CN117857177A - Data security storage system - Google Patents

Data security storage system Download PDF

Info

Publication number
CN117857177A
CN117857177A CN202410017051.9A CN202410017051A CN117857177A CN 117857177 A CN117857177 A CN 117857177A CN 202410017051 A CN202410017051 A CN 202410017051A CN 117857177 A CN117857177 A CN 117857177A
Authority
CN
China
Prior art keywords
data
storage
function
security
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410017051.9A
Other languages
Chinese (zh)
Inventor
胡斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Hengchuang Information Technology Co ltd
Original Assignee
Suzhou Hengchuang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Hengchuang Information Technology Co ltd filed Critical Suzhou Hengchuang Information Technology Co ltd
Priority to CN202410017051.9A priority Critical patent/CN117857177A/en
Publication of CN117857177A publication Critical patent/CN117857177A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data safety storage system, which relates to the technical field of data storage and solves the technical problems that the prior art has defects in improving the use efficiency of storage space, most systems do not fully utilize the storage space, and the resource waste and the management cost are increased; the system can determine the storage strategy according to the data type, the volume and the like so as to optimize the storage efficiency, the method reduces the resource waste and the management cost, and meanwhile, the invention determines corresponding safety measures including data encryption, backup frequency, disaster recovery plan and the like by comprehensively evaluating the data type and the storage requirement, thereby not only ensuring the safety of the data, but also enhancing the recovery capability of the data under the unexpected condition and greatly reducing the risk of data loss.

Description

Data security storage system
Technical Field
The invention relates to the technical field of data storage, in particular to a data security storage system.
Background
In the field of modern data management, the development of data secure storage systems has mainly focused on improving the security and integrity of data. These systems protect data from external threats, such as illegal access and data tampering, by employing a variety of encryption and backup policies. However, the prior art has a disadvantage in improving the use efficiency of the storage space. Most systems do not fully utilize storage space, resulting in wasted resources and increased management costs.
In addition, data security storage systems have difficulty ensuring maximization of data security while not considering costs and operational feasibility, and greatly reducing the risk of data loss and security threats without appropriate policies to manage sensitive data and ensure data recoverability.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data security storage system, which solves the problems in the background technology.
In order to achieve the above purpose, the invention is realized by the following technical scheme: a data secure storage system, comprising:
the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module;
the identification module is used for identifying the data type of the stored information, evaluating the storage requirement through a decision function by taking the identified data type, performance requirement and data volume as parameters to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type, quality requirement and final determined storage mode, sorting into compression packets, and transmitting to the subsequent analysis processing module;
the analysis processing module is used for receiving the compressed package of the identification module, acquiring a corresponding data type and a storage strategy, analyzing the stored data through a preset evaluation model to obtain a risk evaluation result, comprehensively evaluating the risk evaluation result through a safety function, finally determining the safety strategy to obtain a storage requirement of the compressed package, and transmitting the compressed package and the storage requirement to a subsequent storage module to store according to the storage requirement;
and the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
Preferably, the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data.
Preferably, the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function and represents the data type recognition process;
s2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein a function firstly checks the file extension of a data sample;
s22: magic number checking, the function will check the beginning byte of the data sample to find the magic number, which is a specific byte sequence of the file format, if the extension is ambiguous or further verification is required;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; the method comprises the steps of checking text characteristics by text pattern matching and checking structural characteristics of non-text files by binary analysis;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: and in the output stage, outputting the data type T, and obtaining the data type according to the analysis of the function f.
Preferably, the specific storage requirement assessment is performed in the following manner:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume;
preferably, after P1:
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement P evaluation:
analyzing the use mode of the data, and then taking the requirement on response time into consideration to obtain the performance requirement during data processing and storage;
and (3) outputting: quantitative or qualitative descriptions of performance requirements;
p22: data volume V evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: a quantized value of the data volume;
p23: determining a storage strategy S;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; then selecting the most suitable storage strategy based on the factors;
consider a variety of storage solutions including hard disks, solid state disks, network attached storage, cloud storage;
and (3) outputting: the finally determined storage strategy is used as a storage mode and comprises the following steps: "use solid state disk storage", "employ cloud storage solution".
Preferably, the specific method for selecting a proper compression mode is as follows:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, S i)
Wherein: c represents the selected compression strategy; q represents the quality requirement and h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S.
Preferably, after AS1:
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement Q evaluation:
for critical data, lossless compression is typically required; for image and video media files, determining acceptable quality loss degree according to the use scene; then obtaining the requirement on the quality of the compressed data;
and (3) outputting: quantitative or qualitative descriptions of quality requirements, including: "lossless", "high quality", "standard quality".
AS22: compression strategy C determines:
using a compression strategy function h to evaluate the applicability of different compression options by combining a data type T, a quality requirement Q and a storage strategy S, and selecting a proper compression mode based on the factors;
and (3) outputting: the final determined compression strategy comprises the following steps: "lossless compression", "JPEG compression", "MP3 compression".
Preferably, the specific comprehensive evaluation mode is as follows:
x1: acquiring a data type T and a storage strategy S;
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
Preferably, following X2:
x2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment R, analyzing the sensitivity, the value and the exposure risk of the data through a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the risk assessment results include: "high risk", "medium risk";
x22: backup and security policy B decision to evaluate the applicability of different security options by using security function i in combination with data type T, storage policy S, risk assessment R;
considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, selecting appropriate backup and security methods based on the above factors;
and (3) outputting: finally, the security policy is determined, which comprises the following steps: "periodic remote backup", "encrypting storage", "establishing disaster recovery plan".
The invention provides a data security storage system. Compared with the prior art, the method has the following beneficial effects:
(1) According to the invention, the storage space can be more effectively utilized by identifying different types of data and evaluating the storage requirement of the data; the system can determine the storage policy based on the data type (e.g., text, image, audio, etc.) and volume to optimize storage efficiency. The method reduces resource waste and reduces management cost.
(2) The invention determines corresponding safety measures including data encryption, backup frequency and disaster recovery plan by comprehensively evaluating the data types and storage requirements. The strategy not only ensures the safety of the data, but also enhances the recovery capability of the data under the unexpected condition, and greatly reduces the risk of data loss.
Drawings
The invention is further described below with reference to the accompanying drawings.
FIG. 1 is a system frame diagram of a data security storage system of the present invention;
FIG. 2 is a flowchart illustrating steps of a data security storage system according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
1-2, the present invention provides a data security storage system, comprising;
and the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module.
The identification module is used for identifying the data type of the stored information, carrying out storage requirement assessment through the identified data type to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type and the final determined storage mode, then finishing the data type and the final determined storage mode into a compression packet, and then transmitting the compression packet to the subsequent analysis processing module; wherein the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data, etc.;
the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function, and represents the data type recognition process.
S2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein the function firstly checks the file extension of the data sample, such as txt represents a text file, jpg represents an image file and the like;
s22: magic number checking, the function will check the bytes at the beginning of the data sample to find the magic number, which is a specific byte sequence in file format, if the extension is ambiguous or needs further verification, such as PDF file beginning with% PDF;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; including text pattern matching (checking text features), binary analysis (checking structural features of non-text files), etc.;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: in the output stage, the data type outputs T, and the T obtains the data type, such as text, image, audio and other specific data types, according to the analysis of the function f;
the specific storage demand assessment method is as follows:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume;
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement (P) evaluation:
the data processing and storage performance requirements are obtained by analyzing the data use modes, such as the reading and writing frequency, and then considering the response time requirements;
and (3) outputting: quantitative or qualitative descriptions of performance requirements, such as "high speed read-write", "low frequency access", and the like.
P22: data volume (V) evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: quantized values of data volumes, such as "500GB", "2TB", etc.
P23: a storage strategy (S) determination;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; the most appropriate storage policy is then selected based on the factors described above.
Various storage solutions are contemplated including hard disk (HDD), solid State Disk (SSD), network Attached Storage (NAS), cloud storage, and the like.
And (3) outputting: the finally determined storage strategy is used as a storage mode, for example, "using SSD storage", "adopting a cloud storage solution", and the like.
The specific method for selecting the proper compression mode comprises the following steps:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, S i)
Wherein: c represents the selected compression strategy; q represents the quality requirement, h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S;
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement (Q) evaluation:
lossless compression is typically required for critical data, such as text or program code; for media files such as images, videos and the like, determining acceptable quality loss degree according to a use scene; and then gets the demand for the quality of the compressed data.
And (3) outputting: quantitative or qualitative descriptions of quality requirements, such as "lossless", "high quality", "standard quality".
AS22: compression strategy (C) decision
The applicability of the different compression options is evaluated using the compression policy function h in combination with T (data type), Q (quality requirement), S (storage policy), and an appropriate compression scheme is selected based on the above factors.
And (3) outputting: the compression strategy to be finally determined is, for example, "lossless compression", "JPEG compression", "MP3 compression", etc.
Example two
In the implementation process of this embodiment, on the basis of the first embodiment, the difference from the first embodiment is that:
the analysis processing module is used for receiving the compressed package of the identification module, acquiring corresponding T (data type) and S (storage strategy), carrying out comprehensive evaluation, finally determining the security strategy to obtain the storage requirement of the compressed package, and sending the compressed package and the storage requirement to the subsequent storage module for storage according to the storage requirement.
The specific comprehensive evaluation mode is as follows:
x1: acquiring T (data type) and S (storage strategy);
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
X2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment (R), analyzing the sensitivity, value and exposure risk of the data by a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the results of risk assessment, such as "high risk", "medium risk".
X22: backup and security policy (B) decision, the applicability of the different security options is evaluated by using the security function i in combination with T (data type), S (storage policy), R (risk assessment).
Considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, etc., appropriate backup and security methods are selected based on the above factors.
And (3) outputting: finally, security policies such as "periodic remote backup", "encrypting storage", "establishing disaster recovery plan", etc. are determined.
And the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
Example III
This embodiment includes all of the implementations of the two sets of embodiments described above.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (9)

1. A data secure storage system, comprising:
the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module;
the identification module is used for identifying the data type of the stored information, evaluating the storage requirement through a decision function by taking the identified data type, performance requirement and data volume as parameters to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type, quality requirement and final determined storage mode, sorting into compression packets, and transmitting to the subsequent analysis processing module;
the analysis processing module is used for receiving the compressed package of the identification module, acquiring a corresponding data type and a storage strategy, analyzing the stored data through a preset evaluation model to obtain a risk evaluation result, comprehensively evaluating the risk evaluation result through a safety function, finally determining the safety strategy to obtain a storage requirement of the compressed package, and transmitting the compressed package and the storage requirement to a subsequent storage module to store according to the storage requirement;
and the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
2. A data security storage system in accordance with claim 1, wherein,
the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data.
3. A data security storage system in accordance with claim 1, wherein,
the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function and represents the data type recognition process;
s2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein a function firstly checks the file extension of a data sample;
s22: magic number checking, the function will check the beginning byte of the data sample to find the magic number, which is a specific byte sequence of the file format, if the extension is ambiguous or further verification is required;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; the method comprises the steps of checking text characteristics by text pattern matching and checking structural characteristics of non-text files by binary analysis;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: and in the output stage, outputting the data type T, and obtaining the data type according to the analysis of the function f.
4. A data security storage system in accordance with claim 3 wherein,
the specific storage demand assessment method is as follows:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume.
5. A data security storage system in accordance with claim 4, wherein,
after P1:
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement P evaluation:
analyzing the use mode of the data, and then taking the requirement on response time into consideration to obtain the performance requirement during data processing and storage;
and (3) outputting: quantitative or qualitative descriptions of performance requirements;
p22: data volume V evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: a quantized value of the data volume;
p23: determining a storage strategy S;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; then selecting the most suitable storage strategy based on the factors;
consider a variety of storage solutions including hard disks, solid state disks, network attached storage, cloud storage;
and (3) outputting: the finally determined storage strategy is used as a storage mode and comprises the following steps: "use solid state disk storage", "employ cloud storage solution".
6. A data security storage system in accordance with claim 5, wherein,
the specific method for selecting the proper compression mode comprises the following steps:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, si)
Wherein: c represents the selected compression strategy; q represents the quality requirement and h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S.
7. A data security storage system in accordance with claim 6, wherein,
after AS1:
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement Q evaluation:
for critical data, lossless compression is typically required; for image and video media files, determining acceptable quality loss degree according to the use scene; then obtaining the requirement on the quality of the compressed data;
and (3) outputting: quantitative or qualitative descriptions of quality requirements, including: "lossless", "high quality", "standard quality".
AS22: compression strategy C determines:
the applicability of different compression options is evaluated by using a compression strategy function h in combination with a data type T, a quality requirement Q and a storage strategy S, and a proper compression mode is selected based on the factors.
And (3) outputting: the final determined compression strategy comprises the following steps: "lossless compression", "JPEG compression", "MP3 compression".
8. A data security storage system in accordance with claim 1, wherein,
the specific comprehensive evaluation mode is as follows:
x1: acquiring a data type T and a storage strategy S;
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
9. A data security storage system in accordance with claim 8, wherein,
after X2:
x2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment R, analyzing the sensitivity, the value and the exposure risk of the data through a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the risk assessment results include: "high risk", "medium risk";
x22: backup and security policy B decides to evaluate the applicability of the different security options by using security function i in combination with data type T, storage policy S, risk assessment R.
Considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, a suitable backup and security method is selected based on the above factors.
And (3) outputting: finally, the security policy is determined, which comprises the following steps: "periodic remote backup", "encrypting storage", "establishing disaster recovery plan".
CN202410017051.9A 2024-01-05 2024-01-05 Data security storage system Pending CN117857177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410017051.9A CN117857177A (en) 2024-01-05 2024-01-05 Data security storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410017051.9A CN117857177A (en) 2024-01-05 2024-01-05 Data security storage system

Publications (1)

Publication Number Publication Date
CN117857177A true CN117857177A (en) 2024-04-09

Family

ID=90534180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410017051.9A Pending CN117857177A (en) 2024-01-05 2024-01-05 Data security storage system

Country Status (1)

Country Link
CN (1) CN117857177A (en)

Similar Documents

Publication Publication Date Title
US11468510B2 (en) Due diligence in electronic documents
EP3734489B1 (en) Evidence collection method and system based on blockchain evidence storage
Iuliani et al. A video forensic framework for the unsupervised analysis of MP4-like file container
US11144926B2 (en) Blockchain-based recordkeeping method and apparatus
Feng et al. JPEG recompression detection
US8422730B2 (en) System for analyzing forensic evidence using image filter and method thereof
Ali et al. A review of digital forensics methods for JPEG file carving
US20210133742A1 (en) Detection of security threats in a network environment
CN110597461B (en) Data storage method, device and equipment in block chain type account book
CN114598514A (en) Industrial control threat detection method and device
CN117077158B (en) Compliance data conversion storage system
CN117857177A (en) Data security storage system
CN108563396B (en) Safe cloud object storage method
CN113177203B (en) Method and device for identifying encrypted malicious message flow
US20110123023A1 (en) Apparatus for video encryption by randomized block shuffling and method thereof
CN114546957A (en) Intelligent centralized data processing service platform
Kraetzer et al. Improvement of information fusion-based audio steganalysis
CN110674219A (en) Block chain based ambient air detection data chaining method and equipment for Internet of things
CN112445773B (en) Method and device for generating decompression log of compressed file and readable storage medium
US11928135B2 (en) Edge computing data reproduction and filtering gatekeeper
CN113722351B (en) Parameter restoration method and device in Oracle database access flow
CN116881687B (en) Power grid sensitive data identification method and device based on feature extraction
Mariappan et al. Digital Forensic and Machine Learning
CN113992978B (en) Evaluation method and device of video defense system, storage medium and processor
Abdi Corrupted MP4 carving using MP4-Karver

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination