CN116909482A - Cloud computer storage management method, device, equipment and storage medium - Google Patents

Cloud computer storage management method, device, equipment and storage medium Download PDF

Info

Publication number
CN116909482A
CN116909482A CN202310907393.3A CN202310907393A CN116909482A CN 116909482 A CN116909482 A CN 116909482A CN 202310907393 A CN202310907393 A CN 202310907393A CN 116909482 A CN116909482 A CN 116909482A
Authority
CN
China
Prior art keywords
cloud computer
target
user
cloud
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310907393.3A
Other languages
Chinese (zh)
Inventor
肖甜
王彬
张玉桃
梁博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310907393.3A priority Critical patent/CN116909482A/en
Publication of CN116909482A publication Critical patent/CN116909482A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0631Configuration or reconfiguration of storage systems by allocating resources to storage systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application provides a cloud computer storage management method, a cloud computer storage management device, cloud computer storage management equipment and a cloud computer storage management storage medium, wherein user login information is obtained, and the user login information comprises user labels; acquiring a cloud computer set corresponding to the user tag from a cloud computer library according to a preset cloud computer login information table, wherein the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer; responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium; and associating the resource data in the target storage area with the target cloud computer, and mapping the storage content to the corresponding cloud computer according to the need by independently storing the resource data with the user as a unit, so that the management of the storage relationship among a plurality of different cloud computers can be realized, and the method is suitable for various application environments.

Description

Cloud computer storage management method, device, equipment and storage medium
Technical Field
The present application relates to the field of cloud computing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for managing cloud computing storage.
Background
The cloud computer is an overall service scheme and comprises cloud resources, a transmission protocol and a cloud terminal. The open cloud terminal is used for providing resources such as desktop, application, hardware and the like for users in a service mode of on-demand service and flexible distribution through a transmission protocol, and the users can realize single-machine multi-user without considering the construction of complex IT. Under cloud computer service, the application does not need to care about the actual storage position of the data, only needs to submit the data to a virtual volume or a virtual disk, and the data is distributed to different physical media by virtualization management software.
In the existing cloud computer technology, a single cloud computer is generally used as a unit (such as a cloud container) for storage, and when a user uses a cloud computer service, cloud resource data corresponding to the cloud computer can be accessed through simple identity verification.
However, for projects requiring cooperation, the existing cloud computer technology cannot meet the requirements of a plurality of people, and as the data of all cloud resource data are not communicated, the storage relations among different cloud computers cannot be managed at the same time.
Disclosure of Invention
The application provides a cloud computer storage management method, device, equipment and storage medium, which are used for solving the problem that the storage relationship between different cloud computers cannot be managed simultaneously because the data of cloud resource data are not communicated with each other by taking a single cloud computer as a unit in the existing cloud computer technology.
In a first aspect, a cloud computer storage management method includes:
acquiring user login information, wherein the user login information comprises a user tag;
according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag is obtained from a cloud computer library, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer;
responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium;
and associating the resource data in the target storage area with the target cloud computer.
In a possible implementation manner, the obtaining, according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag from a cloud computer library includes:
searching cloud computers corresponding to the user labels according to the mapping relation between the user labels and the cloud computers, and acquiring cloud computers to be confirmed corresponding to the user labels from the cloud computer library;
and summarizing the cloud computers to be confirmed to generate a cloud computer set corresponding to the user tag.
In one possible implementation manner, the associating the resource data in the target storage area with the target cloud computer includes:
creating a catalog based on the target cloud computer;
and mounting the target storage area to the catalog.
In one possible implementation manner, before the acquiring the cloud computer set corresponding to the user tag according to the preset cloud computer login information table, the method further includes:
detecting whether a cloud computer corresponding to the user tag exists in a cloud computer library;
if not, creating a cloud computer to be configured, associating the cloud computer to be configured with the user tag, and storing the mapping relation between the cloud computer to be configured and the user tag into the cloud computer login information table;
and associating a default storage area for the cloud computer to be configured, and storing the mapping relation between the cloud computer to be configured and the default storage area into the storage mapping table.
In one possible implementation manner, the user login information further includes user verification information, and before the cloud computer set corresponding to the user tag is obtained according to a preset cloud computer login information table, the method further includes:
verifying the user identity of the client based on the user verification information;
if the verification is not passed, feeding back the login failure state, and suspending the process of acquiring the cloud computer set.
In one possible implementation manner, the response to the selection instruction of the target cloud computer sent by the client includes:
judging whether the target cloud computer needs secondary identity verification or not;
if yes, sending a secondary identity verification request to the client;
responding to secondary identity verification information sent by a client, and authenticating the secondary identity verification information;
if the authentication is passed, acquiring the target cloud computer;
if the authentication is not passed, feeding back the status of failure in verification, and suspending the process of acquiring the target cloud computer.
In one possible implementation manner, the determining whether the target cloud computer needs secondary identity verification includes:
acquiring a target storage area corresponding to the target cloud computer based on a preset storage mapping table;
detecting whether the target storage area has an encryption tag or not;
if the target storage area has an encryption tag, the target cloud computer needs secondary identity verification;
and if the target storage area does not have the encryption tag, the target cloud computer does not need secondary identity verification.
In another aspect, the present application provides a cloud computer storage management apparatus, including:
the login module is used for acquiring user login information, wherein the user login information comprises a user tag;
the cloud computer set acquisition module is used for acquiring a cloud computer set corresponding to the user tag from a cloud computer library according to a preset cloud computer login information table, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer;
the storage area acquisition module is used for responding to a selection instruction of a target cloud computer sent by a client, acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium;
and the configuration module is used for associating the resource data in the target storage area with the target cloud computer.
In a third aspect, the present application provides an electronic device, including a memory, a processor, and computer-executable instructions stored in the memory and executable on the processor, where the processor implements the cloud computer storage management method of any one of the first aspects when executing the computer-executable instructions.
In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the cloud computer storage management method of any one of the first aspects above.
According to the cloud computer storage management method, the cloud computer storage management device, the cloud computer storage management equipment and the cloud computer storage management storage medium, user login information is obtained, and the user login information comprises user labels; according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag is obtained from a cloud computer library, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer; responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium; and associating the resource data in the target storage area with the target cloud computer, and mapping the storage content to the corresponding cloud computer according to the need by independently storing the resource data with the user as a unit, so that the management of the storage relationship among a plurality of different cloud computers can be realized, and the method is suitable for various application environments.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of an application scenario of a cloud computer storage management method according to an embodiment of the present application.
Fig. 2 is a flowchart of a cloud computer storage management method according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a cloud computer storage management device according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an electronic device based on a cloud computer storage management device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
In order to better understand the scheme of the embodiment of the present application, an application scenario related to the embodiment of the present application is described below.
Referring to fig. 1, fig. 1 is a schematic view of an application scenario of a cloud computer storage management method according to an embodiment of the present application, as shown in fig. 1, including a client 100 and a server 200. The client 100 may be configured to log in by a user and send related instructions to the server 200. The client 100 may include a personal computer, tablet computer, mobile phone, etc., and embodiments of the present application are not limited in this regard.
The server 200 may be configured to receive instructions sent by the client 100 and perform associated operations. Specifically, the server 200 may include a user authentication module, a cloud computer management module, a storage area management module, and a cloud computer configuration module. The user authentication module may receive user login information of the client 100 and authenticate a user identity; the cloud computer management module can acquire a usable cloud computer according to the identity of a user and select a target cloud computer according to the instruction of the client 100; the storage area management module comprises a preset storage mapping table, and the storage mapping table is used for storing the mapping relation between each cloud computer and each storage medium, so that the storage area management module can be used for confirming a target storage area according to a target cloud computer; the cloud computer configuration module is used for associating the resource data in the target storage area with the target cloud computer.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a cloud computer storage management method according to an embodiment of the present application. As shown in fig. 2, the method of the present embodiment includes:
s201: and obtaining user login information, wherein the user login information comprises a user tag.
The execution main body of the embodiment of the application can be a server or a cloud computer storage management system in the server, wherein the cloud computer storage management system can be realized by software.
It will be appreciated that user login information may be used to verify the identity of a user, and that user tags may include family categories, work categories, etc. to facilitate distinguishing rights of the user.
S202: according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag is obtained from a cloud computer library, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer.
It can be understood that a user can create a plurality of cloud computers and perform authority management on the cloud computers according to requirements, so that users with different user tags can use different cloud computers, and data security is guaranteed.
In the step, according to the mapping relation between each user tag and each cloud computer, a cloud computer list corresponding to the user tag can be pulled from the cloud computer library and summarized into a cloud computer set.
S203: and responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium.
It should be understood that the relationship between each cloud computer and each storage medium may be one-to-many, many-to-one, or many-to-many, which is not limited in this embodiment, for example, the same storage area corresponds to a plurality of cloud computers, and the same cloud computer may also correspond to a plurality of storage areas. But the mapping relation between each cloud computer and each storage medium is stored in a storage mapping table.
In this step, according to the target cloud computer selected by the user, a target storage area corresponding to the target cloud computer may be obtained from the storage mapping table, where the target storage area may be one or multiple.
S204: and associating the resource data in the target storage area with the target cloud computer.
In the step, the target storage area is mounted on the target cloud computer by calling the mapping relation between the target cloud computer and the target storage area to complete association, so that a user can start the target cloud computer and manage file data in the target storage area from the target cloud computer.
According to the cloud computer storage management method provided by the embodiment, the user login information is obtained, and the user login information comprises a user tag; according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag is obtained from a cloud computer library, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer; responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium; and associating the resource data in the target storage area with the target cloud computer, and mapping the storage content to the corresponding cloud computer according to the need by independently storing the resource data with the user as a unit, so that the management of the storage relationship among a plurality of different cloud computers can be realized, and the method is suitable for various application environments.
The technical scheme of the cloud computer storage management method is described in detail below.
In a possible implementation manner, in the cloud computer storage management method provided by the embodiment, the cloud computers to be confirmed corresponding to the user tag are obtained from the cloud computer library, and the cloud computers to be confirmed are summarized to generate a cloud computer set corresponding to the user tag.
Specifically, according to a preset cloud computer login information table, acquiring a cloud computer set corresponding to the user tag from a cloud computer library, including: searching cloud computers corresponding to the user labels according to the mapping relation between the user labels and the cloud computers, and acquiring cloud computers to be confirmed corresponding to the user labels from the cloud computer library; and summarizing the cloud computers to be confirmed to generate a cloud computer set corresponding to the user tag.
In this embodiment, the cloud computer to be confirmed, that is, the cloud computer having a mapping relationship with the user tag, is only sent to the client in a summarized manner, and is confirmed by the client, because the user does not decide which one to start.
In this embodiment, the cloud computers to be confirmed corresponding to the user tag are obtained from the cloud computer library, the cloud computers to be confirmed are summarized to generate the cloud computer set corresponding to the user tag, and the cloud computers and the storage areas thereof are managed by taking the user as a management unit, so that the storage processing bottleneck of a single cloud computer is avoided, and the system performance and the working efficiency of the multi-user cloud computer are improved.
In a possible implementation manner, the cloud computer storage management method provided in this embodiment implements association of resource data in the target storage area with the target cloud computer by mounting the target storage area to a directory of the target cloud computer.
Specifically, associating the resource data in the target storage area with the target cloud computer includes: creating a catalog based on the target cloud computer; and mounting the target storage area to the catalog.
It is understood that mounting refers to a process by which computer files and directories on a storage device (which may be a storage area herein) are made available to a user for access via the file system of a computer (which may be a cloud computer herein) by an operating system. The target storage area is mounted to the catalog of the target cloud computer, so that the configuration of the cloud computer is completed, the cloud computer can be started, and a user can manage file data in the target storage area through the cloud computer.
In this embodiment, the target storage area is mounted to the directory of the target cloud computer, so that the resource data in the target storage area is associated with the target cloud computer, and management of the cloud computer and the storage area thereof is realized.
In a possible implementation manner, considering that for some new user tags, there may not exist a cloud computer corresponding to the user tag in a cloud computer library, the cloud computer storage management method provided in this embodiment first detects whether there exists a cloud computer corresponding to the user tag in the cloud computer library, and constructs a cloud computer to be configured and a storage area associated with the cloud computer to be configured in a case that there exists no cloud computer corresponding to the user tag in the cloud computer library.
Specifically, before the cloud computer set corresponding to the user tag is obtained according to the preset cloud computer login information table, the method further comprises: detecting whether a cloud computer corresponding to the user tag exists in a cloud computer library; if not, creating a cloud computer to be configured, associating the cloud computer to be configured with the user tag, and storing the mapping relation between the cloud computer to be configured and the user tag into the cloud computer login information table; and associating a default storage area for the cloud computer to be configured, and storing the mapping relation between the cloud computer to be configured and the default storage area into the storage mapping table.
In this embodiment, the default storage area associated with the cloud computer to be configured may be one, but the user may add an existing storage area or create a new storage area corresponding to the default storage area by setting the default storage area, and accordingly, the mapping relationship between the cloud computer to be configured and the storage area corresponding to the cloud computer to be configured is also stored in the storage mapping table.
In this embodiment, by detecting whether the cloud computer corresponding to the user tag exists in the cloud computer library, and for the case that the cloud computer corresponding to the user tag is not in the cloud computer library, the cloud computer to be configured and the storage area associated with the cloud computer to be configured are constructed, so as to ensure management of cloud computers under different user tags.
In a possible implementation manner, the user login information further includes user authentication information, and in consideration of different rights to each cloud computer, the cloud computer storage management method provided in this embodiment authenticates the user identity.
Specifically, before the cloud computer set corresponding to the user tag is obtained according to the preset cloud computer login information table, the method further comprises: verifying the user identity of the client based on the user verification information; if the verification is not passed, feeding back the login failure state, and suspending the process of acquiring the cloud computer set.
In this embodiment, the user authentication information is unique information capable of authenticating the identity of the client, for example, the user authentication information may be a public key of the client or signature information of the client. The authentication of the user identity of the client may be performed by authenticating the authority of the client by using a key, or may be performed by authenticating the client by using a signature provided by the client, which is not limited herein.
In this embodiment, through user tag and user identity verification, the use authority of the cloud computer is guaranteed, and situations such as data leakage are avoided.
In one possible implementation manner, considering that the data in a part of the cloud computer and the storage area thereof may need to be subjected to security processing, the common authentication and the user tag only can prove that the user belongs to a team, but cannot ensure that the user can contact with security information, the cloud computer storage management method provided by the embodiment judges whether the target cloud computer needs secondary identity authentication by detecting whether the target storage area has the encryption tag.
Specifically, judging whether the target cloud computer needs secondary identity verification or not; if yes, sending a secondary identity verification request to the client; responding to secondary identity verification information sent by a client, and authenticating the secondary identity verification information; if the authentication is passed, acquiring the target cloud computer; if the authentication is not passed, feeding back the status of failure in verification, and suspending the process of acquiring the target cloud computer.
The target storage area corresponding to the target cloud computer can be obtained based on a preset storage mapping table; detecting whether the target storage area has an encryption tag or not; if the target storage area has an encryption tag, the target cloud computer needs secondary identity verification; and if the target storage area does not have the encryption tag, the target cloud computer does not need secondary identity verification.
In this embodiment, the authentication process may also be performed by delegating to a third party authentication agent to obtain a secondary authentication result. The third party authentication agent may illustratively verify public key or signature information or the like provided by the client. When the identity verification information provided by the client is signature information, the third party authentication agent can compare the signature information provided by the client with the signature information authenticated by the client, if the signature information and the signature information are consistent, the verification is passed, and the third party authentication agent returns a verification result.
In this embodiment, whether the target cloud computer needs secondary authentication is determined by detecting whether the target storage area has an encryption tag, and for the target storage area needing the encryption tag, secondary authentication is performed on a user using the target cloud computer having a mapping relationship, thereby ensuring data security.
Fig. 3 is a schematic diagram of a cloud computer storage management device according to an embodiment of the present application. As shown in fig. 3, the cloud computer storage management apparatus includes:
a login module 31, configured to obtain user login information, where the user login information includes a user tag;
the cloud computer set obtaining module 32 is configured to obtain a cloud computer set corresponding to the user tag from a cloud computer library according to a preset cloud computer login information table, where the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer;
the storage area obtaining module 33 is configured to obtain a target storage area corresponding to a target cloud computer according to a preset storage mapping table in response to a selection instruction of the target cloud computer sent by the client, where the storage mapping table is used to store a mapping relationship between each cloud computer and each storage medium;
and the configuration module 34 is used for associating the resource data in the target storage area with the target cloud computer.
In one possible design, the cloud computing set acquisition module 32 is specifically configured to:
searching cloud computers corresponding to the user labels according to the mapping relation between the user labels and the cloud computers, and acquiring cloud computers to be confirmed corresponding to the user labels from the cloud computer library;
summarizing the cloud computers to be confirmed to generate a cloud computer set corresponding to the user tag
In one possible design, configuration module 34 is specifically configured to:
creating a catalog based on the target cloud computer;
and mounting the target storage area to the catalog.
In one possible design, the cloud computing set acquisition module 32 is further specifically configured to:
detecting whether a cloud computer corresponding to the user tag exists in a cloud computer library;
if not, creating a cloud computer to be configured, associating the cloud computer to be configured with the user tag, and storing the mapping relation between the cloud computer to be configured and the user tag into the cloud computer login information table;
and associating a default storage area for the cloud computer to be configured, and storing the mapping relation between the cloud computer to be configured and the default storage area into the storage mapping table.
In one possible design, the user login information further includes user authentication information, and the login module 31 is specifically configured to:
verifying the user identity of the client based on the user verification information;
if the verification is not passed, feeding back the login failure state, and suspending the process of acquiring the cloud computer set.
In one possible design, the memory area acquisition module 33 is further specifically configured to:
judging whether the target cloud computer needs secondary identity verification or not;
if yes, sending a secondary identity verification request to the client;
responding to secondary identity verification information sent by a client, and authenticating the secondary identity verification information;
if the authentication is passed, acquiring the target cloud computer;
if the authentication is not passed, feeding back the status of failure in verification, and suspending the process of acquiring the target cloud computer.
In one possible design, the memory area acquisition module 33 is further specifically configured to:
acquiring a target storage area corresponding to the target cloud computer based on a preset storage mapping table;
detecting whether the target storage area has an encryption tag or not;
if the target storage area has an encryption tag, the target cloud computer needs secondary identity verification;
and if the target storage area does not have the encryption tag, the target cloud computer does not need secondary identity verification.
Fig. 4 is a schematic structural diagram of an electronic device based on a cloud computer storage management device according to an embodiment of the present application. As shown in fig. 4, the electronic device of this embodiment includes: at least one processor 40 (only one shown in fig. 4), a memory 41, and a computer program stored in the memory 41 and executable on the at least one processor 40, the processor 40 implementing the steps in any of the various method embodiments described above when executing the computer program.
The electronic device may include, but is not limited to, a processor 40, a memory 41. It will be appreciated by those skilled in the art that fig. 4 is merely an example of an electronic device and is not meant to be limiting, and may include more or fewer components than shown, or may combine certain components, or different components, such as may also include input-output devices, network access devices, etc.
The processor 40 may be a central processing unit (Central Processing Unit, CPU), the processor 40 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The specific implementation process of the processor 401 may refer to the above-mentioned method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
The memory 41 may in some embodiments be an internal storage unit of the electronic device, such as a memory of the electronic device. The memory 41 may in other embodiments also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the electronic device. Further, the memory 41 may also include both an internal storage unit and an external storage device of the electronic device. The memory 41 is used to store an operating system, application programs, boot loader (BootLoader), data, and other programs and the like, such as program codes of computer programs and the like. The memory 41 may also be used to temporarily store data that has been output or is to be output.
The embodiments of the present application also provide a computer readable storage medium storing a computer program, which when executed by a processor implements steps of the above-described respective method embodiments.
The computer readable storage media described above can be implemented by any type of volatile or non-volatile memory device or combination thereof, and can be any available media that can be accessed by a general purpose or special purpose computer.
The integrated units/modules, if implemented in hardware, may be digital circuits, analog circuits, etc. Physical implementations of hardware structures include, but are not limited to, transistors, memristors, and the like. The processor may be any suitable hardware processor, such as CPU, GPU, FPGA, DSP and ASIC, etc., unless otherwise specified. Unless otherwise indicated, the storage elements may be any suitable magnetic or magneto-optical storage medium, such as resistive Random Access Memory RRAM (Resistive Random Access Memory), dynamic Random Access Memory DRAM (Dynamic Random Access Memory), static Random Access Memory SRAM (Static Random-Access Memory), enhanced dynamic Random Access Memory EDRAM (Enhanced Dynamic Random Access Memory), high-Bandwidth Memory HBM (High-Bandwidth Memory), hybrid Memory cube HMC (Hybrid Memory Cube), etc.
The integrated units/modules may be stored in a computer readable memory if implemented in the form of software program modules and sold or used as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in whole or in part in the form of a software product stored in a memory, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method of the various embodiments of the present application. And the aforementioned memory includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. In the alternative, the readable storage medium may be integral to the processor. The processor and the readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC for short). The processor and the readable storage medium may reside as discrete components in the electronic device described above.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: various media that can store program code, such as ROM, RAM, magnetic or optical disks.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other manners. For example, the apparatus/network device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. The cloud computer storage management method is characterized by comprising the following steps of:
acquiring user login information, wherein the user login information comprises a user tag;
according to a preset cloud computer login information table, a cloud computer set corresponding to the user tag is obtained from a cloud computer library, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer;
responding to a selection instruction of a target cloud computer sent by a client, and acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium;
and associating the resource data in the target storage area with the target cloud computer.
2. The method of claim 1, wherein the obtaining, from a cloud computer library, a cloud computer set corresponding to the user tag according to a preset cloud computer login information table, includes:
searching cloud computers corresponding to the user labels according to the mapping relation between the user labels and the cloud computers, and acquiring cloud computers to be confirmed corresponding to the user labels from the cloud computer library;
and summarizing the cloud computers to be confirmed to generate a cloud computer set corresponding to the user tag.
3. The method of claim 1, wherein associating the resource data in the target storage area with the target cloud computer comprises:
creating a catalog based on the target cloud computer;
and mounting the target storage area to the catalog.
4. The method according to claim 1, further comprising, before the acquiring the cloud computer set corresponding to the user tag according to the preset cloud computer login information table:
detecting whether a cloud computer corresponding to the user tag exists in a cloud computer library;
if not, creating a cloud computer to be configured, associating the cloud computer to be configured with the user tag, and storing the mapping relation between the cloud computer to be configured and the user tag into the cloud computer login information table;
and associating a default storage area for the cloud computer to be configured, and storing the mapping relation between the cloud computer to be configured and the default storage area into the storage mapping table.
5. The method of claim 1, wherein the user login information further includes user authentication information, and further comprising, before the acquiring the cloud computer set corresponding to the user tag according to the preset cloud computer login information table:
verifying the user identity of the client based on the user verification information;
if the verification is not passed, feeding back the login failure state, and suspending the process of acquiring the cloud computer set.
6. The method of claim 5, wherein the responding to the selection instruction of the target cloud computer sent by the client comprises:
judging whether the target cloud computer needs secondary identity verification or not;
if yes, sending a secondary identity verification request to the client;
responding to secondary identity verification information sent by a client, and authenticating the secondary identity verification information;
if the authentication is passed, acquiring the target cloud computer;
if the authentication is not passed, feeding back the status of failure in verification, and suspending the process of acquiring the target cloud computer.
7. The method of claim 6, wherein the determining whether the target cloud computer requires secondary authentication comprises:
acquiring a target storage area corresponding to the target cloud computer based on a preset storage mapping table;
detecting whether the target storage area has an encryption tag or not;
if the target storage area has an encryption tag, the target cloud computer needs secondary identity verification;
and if the target storage area does not have the encryption tag, the target cloud computer does not need secondary identity verification.
8. A cloud computer storage management device, comprising:
the login module is used for acquiring user login information, wherein the user login information comprises a user tag;
the cloud computer set acquisition module is used for acquiring a cloud computer set corresponding to the user tag from a cloud computer library according to a preset cloud computer login information table, wherein the cloud computer library is used for storing a plurality of cloud computers created in advance by a user; the cloud computer login information table is used for storing mapping relations between each user tag and each cloud computer;
the storage area acquisition module is used for responding to a selection instruction of a target cloud computer sent by a client, acquiring a target storage area corresponding to the target cloud computer according to a preset storage mapping table, wherein the storage mapping table is used for storing mapping relations between each cloud computer and each storage medium;
and the configuration module is used for associating the resource data in the target storage area with the target cloud computer.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 7.
CN202310907393.3A 2023-07-21 2023-07-21 Cloud computer storage management method, device, equipment and storage medium Pending CN116909482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310907393.3A CN116909482A (en) 2023-07-21 2023-07-21 Cloud computer storage management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310907393.3A CN116909482A (en) 2023-07-21 2023-07-21 Cloud computer storage management method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116909482A true CN116909482A (en) 2023-10-20

Family

ID=88366438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310907393.3A Pending CN116909482A (en) 2023-07-21 2023-07-21 Cloud computer storage management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116909482A (en)

Similar Documents

Publication Publication Date Title
EP3905078A1 (en) Identity verification method and system therefor
US11055397B2 (en) Methods, mediums, and systems for establishing and using security questions
US11888980B2 (en) Stateless service-mediated security module
US20120198538A1 (en) Multi-enclave token
US20110238980A1 (en) System and methods for remote maintenance in an electronic network with multiple clients
Spoorthy et al. A survey on data storage and security in cloud computing
US9270703B1 (en) Enhanced control-plane security for network-accessible services
CN111935110B (en) Method and device for controlling permission of tenant to access container instance
WO2018086469A1 (en) Data storage method utilized in non-volatile storage space in integrated circuit, and trusted integrated circuit
CN110447033B (en) Authentication based on client access restrictions
CN104506487A (en) Credible execution method for privacy policy in cloud environment
CN112437078A (en) File storage method, device, equipment and computer readable storage medium
CN114422258A (en) Single sign-on method, medium and electronic equipment based on multiple authentication protocols
CN110334531B (en) Virtual machine key management method, master node, system, storage medium and device
CN107645474B (en) Method and device for logging in open platform
CN111259364A (en) Method, device, equipment and storage medium for using national secret encryption card
KR20120067105A (en) Social verification login system being possible to verify user and providing method thereof
CN116909482A (en) Cloud computer storage management method, device, equipment and storage medium
US20210019392A1 (en) System and method for data processing device management
CN114785677B (en) Log management method, device, computer equipment, storage medium and program product
US11683173B2 (en) Consensus algorithm for distributed ledger technology
US20240095338A1 (en) Isolated runtime environments for securing secrets used to access remote resources from compute instances
US20150082464A1 (en) Security adapter program and security adapter apparatus
Thorwat et al. Implementation of multilevel authentication scheme for multicloud environment
US20230291558A1 (en) Trusted computing-based local key escrow method, apparatus, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination