WO2017107792A1 - 一种数据信息处理方法以及数据存储系统 - Google Patents

一种数据信息处理方法以及数据存储系统 Download PDF

Info

Publication number
WO2017107792A1
WO2017107792A1 PCT/CN2016/109400 CN2016109400W WO2017107792A1 WO 2017107792 A1 WO2017107792 A1 WO 2017107792A1 CN 2016109400 W CN2016109400 W CN 2016109400W WO 2017107792 A1 WO2017107792 A1 WO 2017107792A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
processing request
request
data processing
storage partition
Prior art date
Application number
PCT/CN2016/109400
Other languages
English (en)
French (fr)
Inventor
黎胜锋
原攀峰
陈廷梁
李季
Original Assignee
阿里巴巴集团控股有限公司
黎胜锋
原攀峰
陈廷梁
李季
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 黎胜锋, 原攀峰, 陈廷梁, 李季 filed Critical 阿里巴巴集团控股有限公司
Priority to EP16877603.7A priority Critical patent/EP3396521A4/en
Priority to JP2018532121A priority patent/JP6854288B2/ja
Publication of WO2017107792A1 publication Critical patent/WO2017107792A1/zh
Priority to US16/016,323 priority patent/US10977230B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06312Adjustment or analysis of established resource schedule, e.g. resource or task levelling, or dynamic rescheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Definitions

  • the present application relates to the field of network communications, and in particular, to a data information processing method.
  • the application also relates to a data storage system.
  • an independent unit such as an e-commerce company, ISV (Independent Software Vendors), etc.
  • ISV Independent Software Vendors
  • the present application provides a data information processing method for differentially controlling different data information under the premise of improving data information security.
  • the method is applied to a data storage system that is provided with a storage space corresponding to an organization, and the storage space is composed of a first storage partition and a second storage partition, and includes:
  • the method further comprises:
  • the data processing request is used to authorize the destination data information to the item, so that the item accesses the destination data information, and the item belongs to the organization;
  • the data processing request carries the destination attribute information, where the data processing request is used to modify the attribute information of the destination data information to the destination attribute information;
  • the data processing request is used to display the destination data information on a data platform.
  • the processing strategy is specifically:
  • the data processing request is a display request or a modification request
  • the storage partition of the destination data information is the first storage partition, the data processing request is allowed to be executed
  • the data processing request is an authorization request
  • the storage partition of the destination data information is the first storage partition
  • the data processing request is allowed to be executed.
  • the data processing request is an authorization request
  • the storage partition of the destination data information is the second storage partition
  • the data is allowed to be executed. Process the request.
  • the method further comprises:
  • the data processing request is rejected and discarded.
  • the method further comprises:
  • the new data information is imported into the first storage partition.
  • the present application further provides a data storage system
  • the data storage system is provided with a data storage system corresponding to a storage space of an organization, the storage space is composed of a first storage partition and a second storage partition, the system include:
  • the first obtaining module when receiving the data processing request, acquiring a type of the data processing request, a storage partition where the item for sending the data processing request is located, and a storage partition of the destination data information corresponding to the data processing request;
  • a second acquiring module acquiring a processing policy that matches the storage partition and the type, where the processing policy is preset in the data storage system;
  • the processing module processes the destination data information according to the processing policy and the data processing request.
  • the method further comprises:
  • the data processing request is used to authorize the destination data information to the item, so that the item accesses the destination data information, and the item belongs to the organization;
  • the data processing request carries the destination attribute information, where the data processing request is used to modify the attribute information of the destination data information to the destination attribute information;
  • the data processing request is used to display the destination data information on a data platform.
  • the processing strategy is specifically:
  • the data processing request is a display request or a modification request
  • the storage partition of the destination data information is the first storage partition, the data processing request is allowed to be executed
  • the data processing request is an authorization request
  • the storage partition of the destination data information is When the first storage partition is located, if the storage partition where the item is located belongs to the storage space, the data processing request is allowed to be executed
  • the data processing request is an authorization request
  • the storage partition of the destination data information is the second storage partition
  • the data is allowed to be executed. Process the request.
  • the method further comprises:
  • the processing module rejects and discards the data processing request when there is no processing policy matching the storage partition and the type.
  • the method further comprises:
  • the import module imports the new data information into the first storage partition when receiving the uploaded new data information.
  • a storage space corresponding to the organization is set in the data storage system, and when the data processing request is received, the type of the data processing request and the storage of the item for transmitting the data processing request are acquired.
  • the partition and the storage partition of the destination data information corresponding to the data processing request and then acquire the processing strategy matching the storage partition and the type, and finally process the destination data information according to the processing policy and the data processing request.
  • FIG. 1 is a schematic flowchart diagram of a data information processing method according to the present application.
  • FIG. 2 is a schematic diagram of a data exchange support model in a specific embodiment of the present application.
  • FIG. 3 is a schematic diagram of data exchange between partitions in a specific embodiment of the present application.
  • FIG. 4 is a schematic diagram of security monitoring of data in an exchange area in a specific embodiment of the present application.
  • FIG. 5 is a schematic diagram of an authorization policy of data between partitions in a specific embodiment of the present application.
  • FIG. 6 is a flow chart showing the use of data in a exchange area (with a private area) in a specific embodiment of the present application; intention;
  • FIG. 7 is a schematic diagram of a usage flow of data in a swap area (without a private area) in a specific embodiment of the present application;
  • FIG. 8 is a schematic diagram of a flow of using data in a private area in a specific embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a data storage system according to the present application.
  • the present application proposes a data information processing method, in which a data storage system having a storage space corresponding to an organization is set in advance, and the data in the data storage system is not only different
  • the organization is separately saved, and the storage space of each organization is divided into two storage partitions with different rights, that is, the storage space is composed of the first storage partition and the second storage partition, and the data information is separately performed in the two partitions. save.
  • the "organization" in the present application can be either an individual user or a company user, and the specific form is different. Does not affect the scope of protection of this application.
  • the method includes the following steps:
  • All data to be exchanged and traded in the data storage system belongs to a specific group. Weaving. A specific organization is divided into two logical areas: private area, exchange area. All the data of the organization, in and only in these two partitions, a series of use and exchange behaviors such as processing, shelves, and trading. Correspondingly, any project space must also be in a specific partition (private area, swap area). Once the project space is created, the PROJECT developed and exchanged above and the table above PROJECT (such as T1 here). T2) is attributed to the partition in which it is located.
  • the preferred embodiment of the present application defines different operation types for each operation of the data information, including the following three types:
  • a data processing request of an authorization request type may be initiated, and the data processing request is used to authorize the destination data information to the project, so as to enable the The item accesses the destination data information, the item being attributed to the organization.
  • the organization of the data information and other information will change at this time. Since the technical solution of the present application is operated by the background data, the purchase of the data information can be modified once the transaction is completed, and the data processing request carries the destination attribute information, and the data processing request is used to use the destination data.
  • the attribute information of the information (associated with the original organization) is modified into the attribute information of the destination (associated with the organization after the transfer or transaction);
  • the data presentation request is therefore used to present the destination data information on a data platform.
  • S102 Acquire a processing policy that matches the storage partition and the type, where the processing policy is preset in the data storage system.
  • this step combines the processing policies with the storage partition in which the data information is currently located. Since the corresponding processing strategy is set for different storage partitions and types in advance, this step only needs to match the processing strategy according to the storage partition and the type query. However, if the corresponding processing policy is not queried, then it is determined that there is no processing policy matching the storage partition and the type, and the data processing request is rejected and discarded.
  • the processing policy is set as follows:
  • FIG. 3 a schematic diagram of data information exchanged between partitions (including across different organizations) in the specific embodiment is shown in FIG. 3.
  • the data of the private area under the same organization can be authorized to the exchange area or the private area project space under the organization, and the organization can also choose to upload data to the data market and provide it to other organizations for trading ( Exchange across organizations), that is, private area data can perform authorization requests, modification requests, and display requests.
  • the data of the exchange area under the organization can be exchanged between different projects, but not for the above, nor can it be granted to the private area, that is, only the authorization request from the same storage partition can be executed.
  • the preferred embodiment of the present application preferentially imports the new data information into the first storage partition, that is, the data uploaded or imported through the own business system, and can only enter the private area of the row first.
  • the data can be uploaded to the private area through the organization's own business system, if it needs to store the organization
  • the data information in the space is downloaded, and the data information needs to be initially exported through the API corresponding to the storage space (including the exchange area and the private one), and the data information can be completely completely completed after successfully connecting with the API by using the own business system. download.
  • the specific embodiment of the present application will perform security monitoring on the operation of the data information in the exchange area, as shown in FIG. 4, once the data purchase occurs.
  • the entire calculation process will be monitored securely, and the interface for data export through the API will also have corresponding security monitoring.
  • the specific execution process of this step is as follows:
  • FIG. 5 it is a schematic diagram of an authorization policy for data between partitions in a specific embodiment of the present application.
  • the specific embodiment will complete the authorization for the Data1 data by establishing a view Data1' in the exchange area item 3; correspondingly, when the organization 2 in the figure is in the private area, the data table Data3 to which the item 3 belongs is organized into the exchange area.
  • the specific embodiment will complete the authorization for the Data3 data by establishing a view Data3' in the exchange area item 3.
  • FIG. 6 a schematic diagram of a usage flow of data in a exchange area (with a private area) in an embodiment of the present application
  • when an organization needs to upload data privately first create an upload table, and then synchronize data to upload. Table and process and analyze the data in the private area.
  • the private area's data is first authorized to the exchange area's project, which is then processed and analyzed in the exchange area.
  • the purchased DP exports the purchased data through the query layer (the TOP platform provided by the network service provider can be used in a specific application scenario).
  • FIG. 7 a schematic diagram of the usage flow of data in the exchange area (without the private area) in the specific embodiment of the present application, as the DP of the purchase data, firstly purchases the data required by the data market, and the data to be purchased. After processing and analysis in its own exchange area, the purchased data is exported through the query layer.
  • FIG. 8 a schematic diagram of the flow of data in the private area.
  • an organization needs to upload data privately, first create an upload table, then synchronize the data to the upload table, and process the data in the private area. And analysis, after the data is completely processed, the data is put on the data market.
  • the present application further provides a data storage system.
  • the data storage system is provided with a data storage system corresponding to a storage space of an organization, and the storage space is defined by a first storage partition.
  • a second storage partition composition the system includes:
  • the first obtaining module 910 when receiving the data processing request, acquire the type of the data processing request, the storage partition where the item that sends the data processing request is located, and the data Processing a storage partition of the destination data information corresponding to the request;
  • the second obtaining module 920 is configured to acquire a processing policy that matches the storage partition and the type, where the processing policy is preset in the data storage system;
  • the processing module 930 processes the destination data information according to the processing policy and the data processing request.
  • the data processing request is used to authorize the destination data information to the item, so that the item accesses the destination data information, and the item belongs to the organization;
  • the data processing request carries the destination attribute information, where the data processing request is used to modify the attribute information of the destination data information to the destination attribute information;
  • the data processing request is used to display the destination data information on a data platform.
  • the processing strategy is specifically:
  • the data processing request is a display request or a modification request
  • the storage partition of the destination data information is the first storage partition, the data processing request is allowed to be executed
  • the data processing request is an authorization request
  • the storage partition of the destination data information is the first storage partition
  • the data processing request is allowed to be executed.
  • the data processing request is an authorization request
  • the storage partition of the destination data information is the second storage partition
  • the data is allowed to be executed. Process the request.
  • the processing module rejects and discards the data processing request when there is no processing policy matching the storage partition and the type.
  • the import module imports the new data information into the first storage partition when receiving the uploaded new data information.
  • the present application can be implemented by hardware, or by software plus a necessary general hardware platform.
  • the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a USB flash drive, a mobile hard disk, etc.), including several The instructions are for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various implementation scenarios of the present application.
  • modules in the apparatus in the implementation scenario may be distributed in the apparatus for implementing the scenario according to the implementation scenario description, or may be correspondingly changed in one or more devices different from the implementation scenario.
  • the modules of the above implementation scenarios may be combined into one module, or may be further split into multiple sub-modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Educational Administration (AREA)
  • Databases & Information Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

一种数据信息处理方法,通过在数据存储系统中设置与组织对应的存储空间,在当接收到数据处理请求时,获取数据处理请求的类型、发送数据处理请求的项目所在的存储分区以及与数据处理请求对应的目的数据信息的存储分区(S101),随后获取与存储分区以及类型匹配的处理策略,所述处理策略预设于所述数据存储系统中(S102),最后根据处理策略以及数据处理请求对目的数据信息进行处理(S103)。从而实现了同一存储空间中不同数据信息之间的隔离以及权限控制,确保了数据的安全性以及流通性。

Description

一种数据信息处理方法以及数据存储系统 技术领域
本申请涉及网络通信领域,特别涉及一种数据信息处理方法。本申请同时还涉及一种数据存储系统。
背景技术
随着云计算在各行各业日趋火热,加上各种大数据的场景越来越普及,平台运营商对于数据的使用和交换需求也会日益增多。这也催生了不同公司或者企业之间的数据交换或是交易。在目前的技术中,完整拥有资源管理权限的独立单位(例如某个电商公司、ISV(Independent Software Vendors,独立软件开发商)等)称为组织。
目前,大部分针对数据的应用场景更多的是解决数据的储存与计算问题,对于数据托管服务商来说,如何在数据交换过程中提供安全保证以及健全管理成为其必须所面临的问题。尤其是当敏感数据在公共的数据市场上进行交易或转换而涉及到在不同组织之间进行安全、所有权、归属权的变更时,如何在保证安全的前提下使数据能够在不同的DP(Data Provider,数据提供方)之间或是同一个DP内部进行授权访问或是交换修改,成为本领域技术人员亟待解决的技术问题。
发明内容
本申请提供了一种数据信息处理方法,用以在提高数据信息安全性的前提下对不同数据信息进行区别性控制处理。该方法应用于设置有与组织对应的存储空间的数据存储系统,所述存储空间由第一存储分区以及第二存储分区组成,包括:
当接收到数据处理请求时,获取所述数据处理请求的类型、发送所述 数据处理请求的项目所在的存储分区以及与所述数据处理请求对应的目的数据信息的存储分区;
获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统中;
根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
优选地,还包括:
若所述数据处理请求的类型为授权请求,所述数据处理请求用于将所述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织;
若所述数据处理请求的类型为修改请求,所述数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息修改为所述目的属性信息;
若所述数据处理请求的类型为展示请求,所述数据处理请求用于将所述目的数据信息在数据平台上进行展示。
优选地,所述处理策略具体为:
当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求。
优选地,还包括:
若不存在与所述存储分区以及所述类型匹配的处理策略,拒绝并丢弃所述数据处理请求。
优选地,还包括:
当接收到上传的新数据信息时,将所述新数据信息导入所述第一存储分区。
相应地,本申请还提出了一种数据存储系统,所述数据存储系统设置有与组织对应的存储空间的数据存储系统,所述存储空间由第一存储分区以及第二存储分区组成,该系统包括:
第一获取模块,当接收到数据处理请求时,获取所述数据处理请求的类型、发送所述数据处理请求的项目所在的存储分区以及与所述数据处理请求对应的目的数据信息的存储分区;
第二获取模块,获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统中;
处理模块,根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
优选地,还包括:
若所述数据处理请求的类型为授权请求,所述数据处理请求用于将所述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织;
若所述数据处理请求的类型为修改请求,所述数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息修改为所述目的属性信息;
若所述数据处理请求的类型为展示请求,所述数据处理请求用于将所述目的数据信息在数据平台上进行展示。
优选地,所述处理策略具体为:
当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为 所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求。
优选地,还包括:
所述处理模块,还在不存在与所述存储分区以及所述类型匹配的处理策略时拒绝并丢弃所述数据处理请求。
优选地,还包括:
导入模块,当接收到上传的新数据信息时,将所述新数据信息导入所述第一存储分区。
由此可见,通过应用本申请的技术方案,在数据存储系统中设置与组织对应的存储空间,在当接收到数据处理请求时,获取数据处理请求的类型、发送数据处理请求的项目所在的存储分区以及与数据处理请求对应的目的数据信息的存储分区,随后获取与存储分区以及类型匹配的处理策略,最后根据处理策略以及数据处理请求对目的数据信息进行处理。从而实现了同一存储空间中不同数据信息之间的隔离以及权限控制,确保了数据的安全性以及流通性。
附图说明
图1为本申请提出的一种数据信息处理方法的流程示意图;
图2为本申请具体实施例中数据交换依托模型示意图;
图3为本申请具体实施例中数据在分区间的交换的示意图;
图4为本申请具体实施例中数据在交换区的安全监控示意图;
图5为本申请具体实施例中数据在分区间的授权策略示意图;
图6为本申请具体实施例中数据在交换区(带私有区)的使用流程示 意图;
图7为本申请具体实施例中数据在交换区(不带私有区)的使用流程示意图;
图8为本申请具体实施例中数据在私有区的使用流程示意图;
图9为本申请提出的一种数据存储系统的结构示意图。
具体实施方式
如背景技术所述,现有数据的所有权、归属权、使用权的安全控制并不完善,目前可能会存在数据交换的场景,但无法保障在一个基于公共云计算平台下进行海量数据信息在自身组织或其他组织之间进行交换,并有效地保护数据的所有权、归属权。
有鉴于上述现有技术中所存在的问题,本申请提出了一种数据信息处理方法,预先设置了具有与组织对应的存储空间的数据存储系统,该数据存储系统中的数据不仅仅是以不同的组织所分别进行保存,而且针对各个组织的存储空间划分到了两个不同权限的存储分区,即存储空间由第一存储分区以及第二存储分区组成,数据信息在这两个分区中分别单独进行保存。在此需要说明的是,由于本申请旨在解决数据信息交易以及交换方面的权限分配以及控制问题,因此本申请中的“组织”即可以为个人用户,也可以为公司用户,具体形式的不同并不影响本申请的保护范围。
如图1所示,该方法包括以下步骤:
S101,当接收到数据处理请求时,获取所述数据处理请求的类型、发送所述数据处理请求的项目所在的存储分区以及与所述数据处理请求对应的目的数据信息的存储分区。
在图2所示的本申请具体实施例所提出的数据交换依托模型中,该存储系统下相同一个组织的所有数据都存储在特定的分区(私有区以及交换区)中,后续可基于该模型提供数据在市场上交换、买卖的功能。
该数据存储系统中所有要交换、买卖的数据都归属于一个特定的组 织。一个具体的组织则分成两个逻辑的区域:私有区、交换区。该组织所有的数据,在且仅在这两个分区中进行加工、上架、买卖等一系列使用、交换行为。相应地,任何一个项目空间同时也必须在某个特定的分区内(私有区、交换区),一旦项目空间创建完成,上面所开发、交换过来的PROJECT以及PROJECT上面的表(比如这里的T1、T2)都归属于所在的分区内。
尽管以上具体实施例将第一存储分区设置为私有区,以及将第二存储分区设置为交换区,但是本领域技术人员可以在此基础上进行其他改型或是适应性调整,这些都属于本申请的公开范围。
基于不同存储分区中的不同数据信息,本申请优选实施例针对数据信息的各个操作定义了不同的操作类型,具体包括以下三种:
(1)授权请求
当某个组织下的某个项目需要用到其他分区的数据信息时,即可发起授权请求类型的数据处理请求,数据处理请求用于将所述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织。
(2)修改请求
当某个组织从其他的组织手中购买了数据信息后,此时该数据信息的归属组织以及其他一些信息将发生改变。由于本申请的技术方案是通过后台数据进行操作的,因此数据信息的购买一旦交易完成即可进行信息的修改,数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息(与原有的组织相关联)修改为所述目的属性信息(与转让或交易后的组织相关联);
(3)展示请求
在对数据信息进行售卖或是转让的过程中,可能需要将数据信息本身展示给其他人浏览。因此数据展示请求用于将所述目的数据信息在数据平台上进行展示。
S102,获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统中。
基于S101中所提出的不同数据请求处理类型,本步骤结合数据信息当前所在的存储分区进行处理策略的匹配。由于预先针对不同的存储分区以及类型设置了相应的处理策略,该步骤仅需根据存储分区以及类型查询匹配的处理策略即可。但若是查询不到对应的处理策略的话,那么即判定不存在与所述存储分区以及所述类型匹配的处理策略,拒绝并丢弃所述数据处理请求。
为了能够明确地针对授权、修改以及展示等类型请求进行处理,在本申请优选的实施例中,处理策略设置如下:
(1)当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求。
(2)当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求。
(3)当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求。
基于图2所示的的具体实施例中的数据交换依托模型,该具体实施例中的数据信息在分区间(包括跨不同的组织)进行交换的示意图如图3所示。需要说明的是,同一个组织下的私有区的数据可以授权给该组织下的交换区或私有区项目空间,同时该组织也可以选择将数据上架到数据市场,提供给其他的组织进行买卖(跨组织进行交换),即私有区的数据可以执行授权请求、修改请求以及展示请求。该组织下的交换区的数据,可以各个不同的项目之间相互交换,但不可以上架,也不可以授权给私有区,即仅可执行来自于同一存储分区的授权请求。
需要说明的是,当某个组织的存储空间将要接收到该组织上传的新数 据信息时,本申请的优选实施例将新数据信息优先导入第一存储分区,即通过自有的业务系统上传或导入的数据,只能先进入行私有区。具体地,若属于某一组织的技术人员需要将该组织的存储空间中的数据信息进行上传的话,可通过该组织自有的业务系统将数据上传至私有区,若其需要将该组织的存储空间中的数据信息下载,则需要通过与存储空间(包括交换区以及私有去)对应的API将数据信息初步导出,并在利用自有的业务系统与API成功对接后才能完全将数据信息完整地下载。
为保证数据在交换过程中(尤其是在买卖过程中)的数据安全,本申请具体实施例中会针对数据信息在交换区的操作进行安全监控,如图4所示,一旦发生了数据的购买,该组织下的交换区下,会对整个的计算过程做安全监控,同时对数据通过API导出的接口,也有相应的安全监控。
S103,根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
由于本申请主要在后台针对各个组织的不同数据存储分区中的数据进行处理,因此在数据在实际的交换过程中,并不需要执行数据的搬移操作(例如将数据从某台服务器转移至另外一台服务器),而是通过视图授权和视图实现数据对于不同组织或是项目的使用。因此在本申请的优选实施例中,该步骤的具体执行过程如下:
(1)若根据所述处理策略确定允许执行所述数据处理请求,在执行所述数据处理请求之后,在所述目的数据信息当前的存储分区建立与所述目的数据信息在原有的存储分区相同的视图;
(2)若根据所述处理策略确定拒绝执行所述数据处理请求,保持所述目的数据信息在当前的存储分区的视图。
如图5所示,为本申请具体实施例中数据在分区间的授权策略示意图。以同一个组织下的私有区数据到交换区为例,当该图中的组织1在私有区中项目1所属的数据表Data1被组织1交换区中的项目3请求授权且通过后, 该具体实施例将通过在交换区项目3建立一个视图Data1’,完成针对Data1数据的授权;相应地,当该图中的组织2在私有区中项目3所属的数据表Data3被组织1交换区中的项目3请求授权且通过后,该具体实施例将通过在交换区项目3建立一个视图Data3’,完成针对Data3数据的授权。
为了进一步阐述本发明的技术思想,现结合具体的应用场景,对本发明的技术方案进行说明。
如图6所示,为本申请具体实施例中数据在交换区(带私有区)的使用流程示意图,当某个组织需要在私有去上传数据时,首先创建上传表,随后将数据同步到上传表,并在私有区对该数据进行加工以及分析。后续当另外一个DP需要购买该组织的数据/数据服务时,私有区的数据首先被授权至交换区的项目,随后该数据在交换区被加工以及分析。最后购买DP通过查询层(在具体的应用场景中可采用网络服务商提供的TOP平台)导出已购买的数据。
如图7所示,为本申请具体实施例中数据在交换区(不带私有区)的使用流程示意图,作为购买数据的DP,其首先通过数据市场购买其需要的数据,在将购买的数据在自身的交换区加工以及分析之后,在通过查询层导出已购买的数据。
如图8所示,为数据在私有区的使用流程示意图,当某个组织需要在私有去上传数据时,首先创建上传表,随后将数据同步到上传表,并在私有区对该数据进行加工以及分析,待确认数据完全加工完成之后,再将该数据上架至数据市场。
为达到以上技术目的,本申请还提出了一种数据存储系统,如图9所示,所述数据存储系统设置有与组织对应的存储空间的数据存储系统,所述存储空间由第一存储分区以及第二存储分区组成,该系统包括:
第一获取模块910,当接收到数据处理请求时,获取所述数据处理请求的类型、发送所述数据处理请求的项目所在的存储分区以及与所述数据 处理请求对应的目的数据信息的存储分区;
第二获取模块920,获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统中;
处理模块930,根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
在具体的应用场景中,还包括:
若所述数据处理请求的类型为授权请求,所述数据处理请求用于将所述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织;
若所述数据处理请求的类型为修改请求,所述数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息修改为所述目的属性信息;
若所述数据处理请求的类型为展示请求,所述数据处理请求用于将所述目的数据信息在数据平台上进行展示。
在具体的应用场景中,所述处理策略具体为:
当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求;
当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求。
在具体的应用场景中,还包括:
所述处理模块,还在不存在与所述存储分区以及所述类型匹配的处理策略时拒绝并丢弃所述数据处理请求。
在具体的应用场景中,还包括:
导入模块,当接收到上传的新数据信息时,将所述新数据信息导入所述第一存储分区。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到本申请可以通过硬件实现,也可以借助软件加必要的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施场景所述的方法。
本领域技术人员可以理解附图只是一个优选实施场景的示意图,附图中的模块或流程并不一定是实施本申请所必须的。
本领域技术人员可以理解实施场景中的装置中的模块可以按照实施场景描述进行分布于实施场景的装置中,也可以进行相应变化位于不同于本实施场景的一个或多个装置中。上述实施场景的模块可以合并为一个模块,也可以进一步拆分成多个子模块。
上述本申请序号仅仅为了描述,不代表实施场景的优劣。
以上公开的仅为本申请的几个具体实施场景,但是,本申请并非局限于此,任何本领域的技术人员能思之的变化都应落入本申请的保护范围。

Claims (10)

  1. 一种数据信息处理方法,其特征在于,所述方法应用数据存储系统,所述数据存储系统预先设置与组织对应的存储空间,所述存储空间由第一存储分区以及第二存储分区组成,该方法包括:
    当接收到数据处理请求时,确定所述数据处理请求的类型、发送所述数据处理请求的项目所在的存储分区、与所述数据处理请求对应的目的数据信息的存储分区;
    获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统;
    根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
  2. 如权利要求1所述的方法,其特征在于,还包括:
    若所述类型为授权请求,所述数据处理请求用于将所述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织;
    若所述类型为修改请求,所述数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息修改为所述目的属性信息;
    若类型为展示请求,所述数据处理请求用于将所述目的数据信息在数据平台上进行展示。
  3. 如权利要求2所述的方法,其特征在于,所述处理策略具体为:
    当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求;
    当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求;
    当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为 所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求;
    当不存在与所述存储分区以及与所述类型匹配的处理策略时,拒绝并丢弃所述数据处理请求。
  4. 如权利要求3所述的方法,其特征在于,根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理,具体为:
    若根据所述处理策略确定允许执行所述数据处理请求,在执行所述数据处理请求之后,在所述目的数据信息当前的存储分区建立与所述目的数据信息在原有的存储分区相同的视图;
    若根据所述处理策略确定拒绝执行所述数据处理请求,保持所述目的数据信息在当前的存储分区的视图。
  5. 如权利要求1所述的方法,其特征在于,还包括:
    当接收到上传的新数据信息时,将所述新数据信息导入所述第一存储分区。
  6. 一种数据存储系统,其特征在于,所述数据存储系统设置有与组织对应的存储空间的数据存储系统,所述存储空间由第一存储分区以及第二存储分区组成,该系统包括:
    第一获取模块,当接收到数据处理请求时,获取所述数据处理请求的类型、发送所述数据处理请求的项目所在的存储分区以及与所述数据处理请求对应的目的数据信息的存储分区;
    第二获取模块,获取与所述存储分区以及所述类型匹配的处理策略,所述处理策略预设于所述数据存储系统中;
    处理模块,根据所述处理策略以及所述数据处理请求对所述目的数据信息进行处理。
  7. 如权利要求1所述的系统,其特征在于,还包括:
    若所述数据处理请求的类型为授权请求,所述数据处理请求用于将所 述目的数据信息授权给所述项目,以使所述项目访问所述目的数据信息,所述项目归属于所述组织;
    若所述数据处理请求的类型为修改请求,所述数据处理请求中携带目的属性信息,所述数据处理请求用于将所述目的数据信息的属性信息修改为所述目的属性信息;
    若所述数据处理请求的类型为展示请求,所述数据处理请求用于将所述目的数据信息在数据平台上进行展示。
  8. 如权利要求7所述的系统,其特征在于,所述处理策略具体为:
    当所述数据处理请求为展示请求或修改请求时,若所述的目的数据信息的存储分区为所述第一存储分区,允许执行所述数据处理请求;
    当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第一存储分区时,若所述项目所在的存储分区归属于所述存储空间,允许执行所述数据处理请求;
    当所述数据处理请求为授权请求,且所述目的数据信息的存储分区为所述第二存储分区时时,若所述项目所在的存储分区归属于所述第二存储分区,允许执行所述数据处理请求。
  9. 如权利要求8所述的系统,其特征在于,还包括:
    所述处理模块,还在不存在与所述存储分区以及所述类型匹配的处理策略时拒绝并丢弃所述数据处理请求。
  10. 如权利要求6所述的系统,其特征在于,还包括:
    导入模块,当接收到上传的新数据信息时,将所述新数据信息导入所述第一存储分区。
PCT/CN2016/109400 2015-12-22 2016-12-12 一种数据信息处理方法以及数据存储系统 WO2017107792A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP16877603.7A EP3396521A4 (en) 2015-12-22 2016-12-12 Data information processing method, and data storage system
JP2018532121A JP6854288B2 (ja) 2015-12-22 2016-12-12 データ情報処理方法及びデータ記憶システム
US16/016,323 US10977230B2 (en) 2015-12-22 2018-06-22 Data information processing method and data storage system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510973964.9 2015-12-22
CN201510973964.9A CN106909309B (zh) 2015-12-22 2015-12-22 一种数据信息处理方法以及数据存储系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/016,323 Continuation US10977230B2 (en) 2015-12-22 2018-06-22 Data information processing method and data storage system

Publications (1)

Publication Number Publication Date
WO2017107792A1 true WO2017107792A1 (zh) 2017-06-29

Family

ID=59089046

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/109400 WO2017107792A1 (zh) 2015-12-22 2016-12-12 一种数据信息处理方法以及数据存储系统

Country Status (5)

Country Link
US (1) US10977230B2 (zh)
EP (1) EP3396521A4 (zh)
JP (1) JP6854288B2 (zh)
CN (1) CN106909309B (zh)
WO (1) WO2017107792A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111722949A (zh) * 2019-03-18 2020-09-29 北京京东尚科信息技术有限公司 一种信息处理方法、终端、服务器及存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110197064B (zh) * 2019-02-18 2023-08-25 腾讯科技(深圳)有限公司 进程处理方法和装置、存储介质及电子装置
CN110119249B (zh) * 2019-04-04 2022-04-01 同盾控股有限公司 一种数据的存储方法和装置
CN112307510A (zh) * 2020-11-02 2021-02-02 国网江苏省电力有限公司信息通信分公司 数据中台数据资产权限管理方法和管理系统
CN114389998A (zh) * 2021-12-21 2022-04-22 深圳奥哲网络科技有限公司 一种流量分发方法、系统、计算机设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067406A (zh) * 2013-01-14 2013-04-24 暨南大学 一种公有云与私有云之间的访问控制系统及方法
CN103327084A (zh) * 2013-06-08 2013-09-25 北京古盘创世科技发展有限公司 一种公私混合分布式的云存储系统及云存储方法
CN103491052A (zh) * 2012-06-11 2014-01-01 上海博路信息技术有限公司 一种多用户的数据交换方法
US20140215590A1 (en) * 2008-12-22 2014-07-31 Ctera Networks, Ltd. Multi-tenant cloud storage system
CN104866976A (zh) * 2015-06-01 2015-08-26 北京圆通慧达管理软件开发有限公司 面向多租户的管理信息系统

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006302240A (ja) 2005-03-23 2006-11-02 Fujitsu Ltd 文書管理プログラム及び文書管理装置
JP5036406B2 (ja) * 2007-05-30 2012-09-26 エイチジーエスティーネザーランドビーブイ コンテンツデータ管理システム及び方法
CN101499061A (zh) * 2008-01-30 2009-08-05 国际商业机器公司 面向多租户的数据库引擎及其数据访问方法
CN101639835A (zh) * 2008-07-30 2010-02-03 国际商业机器公司 多租户场景中应用数据库分区的方法和装置
US8782762B2 (en) * 2011-08-17 2014-07-15 International Business Machines Corporation Building data security in a networked computing environment
WO2013137906A1 (en) * 2012-03-16 2013-09-19 Hewlett-Packard Development Company , L.P. Illuminating a first light source and a second light source of a display device
JP6419700B2 (ja) * 2012-09-07 2018-11-07 オラクル・インターナショナル・コーポレイション クラウドサービスを提供するためのインフラストラクチャ
US9203866B2 (en) * 2012-09-07 2015-12-01 Oracle International Corporation Overage framework for cloud services
CN103795690B (zh) * 2012-10-31 2017-08-11 华为技术有限公司 一种云访问控制的方法、代理服务器和系统
US9632878B1 (en) * 2013-09-20 2017-04-25 Amazon Technologies, Inc. Verification of database table partitions during backup
JP5910596B2 (ja) * 2013-09-24 2016-04-27 日本電気株式会社 ストレージ管理システム、ストレージ管理方法、プログラム、および、情報処理システム
JP2015204087A (ja) * 2014-04-16 2015-11-16 キヤノン株式会社 管理システム及び管理方法
US10318618B2 (en) * 2014-06-18 2019-06-11 Microsoft Technology Licensing, Llc Consistent views of partitioned data in eventually consistent systems
CN104270467B (zh) * 2014-10-24 2017-09-29 冯斌 一种用于混合云的虚拟机管控方法
CN104767745A (zh) * 2015-03-26 2015-07-08 浪潮集团有限公司 一种云端数据安全保护方法
US10296215B2 (en) * 2017-03-20 2019-05-21 International Business Machines Corporation Efficient export scheduling using index and schema to determine data distribution
US11500813B2 (en) * 2018-11-02 2022-11-15 EMC IP Holding Company LLC Instant replay of a file to a cloud tier on a deduplication file system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140215590A1 (en) * 2008-12-22 2014-07-31 Ctera Networks, Ltd. Multi-tenant cloud storage system
CN103491052A (zh) * 2012-06-11 2014-01-01 上海博路信息技术有限公司 一种多用户的数据交换方法
CN103067406A (zh) * 2013-01-14 2013-04-24 暨南大学 一种公有云与私有云之间的访问控制系统及方法
CN103327084A (zh) * 2013-06-08 2013-09-25 北京古盘创世科技发展有限公司 一种公私混合分布式的云存储系统及云存储方法
CN104866976A (zh) * 2015-06-01 2015-08-26 北京圆通慧达管理软件开发有限公司 面向多租户的管理信息系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3396521A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111722949A (zh) * 2019-03-18 2020-09-29 北京京东尚科信息技术有限公司 一种信息处理方法、终端、服务器及存储介质
CN111722949B (zh) * 2019-03-18 2024-04-05 北京京东尚科信息技术有限公司 一种信息处理方法、终端、服务器及存储介质

Also Published As

Publication number Publication date
JP2019505894A (ja) 2019-02-28
US20180300360A1 (en) 2018-10-18
CN106909309A (zh) 2017-06-30
CN106909309B (zh) 2019-12-24
EP3396521A1 (en) 2018-10-31
JP6854288B2 (ja) 2021-04-07
EP3396521A4 (en) 2018-12-19
US10977230B2 (en) 2021-04-13

Similar Documents

Publication Publication Date Title
WO2017107792A1 (zh) 一种数据信息处理方法以及数据存储系统
CN109510849B (zh) 云存储的帐号鉴权方法和装置
CA2946224C (en) Method and apparatus for automating the building of threat models for the public cloud
US9003502B2 (en) Hybrid multi-tenancy cloud platform
US9912753B2 (en) Cloud storage brokering service
US11218313B1 (en) Decentralized verification of devices using distributed ledger technology
CN113297625B (zh) 基于区块链的数据共享系统、方法和电子设备
US10671284B2 (en) Placement and movement of sub-units of a storage unit in a tiered storage environment
US11556667B2 (en) Facilitating processing of a query on shareable data in a temporary vault
US10346618B1 (en) Data encryption for virtual workspaces
US10104163B1 (en) Secure transfer of virtualized resources between entities
US10114939B1 (en) Systems and methods for secure communications between devices
CN110096542A (zh) 去中心化的数据验证处理方法、装置、系统和介质
US9288264B2 (en) System and method for implementing a cloud workflow
US20160283132A1 (en) Conflict management for application directed data placement in storage environments
US11418515B2 (en) Multi-vendor support for network access control policies
US11057455B1 (en) File transfer abstraction on a computer network
CN107181801A (zh) 一种电子附件存储方法及终端
TWI748982B (zh) 資料訊息處理方法以及資料儲存系統
US8479281B2 (en) Authentication management methods and media
Kukreti Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCP (English Edition)
US20120185581A1 (en) Domain based isolation of network ports
US20210014048A1 (en) Securely retrieving encryption keys for a storage system
US20240311505A1 (en) Techniques for securely executing attested code in a collaborative environment
US20240069909A1 (en) Software bill of materials handshake for cloud-based code execution

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16877603

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018532121

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2016877603

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016877603

Country of ref document: EP

Effective date: 20180723