degree;
the backup data collection module is used for collecting backup data according to the data backup set, encrypting the collected backup data and uploading the encrypted backup data to the trusted data center;
and the data backup module is used for uploading the collected backup data to the hong Meng Yun backup server for backup after the trusted data center re-encrypts the backup data.
8. A computer device, the computer device comprising a memory and a processor; the memory stores code, and the processor is configured to acquire the code and perform the method for backing up data of a cellular phone terminal based on the hong system as claimed in any one of claims 1 to 6.
9. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the method for backing up data of a cellular phone terminal based on the hong system as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310468900.8A CN116204357B (en) | 2023-04-27 | 2023-04-27 | Mobile phone terminal data backup method and system based on hong Monte-go system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310468900.8A CN116204357B (en) | 2023-04-27 | 2023-04-27 | Mobile phone terminal data backup method and system based on hong Monte-go system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116204357A CN116204357A (en) | 2023-06-02 |
CN116204357B true CN116204357B (en) | 2023-08-04 |
Family
ID=86517581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310468900.8A Active CN116204357B (en) | 2023-04-27 | 2023-04-27 | Mobile phone terminal data backup method and system based on hong Monte-go system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116204357B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778395A (en) * | 1995-10-23 | 1998-07-07 | Stac, Inc. | System for backing up files from disk volumes on multiple nodes of a computer network |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007521552A (en) * | 2003-06-25 | 2007-08-02 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Automatic and selective backup system on home network |
US7392356B1 (en) * | 2005-09-06 | 2008-06-24 | Symantec Corporation | Promotion or demotion of backup data in a storage hierarchy based on significance and redundancy of the backup data |
US20080046483A1 (en) * | 2006-08-16 | 2008-02-21 | Lehr Douglas L | Method and system for selecting the timing of data backups based on dynamic factors |
CN105183584A (en) * | 2015-08-18 | 2015-12-23 | 深圳市雪球科技有限公司 | Application cloud backup method and system thereof |
US11030054B2 (en) * | 2019-01-25 | 2021-06-08 | International Business Machines Corporation | Methods and systems for data backup based on data classification |
-
2023
- 2023-04-27 CN CN202310468900.8A patent/CN116204357B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778395A (en) * | 1995-10-23 | 1998-07-07 | Stac, Inc. | System for backing up files from disk volumes on multiple nodes of a computer network |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
Also Published As
Publication number | Publication date |
---|---|
CN116204357A (en) | 2023-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Celesti et al. | Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems | |
US9396341B1 (en) | Data encryption in a de-duplicating storage in a multi-tenant environment | |
US9256499B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
US9122882B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
Fan et al. | Hybrid data deduplication in cloud environment | |
Virvilis et al. | Secure cloud storage: Available infrastructures and architectures review and evaluation | |
Marques et al. | Secure deduplication on mobile devices | |
Pandian et al. | Effective fragmentation minimization by cloud enabled back up storage | |
CN103678570B (en) | The multi-level storage of journal file in cloud environment and restoration methods and system | |
KR101553986B1 (en) | System and method of distrubuted data storage, restoration | |
Xie et al. | Security-aware and efficient data deduplication for edge-assisted cloud storage systems | |
CN116204357B (en) | Mobile phone terminal data backup method and system based on hong Monte-go system | |
KR102216869B1 (en) | Apparatus and method for decrypting end-to-end encrypted files | |
US20090103723A1 (en) | System And Method For Secure Storage Of Data | |
Kirubakaran et al. | A cloud based model for deduplication of large data | |
CN116910781B (en) | Mobile phone backup data searching device based on background password verification | |
CN116915501B (en) | Internet of things information security management method and system | |
CN109660604B (en) | Data access method and equipment | |
Sugumar et al. | Performance Analysis of Fragmentation and Replicating Data Over Multi-clouds with Security | |
Reddy et al. | A survey on secure cloud storage with techniques like data deduplication and convergent key management | |
Bhavya et al. | Improving Storage Efficiency with Multi-cluster Deduplication and Achieving High-Data Availability in Cloud | |
Nandhini et al. | A review of hilevel authorized deduplication method for cloud storage system | |
Al_Hachemi | Cloud Computing Services with Minimal Redundancy, Storage, and Effective Processing Capabilities | |
Bernstein | Predicting performance for post-quantum encrypted-file systems | |
Rahman et al. | Real time compressed sensory data processing framework to integrate wireless sensory networks with mobile cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |