CN116432199A - Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment - Google Patents

Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment Download PDF

Info

Publication number
CN116432199A
CN116432199A CN202310200867.0A CN202310200867A CN116432199A CN 116432199 A CN116432199 A CN 116432199A CN 202310200867 A CN202310200867 A CN 202310200867A CN 116432199 A CN116432199 A CN 116432199A
Authority
CN
China
Prior art keywords
backup
data
cloud
hash value
cloud platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310200867.0A
Other languages
Chinese (zh)
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anchao Cloud Software Co Ltd
Original Assignee
Anchao Cloud Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anchao Cloud Software Co Ltd filed Critical Anchao Cloud Software Co Ltd
Priority to CN202310200867.0A priority Critical patent/CN116432199A/en
Publication of CN116432199A publication Critical patent/CN116432199A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The application discloses a cloud platform remote data backup method, a cloud platform remote data recovery method and electronic equipment. The method comprises the following steps: receiving a data backup request sent by a client of a cloud platform, wherein the data backup request is used for indicating a database of a cloud end of the cloud platform to backup; generating a random key in response to a data backup request, acquiring backup data of a database, and storing the backup data in a local area; generating a hash value from the backup data by a hash function; encrypting the hash value through a random key to obtain encrypted data; the encrypted data is stored in a target directory in the cloud. The cloud platform cloud storage backup data management method and device solve the problems that in the related technology, the risk of cloud platform cloud storage backup data is high and malicious tampering is easy.

Description

Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment
Technical Field
The application relates to the field of cloud platforms, in particular to a cloud platform remote data backup method, a cloud platform remote data recovery method and electronic equipment.
Background
In the prior art, the remote backup data can firstly generate database backup data in the current server and upload the database backup data to the remote server, and the previous database backup data can be acquired from the remote server and executed when the data is recovered remotely, so as to achieve the purpose of data recovery.
When the data is recovered, the previous database backup data is required to be obtained from the remote server, if the remote server is broken, the file is tampered maliciously, and a command for deleting the database or modifying the content of the database is added, so that the risk that the cloud platform cannot be used is caused, and the cloud platform has a large potential safety hazard.
Aiming at the problems that the cloud storage backup data of a cloud platform in the related technology has high risk and is easy to be tampered with maliciously, no effective solution is proposed at present.
Disclosure of Invention
The main purpose of the application is to provide a cloud platform remote data backup method, a recovery method thereof and electronic equipment, so as to solve the problems that in the related technology, the risk of cloud storage of backup data of a cloud platform is high and malicious tampering is easy.
To achieve the above object, according to one aspect of the present application, there is provided a cloud platform remote data backup method, the method including: receiving a data backup request sent by a client of a cloud platform, wherein the data backup request is used for indicating a database of a cloud end of the cloud platform to backup; generating a random key in response to the data backup request, acquiring backup data of the database, and storing the backup data in a local area; generating a hash value from the backup data by a hash function; encrypting the hash value through the random key to obtain encrypted data; and storing the backup data in a cloud target position, and storing the encrypted data in a target directory of the cloud.
Optionally, generating the random key in response to the data backup request includes: randomly generating bit key data of numbers and letters as the random key in response to the data backup request; and storing the random key and the request information of the data backup request.
Optionally, obtaining backup data of the database, and storing the backup data locally includes: sending a backup message to the database; acquiring backup data generated by the database in response to the backup message; and storing the acquired backup data in a cloud local.
Optionally, after storing the backup data in a target location of the cloud and storing the encrypted data in a target directory of the cloud, the method further includes: and deleting the backup data stored locally in the cloud.
Optionally, before storing the backup data in a target location of the cloud and storing the encrypted data in a target directory of the cloud, the method further includes: searching whether the target catalogue exists in the cloud end; and under the condition that the target directory does not exist, creating the target directory or selecting the target directory from the existing file directories in the cloud.
In order to achieve the above object, according to another aspect of the present application, there is provided a cloud platform remote data backup and restore method, which is characterized in that the method includes: receiving a backup recovery request sent by a client of a cloud platform, wherein the backup recovery request is used for indicating a database of a cloud end of the cloud platform to perform backup recovery; responding to the backup recovery request, acquiring a corresponding random key and backup data, and acquiring encrypted data of the backup data of the database from a target directory, wherein the backup data has a cloud target position, and the encrypted data is the data encrypted by the random key and is stored in the target directory; decrypting the encrypted data through the random key to obtain a decrypted hash value; generating a hash value from the backup data by a hash function; and under the condition that the hash value of the backup data is consistent with the decrypted hash value, performing backup recovery through the backup data.
Optionally, in a case that the hash value of the backup data is consistent with the decrypted hash value, performing backup recovery through the backup data includes: comparing the hash value of the backup data with the hash value obtained by decryption; executing a step of performing backup recovery by the backup data under the condition that the hash value of the backup data is consistent with the hash value obtained by decryption; and sending risk information to the client under the condition that the hash value of the backup data is inconsistent with the hash value obtained by decryption.
Optionally, in a case that the hash value of the backup data is inconsistent with the hash value obtained by decryption, after sending risk information to the client, the method further includes: and responding to the operation of continuing to restore, which is executed on the client, and executing the step of restoring the backup through the backup data.
To achieve the above object, according to another aspect of the present application, there is provided a computer-readable storage medium for storing a program, wherein the program executes the cloud platform remote data backup method of any one of the above, or the cloud platform remote data backup recovery method of any one of the above.
To achieve the above object, according to another aspect of the present application, there is provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the cloud platform remote data backup method of any one of the above, or the cloud platform remote data backup restoration method of any one of the above.
After backup data of a database are obtained, a hash value is generated through a hash function, the generated random key is utilized to encrypt the hash value to obtain encrypted data, the backup data are stored in a cloud target position, and the encrypted data are stored in a target directory of the cloud. The dual encryption of the backup data of the cloud database of the cloud platform is achieved, the safety of the backup data is guaranteed, the safety degree of the backup data is improved, the risk of falsification of the backup data is reduced, and the backup data can be accurately detected after falsification. The cloud platform cloud storage backup data management method and device solve the problems that in the related art, the risk of cloud storage backup data of a cloud platform is high, and the cloud platform is easy to tamper maliciously.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application, illustrate and explain the application and are not to be construed as limiting the application. In the drawings:
fig. 1 is a flowchart of a cloud platform remote data backup method according to an embodiment of the present application;
fig. 2 is a flowchart of a cloud platform remote data backup and recovery method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a data backup process provided according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a data recovery process provided in accordance with an embodiment of the present application;
fig. 5 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the present application described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The present invention is described below with reference to preferred implementation steps, and fig. 1 is a flowchart of a cloud platform remote data backup method according to an embodiment of the present application, as shown in fig. 1, where the method includes the following steps:
step S101, receiving a data backup request sent by a client of a cloud platform, wherein the data backup request is used for indicating a database of a cloud end of the cloud platform to carry out backup;
step S102, a random key is generated in response to a data backup request, backup data of a database is obtained, and the backup data is stored locally;
step S103, generating a hash value from the backup data through a hash function;
step S104, encrypting the hash value through a random key to obtain encrypted data;
step S105, storing the backup data in a target position of the cloud, and storing the encrypted data in a target directory of the cloud.
After the backup data of the database is obtained, a hash value is generated through a hash function, the generated random key is utilized to encrypt the hash value to obtain encrypted data, and the encrypted data is stored in a target directory of the cloud. The dual encryption of the backup data of the cloud database of the cloud platform is achieved, the safety of the backup data is guaranteed, the safety degree of the backup data is improved, the risk of falsification of the backup data is reduced, and the backup data can be accurately detected after falsification. The cloud platform cloud storage backup data management method and device solve the problems that in the related art, the risk of cloud storage backup data of a cloud platform is high, and the cloud platform is easy to tamper maliciously.
The execution body of the above steps may be a cloud device of a cloud platform, where the cloud device may be a cloud server, a cloud calculator, or the like, and the cloud device may include a processor, a calculator, or a controller, or the like, which performs data processing operations in the above steps, for example, step S101 to step S105.
The cloud platform generally includes a client, also called a front end, for interfacing with a client to provide services to the client. The cloud platform further comprises a cloud end which is in communication connection with the client, can carry various services, can respond to the request and provide the services when receiving the request of the client, and sends the returned data to the client.
The cloud end usually can dock many clients, and data processing and resource pressure of the cloud end equipment are great. Thus, the cloud may be connected to a remote device of a third party, e.g., a database, a server, a request for data services or data storage for the cloud.
In the related art, due to poor security of the cloud or the remote device connected to the cloud, when the cloud stores the backup data on the remote device, there is a risk of easy tampering. The embodiment provides a remote data backup method of a cloud platform, which generates a hash value by utilizing a hash function through backup data of a database to be backed up, encrypts the hash value by utilizing a random key, and generates encrypted data for storage. The security of the backup data is improved.
The data backup request is sent by the client, and because the client data of the cloud platform are stored in the database of the cloud, the cloud responds to the data backup request after the client sends the data backup request to the cloud, and the backup data corresponding to the data backup request is obtained. Thus, the data backup request also includes identification information indicating the backup data.
And after receiving the data backup request, the cloud terminal responds to the data backup request, calls a key generation service and randomly generates a random key. After the backup data is obtained, a hash function is used for processing to generate a hash value. The generated hash value is then encrypted with a random key.
The HASH function may be a HASH function. The random key may be a DES key.
Optionally, generating the random key in response to the data backup request includes: bit key data of numbers and letters is randomly generated as a random key in response to a data backup request; and storing the random key and the request information of the data backup request.
The bit key data may be 64-bit key data. The request information may include a request initiation time, information of an initiating user, and the like. The random key and the request information can be stored in a database of a disaster recovery service of the cloud. The security of the database is higher, the acquisition difficulty of the random key can be improved, and the security is further improved.
Optionally, obtaining backup data of the database, storing locally includes: sending a backup message to a database; obtaining backup data generated by a database in response to the backup message; and storing the acquired backup data in a cloud local.
When the cloud terminal obtains the backup data corresponding to the data backup request, the cloud terminal can find out the database where the backup data is located according to the identification information carried in the data backup request, and send a backup instruction to the database so as to enable the database to generate backup data required by backup. The backup data is then stored locally at the cloud for subsequent generation of the hash value.
Optionally, after storing the backup data in the target location of the cloud and storing the encrypted data in the target directory of the cloud, the method further includes: and deleting the backup data stored locally in the cloud.
After the backup data is hashed and encrypted by a random key to generate encrypted data, the local backup data is deleted to ensure the safety of the backup data.
The encrypted data is stored in the target directory of the cloud end, so that the encrypted data can be quickly and directly obtained from the target directory when the data backup is carried out later. The backup data can be checked more quickly, and the efficiency of checking the backup data is improved.
Optionally, before storing the backup data in the target location of the cloud and storing the encrypted data in the target directory of the cloud, the method further includes: searching whether a target directory exists in the cloud; and in the case that the target directory does not exist, creating the target directory or selecting the target directory from the existing file directories in the cloud.
Before storing the encrypted data in the target directory, it may be detected whether the target directory exists, and if the target directory exists, the encrypted data is stored, and if the target directory does not exist, the target directory is automatically created, and then the encrypted data is stored in the target directory.
Fig. 2 is a flowchart of a cloud platform remote data backup and recovery method according to an embodiment of the present application, and in order to achieve the above object, as shown in fig. 2, according to another aspect of the present application, there is provided a cloud platform remote data backup and recovery method, which includes:
step S201, receiving a backup recovery request sent by a client of a cloud platform, wherein the backup recovery request is used for indicating a database of a cloud end of the cloud platform to perform backup recovery;
step S202, responding to a backup recovery request, obtaining a corresponding random key and backup data, and obtaining encrypted data of the backup data of a database from a target directory, wherein the backup data has a cloud target position, and the encrypted data is encrypted by the random key and is stored in the target directory;
step S203, decrypting the encrypted data through the random key to obtain a decrypted hash value;
step S204, generating a hash value from the backup data through a hash function;
in step S205, when the hash value of the backup data matches the decrypted hash value, backup recovery is performed by the backup data.
The steps are used for responding to the backup recovery request, obtaining a corresponding random key, backing up data and encrypting data, decrypting the encrypting data through the random key to generate a hash value, generating the hash value from the backing up data through a hash function, and determining whether the backing up data is tampered or not through comparison of the hash value of the backing up data and the decrypted hash value. The method and the device have the advantages that the backup is carried out by double encryption of the backup data of the cloud database of the cloud platform, the safety of the backup data is guaranteed, the safety degree of the backup data is improved, the risk of falsification of the backup data is reduced, and the backup data can be accurately detected after falsification. The cloud platform cloud storage backup data management method and device solve the problems that in the related art, the risk of cloud storage backup data of a cloud platform is high, and the cloud platform is easy to tamper maliciously.
The execution body of the above steps may be a cloud device of a cloud platform, where the cloud device may be a cloud server, a cloud calculator, or the like, and the cloud device may include a processor, a calculator, or a controller, or the like, which performs data processing operations in the above steps, for example, step S201 to step S205.
Optionally, in a case where the hash value of the backup data is consistent with the decrypted hash value, performing backup recovery by the backup data includes: comparing the hash value of the backup data with the hash value obtained by decryption; executing the step of backup recovery through the backup data under the condition that the hash value of the backup data is consistent with the hash value obtained by decryption; and sending risk information to the client when the hash value of the backup data is inconsistent with the hash value obtained by decryption.
Whether the encrypted data is modified or not can be detected by comparing the hash value of the backup data with the hash value obtained by decryption, so that the safety of the backup data is further improved. It should be noted that the encrypted data may be stored in other trusted databases to avoid the possibility of the encrypted data being modified together.
Thus, the original hash value may be obtained from the trusted database prior to comparing the decrypted backup data with the original hash value. And then comparing the decrypted backup data with the original hash value.
Optionally, in the case that the hash value of the backup data is inconsistent with the hash value obtained by decryption, after the risk information is sent to the client, the method further includes: and responding to the operation of continuing to restore, which is executed on the client, and executing the step of restoring the backup through the backup data.
After the risk information is sent to the client, if the client still chooses to resume, the client should give priority to the client's will, and continue to execute the step of performing backup resume through the backup data.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in a different order than that illustrated herein.
It should be noted that this application also provides an alternative embodiment, and the following detailed description of this embodiment is provided.
The embodiment provides a trusted method and a trusted device for remotely backing up and recovering cloud platform data. The following describes terms related to the present embodiment:
hashing function: an arbitrary length input is transformed by a hashing algorithm into a fixed length output, which is the hash value. This transformation is a compressed mapping, i.e. the hash value is usually much smaller in space than the input, simply a function of compressing messages of arbitrary length to a message digest of a certain fixed length.
Symmetric encryption: the same key can be used for both encryption and decryption of information using an encryption method of a single key cryptosystem, which is called symmetric encryption, also called single key encryption.
DES (Data Encryption Standard): the DES algorithm is a symmetric cryptosystem in the cryptosystem, also known as the american data encryption standard. The plaintext is grouped according to 64 bits, the key is 64 bits long, the key is actually 56 bits to participate in the DES operation (8 th, 16 th, 24 th, 32 th, 40 th, 48 th, 56 th and 64 th bits are check bits, so that each key has an odd number of 1), and the grouped plaintext group and the 56-bit key form an encryption method of the ciphertext group by a bit substitution or exchange method.
UUID (Universally Unique Identifier) UUID is an abbreviation for universal unique identification code, a standard for software construction, and is also part of the open software foundation organization in the field of distributed computing environments. The purpose is to make all elements in the distributed system have unique identification information without the need of specifying the identification information by a central control terminal.
Fig. 3 is a schematic diagram of a data backup flow provided according to an embodiment of the present application, and as shown in fig. 3, a specific flow of data backup is as follows:
and S1, initiating a data backup request of the cloud platform by the front end, randomly generating 64-bit key data containing numbers and letters by the platform disaster recovery service after receiving the request, and recording the key data, the initiation time of the request and other contents in a database of the platform disaster recovery service.
And S2, the disaster recovery service is connected with the cloud platform database to prepare for backup of the database.
S3, the disaster recovery service needs to backup the database of the current cloud platform to a/home/backup catalog of the current server (if the catalog does not exist, the creation is needed). The name of the backup data is the current year, month, day, time, second plus the randomly generated UUID.
S4, the disaster recovery service needs to generate a hash value with a fixed length from the backup data through a hash function.
S5, the disaster recovery service symmetrically encrypts the hash value generated in S4 by using the key generated in S1.
And S6, uploading the data backup data to a/home/backup catalog of the remote server by the disaster backup service (if the catalog does not exist, the creation is needed) and deleting the local data backup data.
Fig. 4 is a schematic diagram of a data recovery flow provided according to an embodiment of the present application, and as shown in fig. 4, a specific flow of data recovery is as follows:
and S7, initiating a data recovery request of the cloud platform by the front end, and after receiving the request, the disaster recovery service needs to inquire a symmetric encryption key corresponding to the backup record and decrypt a hash value generated when the backup is carried out through the key.
And S8, if the hash value is successfully decrypted, the remote server needs to be accessed to acquire the database backup data.
And S9, accessing a remote server to acquire database backup data.
S10, generating a hash value with a fixed length from the database backup data through a hash function.
And S11, comparing whether the hash value of the database backup data to be restored is consistent with the decrypted hash value.
S12, the inconsistent hash values indicate that the current database backup data is modified, the possibility of containing malicious database commands exists in the file, the user needs to be prompted through the front end, and the user decides whether to continue to execute the recovery operation.
S13, the hash value is consistent to indicate that the current database backup data is not modified, and the recovery operation can be normally executed.
Here, for example, creating a data backup and performing a data recovery operation, first, a user a functioning as a system administrator is created in the cloud platform.
After the user A logs in the cloud platform, a data backup request is initiated, the address of a remote server is 10.10.10.10, and the account number and the password of the server are correctly filled in. After receiving the data backup request, the platform disaster recovery service randomly generates a DES encryption key of the current data backup request task and starts to generate backup data of the cloud platform database. After the backup data is generated, the backup data needs to be generated into a hash value with a fixed length through a hash function, encrypted by using a key generated randomly before and stored. After all of the above tasks are completed, the database backup data needs to be uploaded to a remote server.
After the user A logs in the cloud platform, a designated data backup record is required to be selected to initiate a data recovery request, a previously encrypted hash value is firstly required to be decrypted according to a key of the record, then a remote server which needs to access the backup obtains database backup data, the hash value of the current database backup data is obtained through a hash function, and whether the previously decrypted hash value is consistent with the hash value of the current database backup data or not is compared. If the data are consistent, the database backup data are not modified, and a recovery operation can be executed; if the hash values are inconsistent, the database backup data is tampered, a certain security risk is provided, the front end needs to be prompted, and a user decides whether to continue to execute the recovery operation.
The key point of this embodiment is that when executing data backup, a hash function is used to generate a hash value of a database file and encrypt and store the hash value, before executing data recovery, the decrypted hash value is compared with the hash value of the database file stored by the current remote server to determine whether the database file to be executed is modified, if the hash values are inconsistent, the user is reminded to determine whether to execute data recovery, so as to avoid executing malicious database scripts and affecting the cloud platform.
The embodiment of the invention provides a computer readable storage medium, wherein a program is stored on the computer readable storage medium, and the program realizes the cloud platform remote data backup method or the cloud platform remote data backup recovery method when being executed by a processor.
The embodiment of the invention provides a processor which is used for running a program, wherein the cloud platform remote data backup method or the cloud platform remote data backup recovery method is executed when the program runs.
Fig. 5 is a schematic diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 5, the embodiment of the present application provides an electronic device 50, where the device includes a processor, a memory, and a program stored on the memory and capable of running on the processor, and the steps of the cloud platform remote data backup method or the cloud platform remote data backup recovery method are implemented when the processor executes the program.
The device herein may be a server, PC, PAD, cell phone, etc.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable optical fiber image real-time correction device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable optical fiber image real-time correction device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A cloud platform remote data backup method, the method comprising:
receiving a data backup request sent by a client of a cloud platform, wherein the data backup request is used for indicating a database of a cloud end of the cloud platform to backup;
generating a random key in response to the data backup request, acquiring backup data of the database, and storing the backup data in a local area;
generating a hash value from the backup data by a hash function;
encrypting the hash value through the random key to obtain encrypted data;
and storing the backup data in a cloud target position, and storing the encrypted data in a target directory of the cloud.
2. The method of claim 1, wherein generating a random key in response to the data backup request comprises:
randomly generating bit key data of numbers and letters as the random key in response to the data backup request;
and storing the random key and the request information of the data backup request.
3. The method of claim 2, wherein obtaining backup data for the database, locally comprises:
sending a backup message to the database;
acquiring backup data generated by the database in response to the backup message;
and storing the acquired backup data in a cloud local.
4. The method of claim 3, wherein the backup data is stored at a cloud target location, and wherein after storing the encrypted data in a target directory in the cloud, the method further comprises:
and deleting the backup data stored locally in the cloud.
5. The method of claim 1, wherein the backup data is stored at a cloud target location and wherein the encrypted data is stored in a target directory in the cloud, the method further comprising:
searching whether the target catalogue exists in the cloud end;
and under the condition that the target directory does not exist, creating the target directory or selecting the target directory from the existing file directories in the cloud.
6. The cloud platform remote data backup and recovery method is characterized by comprising the following steps:
receiving a backup recovery request sent by a client of a cloud platform, wherein the backup recovery request is used for indicating a database of a cloud end of the cloud platform to perform backup recovery;
responding to the backup recovery request, acquiring a corresponding random key and backup data, and acquiring encrypted data of the backup data of the database from a target directory, wherein the backup data has a cloud target position, and the encrypted data is the data encrypted by the random key and is stored in the target directory;
decrypting the encrypted data through the random key to obtain a decrypted hash value;
generating a hash value from the backup data by a hash function;
and under the condition that the hash value of the backup data is consistent with the decrypted hash value, performing backup recovery through the backup data.
7. The method of claim 6, wherein, in the event that the hash value of the backup data matches the decrypted hash value, performing backup recovery from the backup data comprises:
comparing the hash value of the backup data with the hash value obtained by decryption;
executing a step of performing backup recovery by the backup data under the condition that the hash value of the backup data is consistent with the hash value obtained by decryption;
and sending risk information to the client under the condition that the hash value of the backup data is inconsistent with the hash value obtained by decryption.
8. The method of claim 7, wherein, in the event that the hash value of the backup data does not match the decrypted hash value, the method further comprises, after sending risk information to the client:
and responding to the operation of continuing to restore, which is executed on the client, and executing the step of restoring the backup through the backup data.
9. A computer-readable storage medium storing a program, wherein the program performs the cloud platform remote data backup method according to any one of claims 1 to 5, or the cloud platform remote data backup restoration method according to any one of claims 6 to 8.
10. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the cloud platform remote data backup method of any of claims 1 to 5, or the cloud platform remote data backup restoration method of any of claims 6 to 8.
CN202310200867.0A 2023-03-03 2023-03-03 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment Pending CN116432199A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310200867.0A CN116432199A (en) 2023-03-03 2023-03-03 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310200867.0A CN116432199A (en) 2023-03-03 2023-03-03 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment

Publications (1)

Publication Number Publication Date
CN116432199A true CN116432199A (en) 2023-07-14

Family

ID=87093244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310200867.0A Pending CN116432199A (en) 2023-03-03 2023-03-03 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment

Country Status (1)

Country Link
CN (1) CN116432199A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal
CN107391974A (en) * 2017-07-19 2017-11-24 北京深思数盾科技股份有限公司 A kind of backup method and device of software protecting equipment data
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component
CN114372274A (en) * 2021-12-07 2022-04-19 广州大学 Remote data backup encryption method, system, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal
CN107391974A (en) * 2017-07-19 2017-11-24 北京深思数盾科技股份有限公司 A kind of backup method and device of software protecting equipment data
CN109587276A (en) * 2019-01-11 2019-04-05 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of data back up method, system and associated component
CN114372274A (en) * 2021-12-07 2022-04-19 广州大学 Remote data backup encryption method, system, device and storage medium

Similar Documents

Publication Publication Date Title
KR101966767B1 (en) System for managing encryption keys for cloud services
CN108833091B (en) Encryption method, decryption method and device for log file
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
EP3200093B1 (en) Data synchronization method and device
US10685141B2 (en) Method for storing data blocks from client devices to a cloud storage system
US10587397B2 (en) Storage medium enterprise and block chain enabled communication
CN110661748B (en) Log encryption method, log decryption method and log encryption device
US20120254136A1 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN111224786A (en) Block chain-based data security sharing method, device and medium
CN108289074B (en) User account login method and device
CN113987563A (en) Data processing method, system, product, device and storage medium
US9054864B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN105224262A (en) Data processing method
CN105183402A (en) Data storage method
CN111327680B (en) Authentication data synchronization method, device, system, computer equipment and storage medium
JP6318305B2 (en) How to manage subscriptions on the provisioning server
CN111290884A (en) Data backup method and device for cash register equipment
CN116432199A (en) Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment
CN110020533B (en) Safety protection method for VR resources and terminal
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN115766173A (en) Data processing method, system and device
CN113194129A (en) Data ferrying method, equipment and medium
CN105426783A (en) Multi-backup data storage method
CN105302490A (en) Data storage method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination