技术领域Technical Field
本发明涉及管理系统领域,具体涉及一种分布式文件智能管理系统及方法。The present invention relates to the field of management systems, and in particular to a distributed file intelligent management system and method.
背景技术Background Art
分布式储存是一种数据存储技术,通过网络使用企业中的每台机器上的储存硬件中,并将这些分散的存储资源构成一个虚拟的存储设备,数据分散的存储在企业的各个角落。这种技术可以提高数据的可靠性、可用性和存取效率,还易于扩展,比单一存储系统更具成本效益;Distributed storage is a data storage technology that uses the storage hardware on each machine in the enterprise through the network and forms these scattered storage resources into a virtual storage device. Data is stored in various corners of the enterprise. This technology can improve data reliability, availability and access efficiency, is easy to expand, and is more cost-effective than a single storage system.
在进行分布式储存文件管理的过程中即会使用到分布式文件管理系统及方法。In the process of distributed storage file management, a distributed file management system and method are used.
现有的分布式储存文件管理系统及方法,管理类型单一,不能更好的保证储存的文件的安全,给分布式储存文件管理系统及方法的使用带来了一定的影响,因此提取出了一种分布式文件智能管理系统及方法。The existing distributed storage file management system and method have a single management type and cannot better guarantee the security of stored files, which has a certain impact on the use of the distributed storage file management system and method. Therefore, a distributed file intelligent management system and method are extracted.
发明内容Summary of the invention
针对现有技术中的缺陷,本发明提供一种分布式文件智能管理系统及方法,包括文件导入模块、文件采集模块、文件安全评估模块、储存硬件采集模块、数据处理模块与信息发送模块;In view of the defects in the prior art, the present invention provides a distributed intelligent file management system and method, including a file import module, a file collection module, a file security assessment module, a storage hardware collection module, a data processing module and an information sending module;
所述文件导入模块用于导入需要进行分布式储存的储存文件;The file import module is used to import storage files that need to be distributed stored;
所述文件安全评估模块用于对储存文件进行安全评估获取到文件安全评估信息;The file security assessment module is used to perform security assessment on stored files to obtain file security assessment information;
所述文件采集模块用于从已经储存的文件中采集各个已储存文件的文件信息;The file collection module is used to collect file information of each stored file from the stored files;
所述储存硬件采集模块用于采集储存设备信息;The storage hardware acquisition module is used to collect storage device information;
所述数据处理模块用于对文件信息与储存设备信息进行处理生成文件另存信息与硬件管理信息;The data processing module is used to process the file information and storage device information to generate file save information and hardware management information;
所述信息发送模块用于在文件另存信息与硬件管理信息生成后,将文件另存信息与硬件管理信息生成后发送到预设接收终端。The information sending module is used to send the file save information and the hardware management information to a preset receiving terminal after the file save information and the hardware management information are generated.
进一步在于,所述文件安全评估信息的具体处理过程如下:提取出采集到的储存文件,对储存文件信息进行安全信息提取,先对安全信息进行分析,获取到文件安全初评估信息,文件安全初评估信息包括初评正常与初评异常;Furthermore, the specific processing process of the file security assessment information is as follows: extracting the collected storage files, extracting security information from the storage file information, first analyzing the security information, and obtaining the file security initial assessment information, the file security initial assessment information includes the initial assessment normal and the initial assessment abnormal;
当文件安全初评估信息为初评正常时,即进入二次安全评估,获取到二次评估信息,二次评估信息包括二次评估正常与二次评估异常,当二次评估信息为二次评估正常时,即允许该文件进行分布式储存,当二次评估信息为二次评估异常时即不允许其进行储存。When the initial file security assessment information is normal, the secondary security assessment is initiated to obtain secondary assessment information, which includes normal secondary assessment and abnormal secondary assessment. When the secondary assessment information is normal, the file is allowed to be distributed stored. When the secondary assessment information is abnormal, the file is not allowed to be stored.
进一步在于,所述安全信息包括文件的元数据、扩展名与文件头信息,所述对安全信息进行分析,获取到文件安全初评估信息的具体过程如下:对安全信息进行识别处理获取到文件类型,将文件类型与预设的安全数据库中的文件类型特征进行匹配,确定文件的类型,对于确定出的文件类型,进行安全分析,安全分析内容包括深度扫描、恶意代码检测与行为监控,当安全分析完成,发现文件无异常时,即生成初评正常,当发现文件存在异常时,即生成初评异常。Furthermore, the security information includes the metadata, extension and file header information of the file. The specific process of analyzing the security information to obtain the initial file security assessment information is as follows: the security information is identified and processed to obtain the file type, the file type is matched with the file type feature in a preset security database, the type of the file is determined, and a security analysis is performed on the determined file type. The security analysis content includes deep scanning, malicious code detection and behavior monitoring. When the security analysis is completed and the file is found to be normal, the initial assessment is normal. When the file is found to be abnormal, the initial assessment is abnormal.
进一步在于,所述二次安全评估的具体过程如下:创建虚拟机,将需要储存的文件导入到虚拟机中,在虚拟机中打开并运行该文件,观察文件是否存在异常为或系统变化,当文件无异常行为,且系统无变化时,再使用虚拟机的监控工具来观察文件运行时的系统活动,监控工具监控的内容包括进程、网络连接、注册表更改;当进程、网络连接、注册表更改中任意一个异常时,即生成二次评估异常,当进程、网络连接、注册表均无异常,即生成二次评估正常。Furthermore, the specific process of the secondary security assessment is as follows: create a virtual machine, import the file to be stored into the virtual machine, open and run the file in the virtual machine, observe whether the file has any abnormal behavior or system changes, when the file has no abnormal behavior and the system has no changes, use the virtual machine's monitoring tool to observe the system activity when the file is running, the monitoring tool monitors the process, network connection, and registry changes; when any one of the process, network connection, and registry change is abnormal, a secondary assessment abnormality is generated, and when the process, network connection, and registry are normal, the secondary assessment normal is generated.
进一步在于,所述文件另存信息具体处理过程如下:Furthermore, the specific processing process of the file saving information is as follows:
步骤一:提取出采集到的文件信息,文件信息包括文件被提取次数与文件被提取出时间信息,文件被提取出时间信息为该文件最后一次被提取出的时间信息;Step 1: Extract the collected file information, which includes the number of times the file was extracted and the time information when the file was extracted. The time information when the file was extracted is the time information when the file was last extracted.
步骤二:将文件被提取出次数标记为Qi,i为文件数量信息,之后提取出该文件最后一次被提取的时间信息,将其标记以为Ti;Step 2: Mark the number of times the file is extracted as Qi, where i is the number of files, and then extract the time information when the file was last extracted and mark it as Ti;
步骤三:将文件被提取出次数Qi按照从大到小的顺序进行排序,之后提取出最大的x个为初步另存文件,再提取出x个的文件被提取出时间信息Ti,将当前时间信息标记为G,计算出G与提取出时间信息Ti的差值,获取到x个评估时间差GT;Step 3: Sort the number of times the files are extracted Qi from large to small, then extract the largest x as preliminary saved files, then extract the time information Ti of the x files, mark the current time information as G, calculate the difference between G and the extraction time information Ti, and obtain x evaluation time differences GT;
步骤四:将x个评估时间差GT中大于预设值对应的初步另存文件去除掉后,将剩余的文件标记为最终另存文件,此时即生成文件另存信息;Step 4: After removing the preliminary saved files corresponding to the x evaluation time differences GT that are greater than the preset value, mark the remaining files as final saved files, and generate file save information at this time;
步骤五:当获取到的最终另存文件数量小于x/3时,即从文件被提取出次数Qi中去除掉最大x个文件后,从剩余文件的文件中再提取出最大x个,按照步骤三中过程筛选,将最终另存文件数量补齐到至少x/3个。Step 5: When the final number of saved files obtained is less than x/3, that is, after removing the maximum x files from the number of times the file is extracted Qi, extract the maximum x files from the remaining files, and filter according to the process in step 3 to make the final number of saved files at least x/3.
进一步在于,所述硬件管理信息的具体处理过程如下:提取出采集到的储存设备信息,储存设备信息包括储存设备的位置信息、储存设备的环境信息与分布式储存设备的剩余储存容量信息;Furthermore, the specific processing process of the hardware management information is as follows: extracting the collected storage device information, the storage device information including the location information of the storage device, the environment information of the storage device and the remaining storage capacity information of the distributed storage device;
对储存设备的位置信息进行处理获取到第一评估参数,对储存设备的环境信息进行处理获取到第二评估参数,对分布式储存设备的剩余储存容量信息进行处理获取到第三评估参数;The location information of the storage device is processed to obtain a first evaluation parameter, the environment information of the storage device is processed to obtain a second evaluation parameter, and the remaining storage capacity information of the distributed storage device is processed to obtain a third evaluation parameter;
当第一评估参数、第二评估参数与第三评估参数中任意一个异常时,即生成硬件管理信息。When any one of the first evaluation parameter, the second evaluation parameter and the third evaluation parameter is abnormal, hardware management information is generated.
进一步在于,所述第一评估参数的获取过程与异常判断过程如下:提取出储存设备的位置信息,将其导入到预设坐标系中计算出其与预设标准储存设备位置的坐标差即获取到第一评估参数,当第一评估参数大于预设值时,即表示其存在异常;Furthermore, the process of obtaining the first evaluation parameter and the process of abnormality judgment are as follows: extracting the location information of the storage device, importing it into a preset coordinate system, calculating the coordinate difference between it and the preset standard storage device position, and obtaining the first evaluation parameter; when the first evaluation parameter is greater than the preset value, it indicates that there is an abnormality;
所述预设坐标系的建立与预设的标准储存设备的位置的坐标差的获取过程如下:在分布式储存设备安装时,记录下其位置,采集距离最远的两个分布式储存设备的几何中心为基准点A和B,将基准点A和B连线获取到线段L,之后提取出线段L的中点为基准点建立平面直角坐标系,即预设坐标系,之后将所有安装好的分布式设储存设备的位置标记预设坐标系上,即获取到预设标准储存设备位置。The process of establishing the preset coordinate system and obtaining the coordinate difference between the position of the preset standard storage device is as follows: when the distributed storage device is installed, its position is recorded, and the geometric centers of the two distributed storage devices farthest away are collected as reference points A and B. The reference points A and B are connected to obtain the line segment L, and then the midpoint of the line segment L is extracted as the reference point to establish a plane rectangular coordinate system, that is, the preset coordinate system. Then, the positions of all installed distributed storage devices are marked on the preset coordinate system, that is, the preset standard storage device positions are obtained.
进一步在于,所述第二评估参数的获取过程与异常判断过程如下:提取出采集到的储存设备的环境信息,储存设备的环境信息为环境温度信息与环境湿度信息,环境温度信息与环境湿度信息组成第二评估参数,当环境温度信息与环境湿度信息中任意一个大于预设值超过预设时长,即表示第二评估参数异常。Furthermore, the process of obtaining the second evaluation parameter and the process of judging the abnormality are as follows: extract the collected environmental information of the storage device, the environmental information of the storage device is the environmental temperature information and the environmental humidity information, the environmental temperature information and the environmental humidity information constitute the second evaluation parameter, when any one of the environmental temperature information and the environmental humidity information is greater than a preset value for more than a preset time, it indicates that the second evaluation parameter is abnormal.
进一步在于,所述第三评估参数的获取过程与异常判断过程如下:提取出采集到的分布式储存设备的剩余储存容量信息,再采集该分布式储存设备预设时长内储存进入的文件大小信息,将预设时长标记为E1,将预设时长内储存进入的文件大小信息标记为E2,将分布式储存设备的剩余储存容量信息标记为E3;Furthermore, the acquisition process and abnormality judgment process of the third evaluation parameter are as follows: extract the remaining storage capacity information of the collected distributed storage device, collect the file size information stored in the distributed storage device within a preset time, mark the preset time as E1, mark the file size information stored in the preset time as E2, and mark the remaining storage capacity information of the distributed storage device as E3;
通过公式E3/(E2/E1)=Ee,即获取到第三评估参数,当第三评估参数小于预设值时,即表示第三评估参数异常。The third evaluation parameter is obtained through the formula E3/(E2/E1)=Ee. When the third evaluation parameter is less than the preset value, it means that the third evaluation parameter is abnormal.
一种分布式文件智能管理方法,所述方法包括以下步骤:A distributed file intelligent management method, the method comprising the following steps:
步骤(1):导入需要进行分布式储存的储存文件;Step (1): Import the storage file that needs to be distributed stored;
步骤(2):对储存文件进行安全评估获取到文件安全评估信息,文件安全评估信息无异常即进行储存;Step (2): Perform a security assessment on the stored file to obtain the file security assessment information. If there is no abnormality in the file security assessment information, the file is stored;
步骤(3):从已经储存的文件中采集各个已储存文件的文件信息,再采集储存设备信息;Step (3): Collecting file information of each stored file from the stored files, and then collecting storage device information;
步骤(4):对文件信息与储存设备信息进行处理生成文件另存信息与硬件管理信息;Step (4): Process the file information and storage device information to generate file save information and hardware management information;
步骤(5):在文件另存信息与硬件管理信息生成后,将文件另存信息与硬件管理信息生成后发送到预设接收终端。Step (5): After the file save information and the hardware management information are generated, the file save information and the hardware management information are sent to a preset receiving terminal.
本发明的有益效果体现在:The beneficial effects of the present invention are embodied in:
本发明通过设置的文件安全评估模块,对需要进行分布储存的文件进行了细化的安全评估,能够有效的避免异常文件储存到的分布式储存设备中导致的分布式储存设备中储存的其他文件被盗用等状况发生,通过生成的文件另存信息,将分布式储存设备中的经常被提取调用的文件进行单独的存储,能够加快后续用户进行文件检索的速度,通过生成的硬件管理信息对分布式储存设备的硬件进行了更好的管理,保证分布式文件储存的硬件设备的安全,大大减少了因为硬件问题导致的储存文件损坏丢失的状况发生,更进一步的保证了存储的文件安全,实现了文件提取优化和文件安全防护的一体化管理,满足了用户的不同使用需求。The present invention, through the set file security assessment module, performs detailed security assessment on files that need to be distributedly stored, which can effectively avoid the situation that other files stored in the distributed storage device are stolen due to abnormal files stored in the distributed storage device. Through the generated file save information, the files that are frequently extracted and called in the distributed storage device are stored separately, which can speed up the subsequent file retrieval of users. The hardware of the distributed storage device is better managed through the generated hardware management information, ensuring the security of the hardware devices for distributed file storage, greatly reducing the occurrence of damage and loss of stored files due to hardware problems, further ensuring the security of stored files, realizing the integrated management of file extraction optimization and file security protection, and meeting the different usage requirements of users.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍。在所有附图中,类似的元件或部分一般由类似的附图标记标识。附图中,各元件或部分并不一定按照实际的比例绘制。In order to more clearly illustrate the specific embodiments of the present invention or the technical solutions in the prior art, the following is a brief introduction to the drawings required for the specific embodiments or the description of the prior art. In all the drawings, similar elements or parts are generally identified by similar reference numerals. In the drawings, the elements or parts are not necessarily drawn according to the actual scale.
图1为本发明的系统框图;Fig. 1 is a system block diagram of the present invention;
图2为本发明的预设坐标系建立示意图。FIG. 2 is a schematic diagram of establishing a preset coordinate system of the present invention.
具体实施方式DETAILED DESCRIPTION
下面将结合附图对本发明技术方案的实施例进行详细的描述。以下实施例仅用于更加清楚地说明本发明的技术方案,因此只作为示例,而不能以此来限制本发明的保护范围。The following embodiments of the technical solution of the present invention are described in detail in conjunction with the accompanying drawings. The following embodiments are only used to more clearly illustrate the technical solution of the present invention, and are therefore only used as examples, and cannot be used to limit the protection scope of the present invention.
需要注意的是,除非另有说明,本申请使用的技术术语或者科学术语应当为本发明所属领域技术人员所理解的通常意义。It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application should have the common meanings understood by those skilled in the art to which the present invention belongs.
如图1~图2所示,一种分布式文件智能管理系统及方法,包括文件导入模块、文件采集模块、文件安全评估模块、储存硬件采集模块、数据处理模块与信息发送模块;As shown in Figures 1 and 2, a distributed file intelligent management system and method includes a file import module, a file collection module, a file security assessment module, a storage hardware collection module, a data processing module and an information sending module;
所述文件导入模块用于导入需要进行分布式储存的储存文件;The file import module is used to import storage files that need to be distributed stored;
所述文件安全评估模块用于对储存文件进行安全评估获取到文件安全评估信息;The file security assessment module is used to perform security assessment on stored files to obtain file security assessment information;
所述文件采集模块用于从已经储存的文件中采集各个已储存文件的文件信息;The file collection module is used to collect file information of each stored file from the stored files;
所述储存硬件采集模块用于采集储存设备信息;The storage hardware acquisition module is used to collect storage device information;
所述数据处理模块用于对文件信息与储存设备信息进行处理生成文件另存信息与硬件管理信息;The data processing module is used to process the file information and storage device information to generate file save information and hardware management information;
所述信息发送模块用于在文件另存信息与硬件管理信息生成后,将文件另存信息与硬件管理信息生成后发送到预设接收终端;The information sending module is used to send the file save information and the hardware management information to a preset receiving terminal after the file save information and the hardware management information are generated;
本发明通过设置的文件安全评估模块,对需要进行分布储存的文件进行了细化的安全评估,能够有效的避免异常文件储存到的分布式储存设备中导致的分布式储存设备中储存的其他文件被盗用等状况发生,通过生成的文件另存信息,将分布式储存设备中的经常被提取调用的文件进行单独的存储,能够加快后续用户进行文件检索的速度,通过生成的硬件管理信息对分布式储存设备的硬件进行了更好的管理,保证分布式文件储存的硬件设备的安全,大大减少了因为硬件问题导致的储存文件损坏丢失的状况发生,更进一步的保证了存储的文件安全,实现了文件提取优化和文件安全防护的一体化管理,满足了用户的不同使用需求。The present invention, through the set file security assessment module, performs detailed security assessment on files that need to be distributedly stored, which can effectively avoid the situation that other files stored in the distributed storage device are stolen due to abnormal files stored in the distributed storage device. Through the generated file save information, the files that are frequently extracted and called in the distributed storage device are stored separately, which can speed up the subsequent file retrieval of users. The hardware of the distributed storage device is better managed through the generated hardware management information, ensuring the security of the hardware devices for distributed file storage, greatly reducing the occurrence of damage and loss of stored files due to hardware problems, further ensuring the security of stored files, realizing the integrated management of file extraction optimization and file security protection, and meeting the different usage requirements of users.
所述文件安全评估信息的具体处理过程如下:提取出采集到的储存文件,对储存文件信息进行安全信息提取,先对安全信息进行分析,获取到文件安全初评估信息,文件安全初评估信息包括初评正常与初评异常;The specific processing process of the file security assessment information is as follows: extracting the collected storage files, extracting security information from the storage file information, first analyzing the security information, and obtaining the file security initial assessment information, the file security initial assessment information includes the initial assessment normal and the initial assessment abnormal;
当文件安全初评估信息为初评正常时,即进入二次安全评估,获取到二次评估信息,二次评估信息包括二次评估正常与二次评估异常,当二次评估信息为二次评估正常时,即允许该文件进行分布式储存,当二次评估信息为二次评估异常时即不允许其进行储存;When the initial security assessment information of the file is normal, the secondary security assessment is started and the secondary assessment information is obtained. The secondary assessment information includes normal secondary assessment and abnormal secondary assessment. When the secondary assessment information is normal, the file is allowed to be distributed stored. When the secondary assessment information is abnormal, the file is not allowed to be stored.
当文件安全出评估信息为初评异常时,即直接停止储存;When the file security assessment information is abnormal in the initial assessment, storage will be stopped directly;
通过上述过程能够提高数据可靠性:在分布式储存系统中,数据被分散存储在多个节点上。通过安全检测,可以及时发现并修复数据在存储或传输过程中可能出现的错误或损坏,从而提高数据的可靠性;增强数据安全性:安全检测可以检测出存储在分布式系统中的恶意文件或代码,从而防止恶意攻击或数据泄露。通过定期的安全检测和更新,可以确保系统的安全性和稳定性;提升系统性能:通过安全检测,可以及时发现并解决系统中的性能瓶颈和故障,从而提高系统的整体性能和稳定性。这对于大规模的分布式系统尤为重要,可以避免因个别节点故障导致整个系统性能下降的情况发生;降低维护成本:定期进行安全检测和更新可以减少对硬件和软件的维护成本。通过及时发现和修复问题,可以延长硬件的使用寿命,减少软件故障和停机时间,从而降低维护成本。The above process can improve data reliability: In a distributed storage system, data is stored in multiple nodes. Through security testing, errors or damage that may occur in the storage or transmission process can be discovered and repaired in time, thereby improving data reliability; Enhance data security: Security testing can detect malicious files or codes stored in the distributed system, thereby preventing malicious attacks or data leakage. Through regular security testing and updates, the security and stability of the system can be ensured; Improve system performance: Through security testing, performance bottlenecks and faults in the system can be discovered and resolved in time, thereby improving the overall performance and stability of the system. This is particularly important for large-scale distributed systems, which can avoid the situation where the performance of the entire system is reduced due to the failure of individual nodes; Reduce maintenance costs: Regular security testing and updates can reduce the maintenance costs of hardware and software. By discovering and repairing problems in a timely manner, the service life of hardware can be extended, software failures and downtime can be reduced, thereby reducing maintenance costs.
所述安全信息包括文件的元数据、扩展名与文件头信息,所述对安全信息进行分析,获取到文件安全初评估信息的具体过程如下:对安全信息进行识别处理获取到文件类型,将文件类型与预设的安全数据库中的文件类型特征进行匹配,确定文件的类型,对于确定出的文件类型,进行安全分析,安全分析内容包括深度扫描、恶意代码检测与行为监控,当安全分析完成,发现文件无异常时,即生成初评正常,当发现文件存在异常时,即生成初评异常;The security information includes metadata, extension and file header information of the file. The specific process of analyzing the security information to obtain the initial security assessment information of the file is as follows: the security information is identified and processed to obtain the file type, the file type is matched with the file type feature in the preset security database, the file type is determined, and the security analysis is performed on the determined file type. The security analysis content includes deep scanning, malicious code detection and behavior monitoring. When the security analysis is completed and no abnormality is found in the file, the initial assessment is normal. When the file is found to be abnormal, the initial assessment is abnormal.
所述二次安全评估的具体过程如下:创建虚拟机,将需要储存的文件导入到虚拟机中,在虚拟机中打开并运行该文件,观察文件是否存在异常为或系统变化,当文件无异常行为,且系统无变化时,再使用虚拟机的监控工具来观察文件运行时的系统活动,监控工具监控的内容包括进程、网络连接、注册表更改;当进程、网络连接、注册表更改中任意一个异常时,即生成二次评估异常,当进程、网络连接、注册表均无异常,即生成二次评估正常;The specific process of the secondary security assessment is as follows: create a virtual machine, import the file to be stored into the virtual machine, open and run the file in the virtual machine, observe whether the file has abnormal behavior or system changes, and when the file has no abnormal behavior and the system has no changes, use the virtual machine's monitoring tool to observe the system activity when the file is running. The monitoring tool monitors the process, network connection, and registry changes. When any one of the process, network connection, and registry change is abnormal, a secondary assessment abnormality is generated. When the process, network connection, and registry are normal, a secondary assessment normality is generated.
通过上述设置虚拟机提供了一个隔离的环境,使得测试不会影响到主操作系统或其他应用程序。这可以确保测试过程的安全性,防止潜在的恶意软件或漏洞对分布式储存硬件的造成损害,并且在一个物理服务器上可以创建多个虚拟环境,同时进行多个储存文件的多次测试,提高工作效率,虚拟机可以轻松地创建和复制,这意味着每次测试都可以在相同的环境下进行,确保了测试结果的可重复性,由于所有的测试都在虚拟环境中进行,所以不会对实际的数据和系统造成影响。同时,虚拟机可以进行快照和备份,确保测试过程的数据安全,并且当测试过程中出现了问题,可以通过回滚虚拟机的状态来恢复到之前的状态,避免数据丢失或损坏,通过虚拟机进行文件安全检测可以提高工作效率,减少人工干预,自动化测试流程。测试人员可以专注于分析测试结果,而不是花费大量时间配置和管理测试环境,使用虚拟机进行文件安全检测可以提供一个安全、隔离、可重复的测试环境,提高最终储存的数据的可靠性。Through the above settings, the virtual machine provides an isolated environment so that the test will not affect the main operating system or other applications. This can ensure the security of the test process, prevent potential malware or vulnerabilities from damaging the distributed storage hardware, and multiple virtual environments can be created on a physical server to perform multiple tests on multiple storage files at the same time, improving work efficiency. Virtual machines can be easily created and copied, which means that each test can be performed in the same environment, ensuring the repeatability of the test results. Since all tests are performed in a virtual environment, there will be no impact on the actual data and system. At the same time, virtual machines can be snapshotted and backed up to ensure data security during the test process, and when problems occur during the test process, the state of the virtual machine can be rolled back to restore to the previous state to avoid data loss or damage. File security detection through virtual machines can improve work efficiency, reduce manual intervention, and automate the test process. Testers can focus on analyzing test results instead of spending a lot of time configuring and managing the test environment. Using virtual machines for file security detection can provide a safe, isolated, and repeatable test environment to improve the reliability of the final stored data.
所述文件另存信息具体处理过程如下:The specific processing process of saving the file information is as follows:
步骤一:提取出采集到的文件信息,文件信息包括文件被提取次数与文件被提取出时间信息,文件被提取出时间信息为该文件最后一次被提取出的时间信息;Step 1: Extract the collected file information, which includes the number of times the file was extracted and the time information when the file was extracted. The time information when the file was extracted is the time information when the file was last extracted.
步骤二:将文件被提取出次数标记为Qi,i为文件数量信息,之后提取出该文件最后一次被提取的时间信息,将其标记以为Ti;Step 2: Mark the number of times the file is extracted as Qi, where i is the number of files, and then extract the time information when the file was last extracted and mark it as Ti;
步骤三:将文件被提取出次数Qi按照从大到小的顺序进行排序,之后提取出最大的x个为初步另存文件,再提取出x个的文件被提取出时间信息Ti,将当前时间信息标记为G,计算出G与提取出时间信息Ti的差值,获取到x个评估时间差GT;Step 3: Sort the number of times the files are extracted Qi from large to small, then extract the largest x as preliminary saved files, then extract the time information Ti of the x files, mark the current time information as G, calculate the difference between G and the extraction time information Ti, and obtain x evaluation time differences GT;
步骤四:将x个评估时间差GT中大于预设值对应的初步另存文件去除掉后,将剩余的文件标记为最终另存文件,此时即生成文件另存信息;Step 4: After removing the preliminary saved files corresponding to the x evaluation time differences GT that are greater than the preset value, mark the remaining files as final saved files, and generate file save information at this time;
步骤五:当获取到的最终另存文件数量小于x/3时,即从文件被提取出次数Qi中去除掉最大x个文件后,从剩余文件的文件中再提取出最大x个,按照步骤三中过程筛选,将最终另存文件数量补齐到至少x/3个;Step 5: When the number of files saved is less than x/3, after removing the maximum x files from the number of times the files are extracted Qi, extract the maximum x files from the remaining files, and select them according to the process in step 3 to make the number of files saved to at least x/3;
20≥x≥10;20 ≥ x ≥ 10;
文件另存信息的具体内容为:将选定的最终另存文件复制后单独存储到一个储存设备中,在用户进行文件提取时,优先从该储存设备中进行检索。The specific content of the file save-as information is: the selected final save-as file is copied and stored separately in a storage device, and when the user retrieves the file, it is retrieved from the storage device first.
所述硬件管理信息的具体处理过程如下:提取出采集到的储存设备信息,储存设备信息包括储存设备的位置信息、储存设备的环境信息与分布式储存设备的剩余储存容量信息;The specific processing process of the hardware management information is as follows: extracting the collected storage device information, the storage device information includes the location information of the storage device, the environment information of the storage device and the remaining storage capacity information of the distributed storage device;
对储存设备的位置信息进行处理获取到第一评估参数,对储存设备的环境信息进行处理获取到第二评估参数,对分布式储存设备的剩余储存容量信息进行处理获取到第三评估参数;The location information of the storage device is processed to obtain a first evaluation parameter, the environment information of the storage device is processed to obtain a second evaluation parameter, and the remaining storage capacity information of the distributed storage device is processed to obtain a third evaluation parameter;
当第一评估参数、第二评估参数与第三评估参数中任意一个异常时,即生成硬件管理信息;When any one of the first evaluation parameter, the second evaluation parameter and the third evaluation parameter is abnormal, hardware management information is generated;
当第一评估参数异常时,生成的硬件管理信息的内容为储存设备发生异常位移,请进行文件完整性的校验和文件备份处理;When the first evaluation parameter is abnormal, the generated hardware management information indicates that the storage device has abnormal displacement, and please perform file integrity verification and file backup processing;
当第二评估参数异常时,生成的硬件管理信息的内容为储存设备环境异常,请进行文件完整性的校验;When the second evaluation parameter is abnormal, the generated hardware management information indicates that the storage device environment is abnormal. Please verify the integrity of the file.
当第三评估参数异常时,生成的硬件管理信息的内容为储存设备的储存空间异常,请进行储存空间的扩充;When the third evaluation parameter is abnormal, the generated hardware management information indicates that the storage space of the storage device is abnormal, and the storage space should be expanded;
通过第一评估参数、第二评估参数与第三评估参数的设置对储存设备的硬件进行了安全监测,对硬件的实时监测能够及时发现并修复潜在的硬件故障,从而确保数据的可靠存储和访问,通过对硬件的监测,可以预防因硬件故障导致的数据丢失。及时的故障处理和数据备份可以确保数据的完整性和可用性,对硬件进行监测有助于维持系统的稳定运行,从而提高系统的可用性。通过预防和及时处理硬件故障,可以减少系统停机时间,保证业务的连续性,通过对硬件进行适当的维护和监测,可以延长分布式储存设备的使用寿命,降低总体拥有成本,对硬件的监测防护还可以防止未经授权的访问和恶意攻击。通过保障硬件的安全性,可以进一步保护存储在分布式储存设备中的数据安全,通过实时监测硬件状态,可以优化设备的性能和效率。及时的维护和故障排除可以确保硬件资源的有效利用和系统的顺畅运行。The hardware of the storage device is securely monitored by setting the first evaluation parameter, the second evaluation parameter, and the third evaluation parameter. Real-time monitoring of the hardware can timely discover and repair potential hardware failures, thereby ensuring reliable storage and access to data. By monitoring the hardware, data loss caused by hardware failure can be prevented. Timely fault handling and data backup can ensure the integrity and availability of data. Monitoring the hardware helps to maintain the stable operation of the system, thereby improving the availability of the system. By preventing and promptly handling hardware failures, system downtime can be reduced and business continuity can be ensured. By properly maintaining and monitoring the hardware, the service life of the distributed storage device can be extended and the total cost of ownership can be reduced. Monitoring and protection of the hardware can also prevent unauthorized access and malicious attacks. By ensuring the security of the hardware, the security of data stored in the distributed storage device can be further protected. By real-time monitoring of the hardware status, the performance and efficiency of the device can be optimized. Timely maintenance and troubleshooting can ensure the effective use of hardware resources and the smooth operation of the system.
对分布式储存设备的硬件进行监测防护可以提升数据的可靠性、可用性和安全性,延长设备使用寿命,提高系统效率和降低维护成本。因此,对于使用分布式储存设备的组织和企业来说,实施适当的硬件监测防护策略是非常重要的。Monitoring and protecting the hardware of distributed storage devices can improve data reliability, availability and security, extend the service life of the equipment, improve system efficiency and reduce maintenance costs. Therefore, it is very important for organizations and enterprises using distributed storage devices to implement appropriate hardware monitoring and protection strategies.
所述第一评估参数的获取过程与异常判断过程如下:提取出储存设备的位置信息,将其导入到预设坐标系中计算出其与预设标准储存设备位置的坐标差即获取到第一评估参数,当第一评估参数大于预设值时,即表示其存在异常;The acquisition process of the first evaluation parameter and the abnormality judgment process are as follows: extract the location information of the storage device, import it into the preset coordinate system, calculate the coordinate difference between it and the preset standard storage device position, and obtain the first evaluation parameter. When the first evaluation parameter is greater than the preset value, it indicates that there is an abnormality;
所述预设坐标系的建立与预设的标准储存设备的位置的坐标差的获取过程如下:在分布式储存设备安装时,记录下其位置,采集距离最远的两个分布式储存设备的几何中心为基准点A和B,将基准点A和B连线获取到线段L,之后提取出线段L的中点为基准点建立平面直角坐标系,即预设坐标系,之后将所有安装好的分布式设储存设备的位置标记预设坐标系上,即获取到预设标准储存设备位置;The process of establishing the preset coordinate system and obtaining the coordinate difference between the position of the preset standard storage device is as follows: when the distributed storage device is installed, its position is recorded, the geometric centers of the two distributed storage devices with the farthest distance are collected as reference points A and B, the reference points A and B are connected to obtain a line segment L, and then the midpoint of the line segment L is extracted as the reference point to establish a plane rectangular coordinate system, that is, the preset coordinate system, and then the positions of all installed distributed storage devices are marked on the preset coordinate system, that is, the preset standard storage device positions are obtained;
所述第二评估参数的获取过程与异常判断过程如下:提取出采集到的储存设备的环境信息,储存设备的环境信息为环境温度信息与环境湿度信息,环境温度信息与环境湿度信息组成第二评估参数,当环境温度信息与环境湿度信息中任意一个大于预设值超过预设时长,即表示第二评估参数异常;The acquisition process and abnormality judgment process of the second evaluation parameter are as follows: extracting the collected environmental information of the storage device, the environmental information of the storage device is the environmental temperature information and the environmental humidity information, the environmental temperature information and the environmental humidity information constitute the second evaluation parameter, when any one of the environmental temperature information and the environmental humidity information is greater than a preset value for more than a preset time, it means that the second evaluation parameter is abnormal;
所述第三评估参数的获取过程与异常判断过程如下:提取出采集到的分布式储存设备的剩余储存容量信息,再采集该分布式储存设备预设时长内储存进入的文件大小信息,将预设时长标记为E1,将预设时长内储存进入的文件大小信息标记为E2,将分布式储存设备的剩余储存容量信息标记为E3;The acquisition process and abnormality judgment process of the third evaluation parameter are as follows: extract the remaining storage capacity information of the distributed storage device collected, then collect the file size information stored in the distributed storage device within a preset time, mark the preset time as E1, mark the file size information stored in the preset time as E2, and mark the remaining storage capacity information of the distributed storage device as E3;
通过公式E3/(E2/E1)=Ee,即获取到第三评估参数,当第三评估参数小于预设值时,即表示第三评估参数异常;The third evaluation parameter is obtained by the formula E3/(E2/E1)=Ee. When the third evaluation parameter is less than the preset value, it indicates that the third evaluation parameter is abnormal.
通过上述过程,能够获取到更加准确的第一评估参数、第二评估参数与第三评估参数,从而保证了分布式储存设备的硬件的安全,进而更好的保证了分布式储存设备储存的文件的安全性。Through the above process, more accurate first evaluation parameters, second evaluation parameters and third evaluation parameters can be obtained, thereby ensuring the hardware security of the distributed storage device, and further better ensuring the security of the files stored in the distributed storage device.
一种分布式文件智能管理方法,所述方法包括以下步骤:A distributed file intelligent management method, the method comprising the following steps:
步骤(1):导入需要进行分布式储存的储存文件;Step (1): Import the storage file that needs to be distributed stored;
步骤(2):对储存文件进行安全评估获取到文件安全评估信息,文件安全评估信息无异常即进行储存;Step (2): Perform a security assessment on the stored file to obtain the file security assessment information. If there is no abnormality in the file security assessment information, the file is stored;
步骤(3):从已经储存的文件中采集各个已储存文件的文件信息,再采集储存设备信息;Step (3): Collecting file information of each stored file from the stored files, and then collecting storage device information;
步骤(4):对文件信息与储存设备信息进行处理生成文件另存信息与硬件管理信息;Step (4): Process the file information and storage device information to generate file save information and hardware management information;
步骤(5):在文件另存信息与硬件管理信息生成后,将文件另存信息与硬件管理信息生成后发送到预设接收终端。Step (5): After the file save information and the hardware management information are generated, the file save information and the hardware management information are sent to a preset receiving terminal.
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围,其均应涵盖在本发明的权利要求和说明书的范围当中。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit it. Although the present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that they can still modify the technical solutions described in the aforementioned embodiments, or replace some or all of the technical features therein by equivalents. These modifications or replacements do not make the essence of the corresponding technical solutions deviate from the scope of the technical solutions of the embodiments of the present invention, and they should all be included in the scope of the claims and specification of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410194777.XACN117762884B (en) | 2024-02-22 | 2024-02-22 | A distributed file intelligent management system and method |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410194777.XACN117762884B (en) | 2024-02-22 | 2024-02-22 | A distributed file intelligent management system and method |
| Publication Number | Publication Date |
|---|---|
| CN117762884A CN117762884A (en) | 2024-03-26 |
| CN117762884Btrue CN117762884B (en) | 2024-08-23 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410194777.XAActiveCN117762884B (en) | 2024-02-22 | 2024-02-22 | A distributed file intelligent management system and method |
| Country | Link |
|---|---|
| CN (1) | CN117762884B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107705086A (en)* | 2017-08-28 | 2018-02-16 | 北京海诚创想信息技术有限公司 | A kind of smart profile clearing system |
| CN113553564A (en)* | 2021-07-27 | 2021-10-26 | 大势至(北京)软件工程有限公司 | Software and hardware combined computer file safety protection system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102423284B1 (en)* | 2021-11-15 | 2022-07-19 | 백종윤 | Data distributed storage system based on Inter Planetary File System |
| CN115426298B (en)* | 2022-08-25 | 2024-04-30 | 桑田智能技术(上海)有限公司 | Intelligent hardware management system based on Internet of things ad hoc network |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107705086A (en)* | 2017-08-28 | 2018-02-16 | 北京海诚创想信息技术有限公司 | A kind of smart profile clearing system |
| CN113553564A (en)* | 2021-07-27 | 2021-10-26 | 大势至(北京)软件工程有限公司 | Software and hardware combined computer file safety protection system |
| Publication number | Publication date |
|---|---|
| CN117762884A (en) | 2024-03-26 |
| Publication | Publication Date | Title |
|---|---|---|
| CN101201786B (en) | Method and device for monitoring fault log | |
| CN110088744B (en) | A database maintenance method and system thereof | |
| CN103324565B (en) | Daily record monitoring method | |
| CN108776625A (en) | A kind of restorative procedure of service fault, device and storage medium | |
| CN105607973A (en) | Method, device and system for processing equipment failures in virtual machine system | |
| CN104639346A (en) | Method and device for detecting network management equipment of communication operator | |
| CN116909838B (en) | Abnormal log reporting method, system, terminal equipment and storage medium | |
| CN106155826A (en) | For detecting and process the method and system of mistake in bus structures | |
| CN117729576A (en) | Alarm monitoring methods, devices, equipment and storage media | |
| Wu et al. | An empirical study on change-induced incidents of online service systems | |
| CN117034052A (en) | Power safety early warning analysis method and system | |
| CN118642910A (en) | A state monitoring method and device, data center and multi-active data center | |
| CN110311802A (en) | Network operation method, device, electronic device and storage medium | |
| CN117762884B (en) | A distributed file intelligent management system and method | |
| CN111124818A (en) | Monitoring method, device and equipment for expander Expander | |
| CN115129495A (en) | Fault processing method and device, terminal equipment and computer readable storage medium | |
| CN118365159A (en) | Substation secondary equipment status evaluation method and system based on container architecture | |
| CN118233352A (en) | Method, device and computer equipment for assisting protection information substation acceptance | |
| CN116820822A (en) | A read-write link control method, device, and medium | |
| CN117034285A (en) | Method, device, equipment and medium for detecting security threat of power system | |
| CN114528548B (en) | Network security threat traceability device for power monitoring system | |
| CN116737462A (en) | Data processing method, system, device and medium | |
| CN115373916A (en) | Abnormality detection method, abnormality detection device, electronic apparatus, and computer-readable storage medium | |
| CN115396231A (en) | A network security equipment testing system | |
| CN114968641A (en) | Log management method, device and equipment and machine readable storage medium |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right | Effective date of registration:20250923 Address after:300301 Tianjin City Binhai New Area High-tech Zone Binhai Science and Technology Park Gaoxin Sixth Road 39, Building 2, Unit 2, 201-33.NO Patentee after:TIANJIN NANKAI UNIVERSITY GENERAL DATA TECHNOLOGIES Co.,Ltd. Country or region after:China Address before:100193 Beijing, Haidian District, northeast Wang West Road, building 8, No. 36 Patentee before:Dawning Information Industry (Beijing) Co.,Ltd. Country or region before:China |