[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112181713A - Data recovery method and system of computer storage system - Google Patents

Data recovery method and system of computer storage system Download PDF

Info

Publication number
CN112181713A
CN112181713A CN202011077370.7A CN202011077370A CN112181713A CN 112181713 A CN112181713 A CN 112181713A CN 202011077370 A CN202011077370 A CN 202011077370A CN 112181713 A CN112181713 A CN 112181713A
Authority
CN
China
Prior art keywords
data block
data
value
computer storage
storage system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011077370.7A
Other languages
Chinese (zh)
Other versions
CN112181713B (en
Inventor
吴佳
李礼
苗诗君
邢培栋
张旗
余云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai V&g Information Technology Co ltd
Original Assignee
Shanghai V&g Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai V&g Information Technology Co ltd filed Critical Shanghai V&g Information Technology Co ltd
Priority to CN202011077370.7A priority Critical patent/CN112181713B/en
Publication of CN112181713A publication Critical patent/CN112181713A/en
Application granted granted Critical
Publication of CN112181713B publication Critical patent/CN112181713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1008Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
    • G06F11/1044Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices with specific ECC/EDC distribution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a data recovery method and a data recovery system of a computer storage system, wherein the method comprises the following steps: checking whether a first data block in a computer storage system is corrupted; if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area; and checking whether the second data block is damaged, if the second data block is damaged, adopting a preset local data recovery mechanism to recover the first data block, and if not, replacing the first data block with the second data block. The system comprises modules corresponding to the method steps. According to the data recovery method and the data recovery system of the computer storage system, when the data block in the computer storage system is damaged, whether the backup data to be replaced is damaged or not is detected, and if the backup data is damaged, a local data recovery mechanism can be adopted for data recovery, so that the safety of the computer storage system is improved, and the data recovery capability of the computer storage system is improved.

Description

Data recovery method and system of computer storage system
Technical Field
The invention relates to the technical field of computer data recovery, in particular to a data recovery method and a data recovery system of a computer storage system.
Background
At present, in order to prevent the loss of important data in a computer storage system, the important data is generally backed up, and when the important data is lost, corresponding backup data is searched; however, when the backup data is maliciously damaged or invaded, if the backup data is directly obtained for use, not only may an error occur when the backup data is linked with other data, but also the security of the storage system is reduced; in addition, when backup data is also corrupted, the ability to perform data recovery is also limited.
Disclosure of Invention
One of the objectives of the present invention is to provide a data recovery method and a data recovery system for a computer storage system, when a data block in the computer storage system is damaged, detect whether backup data to be replaced is also damaged, and if the backup data is also damaged, perform data recovery by using a local data recovery mechanism, thereby increasing the security of the computer storage system and improving the data recovery capability thereof.
The embodiment of the invention provides a data recovery method of a computer storage system, which comprises the following steps:
checking whether a first data block in the computer storage system is corrupted;
if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area;
and checking whether the second data block is damaged, if the second data block is damaged, adopting a preset local data recovery mechanism to recover the first data block, and if not, replacing the first data block with the second data block.
Preferably, said checking whether there is a corrupted first data block in said computer storage system comprises:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
Preferably, if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area, includes:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
Preferably, the data recovery method of the computer storage system further comprises:
backing up a first data block in the computer storage system to the backup area in advance;
wherein the backing up the first data block in the computer storage system to the backup area in advance comprises:
calculating the first data block
Figure 100002_DEST_PATH_IMAGE001
First verification value of (a):
Figure 414881DEST_PATH_IMAGE002
wherein,
Figure 536421DEST_PATH_IMAGE001
for the computer storage system
Figure 100002_DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 375064DEST_PATH_IMAGE004
for the computer storage system
Figure 468922DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 100002_DEST_PATH_IMAGE005
is a pre-set pseudo-random function,
Figure 984085DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 327342DEST_PATH_IMAGE001
Second verification value of (2):
Figure 100002_DEST_PATH_IMAGE007
wherein,
Figure 969676DEST_PATH_IMAGE008
for the computer storage system
Figure 714778DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 417155DEST_PATH_IMAGE004
for the computer storage system
Figure 247708DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 100002_DEST_PATH_IMAGE009
is a preset private key and is used as a key,
Figure 677421DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
said checking whether said second data block is corrupted comprises:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure 100002_DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 11450DEST_PATH_IMAGE012
wherein,
Figure 100002_DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 619149DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 202577DEST_PATH_IMAGE001
for back-up in the backup area
Figure 186714DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 640829DEST_PATH_IMAGE014
for back-up in the backup area
Figure 934276DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 739421DEST_PATH_IMAGE008
for back-up in the backup area
Figure 527248DEST_PATH_IMAGE003
A second verification value for the first data block;
if equation
Figure 100002_DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 101449DEST_PATH_IMAGE015
If not, the second data block is damaged.
Preferably, if the second data block is damaged, recovering the first data block by using a preset local data recovery mechanism, otherwise, replacing the first data block with the second data block includes:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 50950DEST_PATH_IMAGE016
wherein,
Figure 100002_DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 812233DEST_PATH_IMAGE018
is the first sub data block
Figure 100002_DEST_PATH_IMAGE019
The number of the data is one,
Figure 246494DEST_PATH_IMAGE020
is a first subIn the data block
Figure 675202DEST_PATH_IMAGE019
The feature vector of each of the data is,
Figure 100002_DEST_PATH_IMAGE021
Figure 795604DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure 100002_DEST_PATH_IMAGE023
wherein,
Figure 309762DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure 100002_DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 423081DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure 100002_DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 440715DEST_PATH_IMAGE028
is the first sub data block
Figure 100002_DEST_PATH_IMAGE029
The number of the data is one,
Figure 997599DEST_PATH_IMAGE030
the number of the data in the second sub data block is;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure 100002_DEST_PATH_IMAGE031
wherein,
Figure 733473DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure 100002_DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 650483DEST_PATH_IMAGE034
Figure 100002_DEST_PATH_IMAGE035
is as follows
Figure 522624DEST_PATH_IMAGE036
The estimated value of the missing value after the second iteration,
Figure 100002_DEST_PATH_IMAGE037
Figure 250408DEST_PATH_IMAGE038
for the third sub-data block is,
Figure 100002_DEST_PATH_IMAGE039
Figure 739158DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure 100002_DEST_PATH_IMAGE041
The number of the data is one,
Figure 205998DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 463804DEST_PATH_IMAGE036
The number of the data is one,
Figure 100002_DEST_PATH_IMAGE043
the number of data in the third sub data block;
estimating the second missing value to a model
Figure 362490DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure 100002_DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
The embodiment of the invention provides a data recovery system of a computer storage system, which comprises: the device comprises a first checking module, an obtaining module, a second checking module and a recovering module;
the first checking module checks whether a first data block in the computer storage system is corrupted; if the first data block is damaged, the obtaining module obtains a second data block corresponding to the first data block in a preset backup area; the second checking module checks whether the second data block is damaged, if the second data block is damaged, the recovery module recovers the first data block by adopting a preset local data recovery mechanism, otherwise, the first data block is replaced by the second data block.
Preferably, the first checking module performs operations comprising:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
Preferably, the obtaining module performs operations including:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
Preferably, the data recovery system of a computer storage system further comprises:
the backup module is used for backing up a first data block in the computer storage system to the backup area in advance;
the backup module performs operations comprising:
calculating the first data block
Figure 807378DEST_PATH_IMAGE001
First verification value of (a):
Figure 82501DEST_PATH_IMAGE002
wherein,
Figure 460393DEST_PATH_IMAGE001
for computer storage systemsTo middle
Figure 779248DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 242590DEST_PATH_IMAGE004
for the computer storage system
Figure 55825DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 288224DEST_PATH_IMAGE005
is a pre-set pseudo-random function,
Figure 528712DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 744930DEST_PATH_IMAGE001
Second verification value of (2):
Figure 361856DEST_PATH_IMAGE007
wherein,
Figure 448761DEST_PATH_IMAGE008
for the computer storage system
Figure 125730DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 547353DEST_PATH_IMAGE004
for the computer storage system
Figure 702390DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 909381DEST_PATH_IMAGE009
to prepareThe set private key is used for setting the private key,
Figure 757251DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
the second checking module performs operations comprising:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure 416903DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 375631DEST_PATH_IMAGE012
wherein,
Figure 437128DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 455900DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 602847DEST_PATH_IMAGE001
for back-up in the backup area
Figure 348955DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 264959DEST_PATH_IMAGE014
for back-up in the backup area
Figure 454632DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 354455DEST_PATH_IMAGE008
for back-up in the backup area
Figure 654986DEST_PATH_IMAGE003
A second verification value for the first data block;
if equation
Figure 425496DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 786070DEST_PATH_IMAGE015
If not, the second data block is damaged.
Preferably, the recovery module performs operations comprising:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 907610DEST_PATH_IMAGE016
wherein,
Figure 746253DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 886116DEST_PATH_IMAGE018
is the first sub data block
Figure 417591DEST_PATH_IMAGE019
The number of the data is one,
Figure 760848DEST_PATH_IMAGE020
is the first sub data block
Figure 668761DEST_PATH_IMAGE019
The feature vector of each of the data is,
Figure 413863DEST_PATH_IMAGE021
Figure 116240DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure 946793DEST_PATH_IMAGE023
wherein,
Figure 127239DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure 241694DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 114972DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure 167242DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 151378DEST_PATH_IMAGE028
is the first sub data block
Figure 58023DEST_PATH_IMAGE029
The number of the data is one,
Figure 102203DEST_PATH_IMAGE030
the number of the data in the second sub data block is;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure 907348DEST_PATH_IMAGE031
wherein,
Figure 695175DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure 269376DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 484456DEST_PATH_IMAGE034
Figure 511318DEST_PATH_IMAGE035
is as follows
Figure 352104DEST_PATH_IMAGE036
After a second iterationThe estimated value of the missing value of (c),
Figure 780811DEST_PATH_IMAGE037
Figure 166793DEST_PATH_IMAGE038
for the third sub-data block is,
Figure 680951DEST_PATH_IMAGE039
Figure 810581DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure 93795DEST_PATH_IMAGE041
The number of the data is one,
Figure 916258DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 166979DEST_PATH_IMAGE036
The number of the data is one,
Figure 834721DEST_PATH_IMAGE043
the number of data in the third sub-data block;
estimating the second missing value to a model
Figure 238021DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure 965805DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flowchart illustrating a data recovery method for a computer storage system according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
An embodiment of the present invention provides a data recovery method for a computer storage system, as shown in fig. 1, including:
step S1, checking whether the first data block in the computer memory system is damaged;
step S2, if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area;
step S3, checking whether the second data block is damaged, if the second data block is damaged, recovering the first data block by using a preset local data recovery mechanism, otherwise, replacing the first data block with the second data block.
The working principle of the technical scheme is as follows:
automatically checking the computer storage system in real time according to a preset time interval or receiving a checking starting instruction input by a user to check the computer storage system, and checking whether a first data block in the computer storage system is maliciously damaged or lost; if the first data block is maliciously damaged or lost, acquiring a second data block corresponding to the first data block in a preset backup area, and preparing for replacement; the preset backup area is a backup area divided from a cloud server or a local storage system for backup; checking whether the second data block to be replaced is also damaged; if the second data block is maliciously damaged, it may present a security threat and belong to damaged data, and the direct replacement may cause errors of other data; if the second data block is damaged, a preset local data recovery mechanism is adopted to recover the first data block; the preset local data recovery mechanism specifically comprises: recovering different data types by adopting a plurality of methods; and if the second data block is not damaged, directly replacing the damaged first data block with the second data block.
The technical scheme has the beneficial effects that: according to the embodiment of the invention, when the data block in the computer storage system is damaged, whether the backup data to be replaced is also damaged is detected, and if the backup data is also damaged, a local data recovery mechanism can be adopted for data recovery, so that the safety of the computer storage system is improved, and the data recovery capability of the computer storage system is improved.
The embodiment of the invention provides a data recovery method of a computer storage system, wherein the step of checking whether a damaged first data block exists in the computer storage system comprises the following steps:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
The working principle of the technical scheme is as follows:
each data block in the computer storage system is provided with a corresponding cyclic code and an ECC check code; the cyclic code is specifically: a Cyclic Redundancy Check (CRC), which is a commonly used check code with error detection and correction capabilities; a block CRC code must be divisible by the generator polynomial so that if the remainder is 0 when the receiver divides the CRC code by the generator polynomial, the CRC code has no errors; if the remainder is not 0, the CRC code error is indicated, and the data block is damaged; the ECC check code specifically comprises: correcting the memory check code; when data is written into a computer storage system, corresponding ECC check codes are also stored, when the previously written data is read again, the stored ECC check codes are compared with the ECC check codes generated by reading, and if the stored ECC check codes are the same as the ECC check codes, the ECC check codes are correct; if not, the ECC check code is wrong, which indicates that the data block is damaged.
The technical scheme has the beneficial effects that: the embodiment of the invention checks the cyclic code and the ECC check code of the data block in the computer storage system together to judge whether the data block is damaged or not, thereby improving the detection capability of whether the data block in the computer storage system is damaged or not.
The embodiment of the present invention provides a data recovery method for a computer storage system, where if a first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area, where the method includes:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
The working principle of the technical scheme is as follows:
if the first data block in the computer storage system is damaged; the first data block has a read path through which the first data block can be read; the preset backup path database specifically comprises: when a local first data block is backed up to a backup area, matching a local reading path of the first data block with a corresponding backup path in the backup area one by one and storing the first data block in a backup path database; when a second data block corresponding to the first data block in the backup area is required to be acquired, only a backup path corresponding to the reading path needs to be inquired in the backup path database; a second data block corresponding to the first data block may be obtained via the backup path.
The technical scheme has the beneficial effects that: the embodiment of the invention stores the reading path of the first data block in the computer storage system and the backup path in the backup area into the backup path database in a one-to-one matching manner, when the first data block is damaged and a second data block corresponding to the first data block in the backup area is required to be obtained, the management capability of backup information is enhanced, and the convenience of obtaining backup data is improved.
The embodiment of the invention provides a data recovery method of a computer storage system, which further comprises the following steps:
backing up a first data block in the computer storage system to the backup area in advance;
wherein the backing up the first data block in the computer storage system to the backup area in advance comprises:
calculating the first data block
Figure 188976DEST_PATH_IMAGE001
First verification value of (a):
Figure 925988DEST_PATH_IMAGE002
wherein,
Figure 183794DEST_PATH_IMAGE001
for the computer storage system
Figure 331747DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 307794DEST_PATH_IMAGE004
for the computer storage system
Figure 582917DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 695230DEST_PATH_IMAGE005
is a preset pseudo-randomThe function of the function is that of the function,
Figure 30396DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 228159DEST_PATH_IMAGE001
Second verification value of (2):
Figure 306974DEST_PATH_IMAGE007
wherein,
Figure 539372DEST_PATH_IMAGE008
for the computer storage system
Figure 763549DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 714187DEST_PATH_IMAGE004
for the computer storage system
Figure 331113DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 418018DEST_PATH_IMAGE009
is a preset private key and is used as a key,
Figure 829408DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
said checking whether said second data block is corrupted comprises:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure 1763DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 406069DEST_PATH_IMAGE012
wherein,
Figure 347480DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 195350DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 855002DEST_PATH_IMAGE001
for back-up in the backup area
Figure 813730DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 875227DEST_PATH_IMAGE014
for back-up in the backup area
Figure 893999DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 775367DEST_PATH_IMAGE008
for back-up in the backup area
Figure 787054DEST_PATH_IMAGE003
A second verification value for the first data block;
if equation
Figure 703058DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 627151DEST_PATH_IMAGE015
If not, the second data block is damaged.
The working principle of the technical scheme is as follows:
calculating a first verification value and a second verification value associated with the first data block using different encryption schemes and calculation methods; when data backup is carried out, the data is directly uploaded to the backup area; uploading the first verification value and the second verification value to the backup area; after data in a computer storage system is backed up to a backup area, if a first data block is maliciously damaged or invaded, only the sequence numbers of the maliciously damaged or invaded data blocks are needed to be obtained, and a corresponding second data block is searched in the backup area according to the sequence numbers; then calculating a third verification value of the second data block; finally according to the equation
Figure 261395DEST_PATH_IMAGE015
To determine whether the second data block is maliciously damaged or invaded.
The technical scheme has the beneficial effects that: if the backup data to be replaced is maliciously damaged or invaded, the security of the computer storage system is threatened if the backup data to be replaced is directly obtained and replaced.
The embodiment of the invention provides a data recovery method of a computer storage system, wherein if the second data block is damaged, a preset local data recovery mechanism is adopted to recover the first data block, otherwise, the first data block is replaced by the second data block, and the method comprises the following steps:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 561926DEST_PATH_IMAGE016
wherein,
Figure 332436DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 693010DEST_PATH_IMAGE018
is the first sub data block
Figure 798239DEST_PATH_IMAGE019
The number of the data is one,
Figure 902461DEST_PATH_IMAGE020
is the first sub data block
Figure 793056DEST_PATH_IMAGE019
The feature vector of each of the data is,
Figure 324532DEST_PATH_IMAGE021
Figure 667789DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure 310122DEST_PATH_IMAGE023
wherein,
Figure 55225DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure 741290DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 571842DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure 17867DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 883055DEST_PATH_IMAGE028
is the first sub data block
Figure 756333DEST_PATH_IMAGE029
The number of the data is one,
Figure 808603DEST_PATH_IMAGE030
the number of the data in the second sub data block is;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure 58319DEST_PATH_IMAGE031
wherein,
Figure 778013DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure 71460DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 611026DEST_PATH_IMAGE034
Figure 398853DEST_PATH_IMAGE035
is as follows
Figure 973054DEST_PATH_IMAGE036
The estimated value of the missing value after the second iteration,
Figure 188135DEST_PATH_IMAGE037
Figure 480576DEST_PATH_IMAGE038
for the third sub-data block is,
Figure 72094DEST_PATH_IMAGE039
Figure 766380DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure 152362DEST_PATH_IMAGE041
The number of the data is one,
Figure 927507DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 57137DEST_PATH_IMAGE036
The number of the data is one,
Figure 605930DEST_PATH_IMAGE043
the number of data in the third sub data block;
estimating the second missing value to a model
Figure 162813DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure 164267DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
The working principle of the technical scheme is as follows:
firstly, classifying the damaged first data block according to types, and calling different data recovery schemes aiming at different types of data; the preset data block partition type division rule specifically comprises the following steps: if the data conforms to or approximately conforms to normal distribution, dividing the data into first type data blocks; judging that the data do not conform to normal distribution, and dividing the data into second type data blocks; dividing the rest types of data into third type data blocks; the preset layering rules are specifically as follows: positioning the position of data loss in the data block according to the error reporting of the cyclic code and the ECC check code of the data block, selecting the position and reserving preset data lengths on two sides of the position as one layer to ensure that each layer has only one position point of data loss, and reserving the preset data lengths on two sides of the position point to estimate the lost data according to the data on the two sides; the preset missing data filling rule is specifically as follows: and filling the filling value into the position points of data loss.
The technical scheme has the beneficial effects that: the embodiment of the invention classifies the damaged first data blocks according to types, calls different data recovery schemes aiming at different types of data, improves the speed and the precision of the computer storage system for recovering data, and simultaneously can adopt a local data recovery mechanism to recover data when backup data is damaged, thereby improving the capability of the computer storage system for recovering data.
The embodiment of the invention provides a data recovery system of a computer storage system, which comprises: the device comprises a first checking module, an obtaining module, a second checking module and a recovering module;
the first checking module checks whether a first data block in the computer storage system is corrupted; if the first data block is damaged, the obtaining module obtains a second data block corresponding to the first data block in a preset backup area; the second checking module checks whether the second data block is damaged, if the second data block is damaged, the recovery module recovers the first data block by adopting a preset local data recovery mechanism, otherwise, the first data block is replaced by the second data block.
The working principle of the technical scheme is as follows:
automatically checking the computer storage system in real time according to a preset time interval or receiving a checking starting instruction input by a user to check the computer storage system, and checking whether a first data block in the computer storage system is maliciously damaged or lost; if the first data block is maliciously damaged or lost, acquiring a second data block corresponding to the first data block in a preset backup area, and preparing for replacement; the preset backup area is a backup area divided from a cloud server or a local storage system for backup; checking whether the second data block to be replaced is also damaged; if the second data block is maliciously damaged, it may present a security threat and belong to damaged data, and the direct replacement may cause errors of other data; if the second data block is damaged, a preset local data recovery mechanism is adopted to recover the first data block; the preset local data recovery mechanism specifically comprises: recovering different data types by adopting a plurality of methods; and if the second data block is not damaged, directly replacing the damaged first data block with the second data block.
The technical scheme has the beneficial effects that: according to the embodiment of the invention, when the data block in the computer storage system is damaged, whether the backup data to be replaced is also damaged is detected, and if the backup data is also damaged, a local data recovery mechanism can be adopted for data recovery, so that the safety of the computer storage system is improved, and the data recovery capability of the computer storage system is improved.
The embodiment of the invention provides a data recovery system of a computer storage system, wherein a first checking module executes the following operations:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
The working principle of the technical scheme is as follows:
each data block in the computer storage system is provided with a corresponding cyclic code and an ECC check code; the cyclic code is specifically: a Cyclic Redundancy Check (CRC), which is a commonly used check code with error detection and correction capabilities; a block CRC code must be divisible by the generator polynomial so that if the remainder is 0 when the receiver divides the CRC code by the generator polynomial, the CRC code has no errors; if the remainder is not 0, the CRC code error is indicated, and the data block is damaged; the ECC check code specifically comprises: correcting the memory check code; when data is written into a computer storage system, corresponding ECC check codes are also stored, when the previously written data is read again, the stored ECC check codes are compared with the ECC check codes generated by reading, and if the stored ECC check codes are the same as the ECC check codes, the ECC check codes are correct; if not, the ECC check code is wrong, which indicates that the data block is damaged.
The technical scheme has the beneficial effects that: the first checking module in the embodiment of the invention checks the cyclic code and the ECC check code of the data block in the computer storage system together to judge whether the data block is damaged or not, thereby improving the detection capability of whether the data block in the computer storage system is damaged or not.
The embodiment of the invention provides a data recovery system of a computer storage system, wherein an acquisition module executes the following operations:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
The working principle of the technical scheme is as follows:
if the first data block in the computer storage system is damaged; the first data block has a read path through which the first data block can be read; the preset backup path database specifically comprises: when a local first data block is backed up to a backup area, matching a local reading path of the first data block with a corresponding backup path in the backup area one by one and storing the first data block in a backup path database; when a second data block corresponding to the first data block in the backup area is required to be acquired, only a backup path corresponding to the reading path needs to be inquired in the backup path database; a second data block corresponding to the first data block may be obtained via the backup path.
The technical scheme has the beneficial effects that: the acquisition module of the embodiment of the invention matches the reading path of the first data block in the computer storage system with the backup path in the backup area one by one and stores the reading path and the backup path in the backup area into the backup path database, when the first data block is damaged and a second data block corresponding to the first data block in the backup area is required to be acquired only through the backup path, thereby enhancing the management capability of backup information and promoting the convenience of acquiring backup data.
The embodiment of the invention provides a data recovery system of a computer storage system, which further comprises:
the backup module is used for backing up a first data block in the computer storage system to the backup area in advance;
the backup module performs operations comprising:
calculating the first data block
Figure 97588DEST_PATH_IMAGE001
First verification value of (a):
Figure 500888DEST_PATH_IMAGE002
wherein,
Figure 228672DEST_PATH_IMAGE001
for the computer storage system
Figure 966690DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 969281DEST_PATH_IMAGE004
for the computer storage system
Figure 227087DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 125773DEST_PATH_IMAGE005
is a pre-set pseudo-random function,
Figure 101819DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 376943DEST_PATH_IMAGE001
Second verification value of (2):
Figure 489255DEST_PATH_IMAGE007
wherein,
Figure 824422DEST_PATH_IMAGE008
for the computer storage system
Figure 287764DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 366578DEST_PATH_IMAGE004
for a computerIn a storage system
Figure 582665DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 88733DEST_PATH_IMAGE009
is a preset private key and is used as a key,
Figure 773792DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
the second checking module performs operations comprising:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure 390718DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 477623DEST_PATH_IMAGE012
wherein,
Figure 154592DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 592526DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 13143DEST_PATH_IMAGE001
for back-up in the backup area
Figure 954554DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 51692DEST_PATH_IMAGE014
for back-up in the backup area
Figure 711344DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 670073DEST_PATH_IMAGE008
for back-up in the backup area
Figure 997149DEST_PATH_IMAGE003
A second verification value for the first data block;
if equation
Figure 750341DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 897289DEST_PATH_IMAGE015
If not, the second data block is damaged.
The working principle of the technical scheme is as follows:
calculating a first verification value and a second verification value associated with the first data block using different encryption schemes and calculation methods; when data backup is carried out, the data is directly uploaded to the backup area; uploading the first verification value and the second verification value to the backup area; after data in a computer storage system is backed up to a backup area, if a first data block is maliciously damaged or invaded, only the sequence numbers of the maliciously damaged or invaded data blocks are needed to be obtained, and a corresponding second data block is searched in the backup area according to the sequence numbers; then calculating a third verification value of the second data block; finally according to the equation
Figure 659708DEST_PATH_IMAGE015
To determine whether the second data block is maliciously damaged or invaded.
The technical scheme has the beneficial effects that: if the backup data to be replaced is maliciously damaged or invaded, the security of the computer storage system is threatened if the backup data to be replaced is directly obtained and replaced.
The embodiment of the invention provides a data recovery system of a computer storage system, wherein the recovery module executes the following operations:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 575712DEST_PATH_IMAGE016
wherein,
Figure 765385DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 399628DEST_PATH_IMAGE018
is the first sub data block
Figure 949427DEST_PATH_IMAGE019
The number of the data is one,
Figure 985516DEST_PATH_IMAGE020
is the first sub data block
Figure 346090DEST_PATH_IMAGE019
Characteristics of the dataThe vector of the vector is then calculated,
Figure 202051DEST_PATH_IMAGE021
Figure 571852DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure 196869DEST_PATH_IMAGE023
wherein,
Figure 728344DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure 337180DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 979514DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure 973884DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 676261DEST_PATH_IMAGE028
is the first sub data block
Figure 506813DEST_PATH_IMAGE029
The number of the data is one,
Figure 952838DEST_PATH_IMAGE030
as a second sub data blockThe number of the middle data;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure 552447DEST_PATH_IMAGE031
wherein,
Figure 425725DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure 743574DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 258869DEST_PATH_IMAGE034
Figure 712984DEST_PATH_IMAGE035
is as follows
Figure 6431DEST_PATH_IMAGE036
The estimated value of the missing value after the second iteration,
Figure 811576DEST_PATH_IMAGE037
Figure 599403DEST_PATH_IMAGE038
for the third sub-data block is,
Figure 173604DEST_PATH_IMAGE039
Figure 654264DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure 946705DEST_PATH_IMAGE041
The number of the data is one,
Figure 7065DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 701351DEST_PATH_IMAGE036
The number of the data is one,
Figure 352913DEST_PATH_IMAGE043
the number of data in the third sub data block;
estimating the second missing value to a model
Figure 116338DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure 245968DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
The working principle of the technical scheme is as follows:
firstly, classifying the damaged first data block according to types, and calling different data recovery schemes aiming at different types of data; the preset data block partition type division rule specifically comprises the following steps: if the data conforms to or approximately conforms to normal distribution, dividing the data into first type data blocks; judging that the data do not conform to normal distribution, and dividing the data into second type data blocks; dividing the rest types of data into third type data blocks; the preset layering rules are specifically as follows: positioning the position of data loss in the data block according to the error reporting of the cyclic code and the ECC check code of the data block, selecting the position and reserving preset data lengths on two sides of the position as one layer to ensure that each layer has only one position point of data loss, and reserving the preset data lengths on two sides of the position point to estimate the lost data according to the data on the two sides; the preset missing data filling rule is specifically as follows: and filling the filling value into the position points of data loss.
The technical scheme has the beneficial effects that: the recovery module of the embodiment of the invention classifies the damaged first data blocks according to types, calls different data recovery schemes aiming at different types of data, improves the speed and the precision of the computer storage system for recovering data, and simultaneously can adopt a local data recovery mechanism to recover data when backup data is damaged, thereby improving the capability of the computer storage system for recovering data.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method of data recovery in a computer storage system, comprising:
checking whether a first data block in the computer storage system is corrupted;
if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area;
and checking whether the second data block is damaged, if the second data block is damaged, adopting a preset local data recovery mechanism to recover the first data block, and if not, replacing the first data block with the second data block.
2. A method for data recovery in a computer storage system as recited in claim 1, wherein said checking whether there is a corrupted first data block in said computer storage system comprises:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
3. The method as claimed in claim 2, wherein if the first data block is damaged, acquiring a second data block corresponding to the first data block in a preset backup area, comprises:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
4. A method of data recovery in a computer storage system as claimed in claim 3, further comprising:
backing up a first data block in the computer storage system to the backup area in advance;
wherein the backing up the first data block in the computer storage system to the backup area in advance comprises:
calculating the first data block
Figure DEST_PATH_IMAGE001
First verification value of (a):
Figure 498542DEST_PATH_IMAGE002
wherein,
Figure 55426DEST_PATH_IMAGE001
for computer storage systemsIn system the first
Figure DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 791300DEST_PATH_IMAGE004
for the computer storage system
Figure 724621DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure DEST_PATH_IMAGE005
is a pre-set pseudo-random function,
Figure 111609DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 839394DEST_PATH_IMAGE001
Second verification value of (2):
Figure DEST_PATH_IMAGE007
wherein,
Figure 62565DEST_PATH_IMAGE008
for the computer storage system
Figure 533997DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 791803DEST_PATH_IMAGE004
for the computer storage system
Figure 956068DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure DEST_PATH_IMAGE009
is a preset private key and is used as a key,
Figure 915803DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
said checking whether said second data block is corrupted comprises:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 925347DEST_PATH_IMAGE012
wherein,
Figure DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 772081DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 841668DEST_PATH_IMAGE001
for back-up in the backup area
Figure 305010DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 367513DEST_PATH_IMAGE014
in a backup area for backupTo (1) a
Figure 599911DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 840400DEST_PATH_IMAGE008
for back-up in the backup area
Figure 525459DEST_PATH_IMAGE003
A second verification value for the first data block;
if equation
Figure DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 876806DEST_PATH_IMAGE015
If not, the second data block is damaged.
5. The method for recovering data in a computer storage system according to claim 4, wherein if the second data block is corrupted, a preset local data recovery mechanism is adopted to recover the first data block, otherwise the first data block is replaced with the second data block, and the method comprises:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 963710DEST_PATH_IMAGE016
wherein,
Figure DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 624368DEST_PATH_IMAGE018
is the first sub data block
Figure DEST_PATH_IMAGE019
The number of the data is one,
Figure 531144DEST_PATH_IMAGE020
is the first sub data block
Figure 686182DEST_PATH_IMAGE019
The feature vector of each of the data is,
Figure DEST_PATH_IMAGE021
Figure 362014DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure DEST_PATH_IMAGE023
wherein,
Figure 459152DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 853224DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 280794DEST_PATH_IMAGE028
is the first sub data block
Figure DEST_PATH_IMAGE029
The number of the data is one,
Figure 811133DEST_PATH_IMAGE030
the number of the data in the second sub data block is;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure DEST_PATH_IMAGE031
wherein,
Figure 813593DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 694961DEST_PATH_IMAGE034
Figure DEST_PATH_IMAGE035
is as follows
Figure 191801DEST_PATH_IMAGE036
The estimated value of the missing value after the second iteration,
Figure DEST_PATH_IMAGE037
Figure 842225DEST_PATH_IMAGE038
for the third sub-data block is,
Figure DEST_PATH_IMAGE039
Figure 750008DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure DEST_PATH_IMAGE041
The number of the data is one,
Figure 118672DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 419203DEST_PATH_IMAGE036
The number of the data is one,
Figure DEST_PATH_IMAGE043
for the data in the third sub data blockCounting;
estimating the second missing value to a model
Figure 189713DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
6. A data recovery system for a computer storage system, comprising: the device comprises a first checking module, an obtaining module, a second checking module and a recovering module;
the first checking module checks whether a first data block in the computer storage system is corrupted; if the first data block is damaged, the obtaining module obtains a second data block corresponding to the first data block in a preset backup area; the second checking module checks whether the second data block is damaged, if the second data block is damaged, the recovery module recovers the first data block by adopting a preset local data recovery mechanism, otherwise, the first data block is replaced by the second data block.
7. The data recovery system of a computer storage system of claim 6, wherein the first check module performs operations comprising:
checking a cyclic code and an ECC check code of each first data block in the computer storage system;
and if the cyclic code is wrong and/or the ECC check code is wrong, the first data block is damaged.
8. The data recovery system of a computer storage system of claim 7, wherein the obtaining module performs operations comprising:
if the first data block is damaged, extracting a reading path of the first data block;
acquiring a backup path corresponding to the read path in a preset backup path database;
and acquiring a second data block corresponding to the first data block through the backup path.
9. The data recovery system for a computer storage system of claim 8, further comprising:
the backup module is used for backing up a first data block in the computer storage system to the backup area in advance;
the backup module performs operations comprising:
calculating the first data block
Figure 2817DEST_PATH_IMAGE001
First verification value of (a):
Figure 124357DEST_PATH_IMAGE002
wherein,
Figure 228579DEST_PATH_IMAGE001
for the computer storage system
Figure 853596DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 385071DEST_PATH_IMAGE004
for the computer storage system
Figure 728328DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 636241DEST_PATH_IMAGE005
is a pre-set pseudo-random function,
Figure 630611DEST_PATH_IMAGE006
is a preset private key;
calculating the first data block
Figure 332987DEST_PATH_IMAGE001
Second verification value of (2):
Figure 163540DEST_PATH_IMAGE007
wherein,
Figure 609565DEST_PATH_IMAGE008
for the computer storage system
Figure 209174DEST_PATH_IMAGE003
A second verification value for the first data block,
Figure 82452DEST_PATH_IMAGE004
for the computer storage system
Figure 400301DEST_PATH_IMAGE003
A first verification value for the first data block,
Figure 384437DEST_PATH_IMAGE009
is a preset private key and is used as a key,
Figure 87820DEST_PATH_IMAGE010
the number of the first data blocks in the computer storage system is counted;
backing up the first data block to the backup area;
sending the first verification value and the second verification value to the backup area;
the second checking module performs operations comprising:
if the first data block is damaged, acquiring a sequence number set of the first data block
Figure 131999DEST_PATH_IMAGE011
Calculating a third verification value for the second data block:
Figure 937144DEST_PATH_IMAGE012
wherein,
Figure 724972DEST_PATH_IMAGE013
in order to be the third verification value,
Figure 299172DEST_PATH_IMAGE011
for the set of sequence numbers of the first data block that is corrupted,
Figure 514253DEST_PATH_IMAGE001
for back-up in the backup area
Figure 541115DEST_PATH_IMAGE003
A first one of the data blocks is selected,
Figure 381901DEST_PATH_IMAGE014
for back-up in the backup area
Figure 810608DEST_PATH_IMAGE003
A preset random number of the first data block,
Figure 196590DEST_PATH_IMAGE008
for back-up in the backup area
Figure 710748DEST_PATH_IMAGE003
A first dataA second verification value for the block;
if equation
Figure 840378DEST_PATH_IMAGE015
If yes, the second data block is not damaged;
if equation
Figure 123592DEST_PATH_IMAGE015
If not, the second data block is damaged.
10. The data recovery system of a computer storage system of claim 9, wherein the recovery module performs operations comprising:
if the second data block is corrupted;
adopting a preset local data recovery mechanism to recover the first data block;
the local data recovery mechanism comprises:
dividing the first data block into a first type data block, a second type data block and a third type data block according to a preset data block type division rule;
carrying out layering processing on the first type data block according to a preset layering rule to obtain a plurality of first subdata blocks;
calculating a first padding value of the first sub data block:
Figure 946054DEST_PATH_IMAGE016
wherein,
Figure 196776DEST_PATH_IMAGE017
is the first fill-in value and is,
Figure 130097DEST_PATH_IMAGE018
is the first sub data block
Figure 267817DEST_PATH_IMAGE019
The number of the data is one,
Figure 261181DEST_PATH_IMAGE020
is the first sub data block
Figure 749931DEST_PATH_IMAGE019
The feature vector of each of the data is,
Figure 221364DEST_PATH_IMAGE021
Figure 213591DEST_PATH_IMAGE022
the number of data in the first sub data block;
filling the first sub data block by adopting the first filling value according to a preset missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the second type data according to the layering rule to obtain a plurality of second sub data blocks;
constructing a first deficiency value estimation model:
Figure 627123DEST_PATH_IMAGE023
wherein,
Figure 72011DEST_PATH_IMAGE024
a model is estimated for the first missing value,
Figure 347135DEST_PATH_IMAGE025
is a pre-set correlation coefficient and is,
Figure 725026DEST_PATH_IMAGE026
is a function of the probability density that is preset,
Figure 794613DEST_PATH_IMAGE027
is a parameter of the probability density function,
Figure 257956DEST_PATH_IMAGE028
is the first sub data block
Figure 71191DEST_PATH_IMAGE029
The number of the data is one,
Figure 552857DEST_PATH_IMAGE030
the number of the data in the second sub data block is;
drawing a missing value estimation curve based on the missing value estimation model;
selecting the maximum value on the missing value estimation curve as a second filling value;
filling the second subdata with the second filling value according to the missing data filling rule;
and/or the presence of a gas in the gas,
carrying out layering processing on the third type data block according to a preset layering rule to obtain a plurality of third sub data blocks;
constructing a second deficiency value estimation model;
Figure 527766DEST_PATH_IMAGE046
wherein,
Figure 478405DEST_PATH_IMAGE032
a model is estimated for the second missing value,
Figure 95331DEST_PATH_IMAGE033
is a preset normal distribution parameter,
Figure 182235DEST_PATH_IMAGE034
Figure 859204DEST_PATH_IMAGE035
is as follows
Figure 31560DEST_PATH_IMAGE036
The estimated value of the missing value after the second iteration,
Figure 435865DEST_PATH_IMAGE037
Figure 377276DEST_PATH_IMAGE038
for the third sub-data block is,
Figure 959567DEST_PATH_IMAGE039
Figure 619219DEST_PATH_IMAGE040
is the first in the third sub-data block
Figure 577948DEST_PATH_IMAGE041
The number of the data is one,
Figure 639445DEST_PATH_IMAGE042
is the first in the third sub-data block
Figure 658216DEST_PATH_IMAGE036
The number of the data is one,
Figure 66150DEST_PATH_IMAGE043
the number of data in the third sub data block;
estimating the second missing value to a model
Figure 297411DEST_PATH_IMAGE044
Output value of the sub-iteration
Figure 213415DEST_PATH_IMAGE045
As a third padding value;
filling the third type data block by adopting the third filling value according to the missing data filling rule;
and if the second data block is not damaged, replacing the first data block with the second data block.
CN202011077370.7A 2020-10-10 2020-10-10 Data recovery method and system of computer storage system Active CN112181713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011077370.7A CN112181713B (en) 2020-10-10 2020-10-10 Data recovery method and system of computer storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011077370.7A CN112181713B (en) 2020-10-10 2020-10-10 Data recovery method and system of computer storage system

Publications (2)

Publication Number Publication Date
CN112181713A true CN112181713A (en) 2021-01-05
CN112181713B CN112181713B (en) 2021-06-04

Family

ID=73948660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011077370.7A Active CN112181713B (en) 2020-10-10 2020-10-10 Data recovery method and system of computer storage system

Country Status (1)

Country Link
CN (1) CN112181713B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114218018A (en) * 2022-02-18 2022-03-22 深圳佰维存储科技股份有限公司 System data protection method and device, readable storage medium and electronic equipment

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030168A (en) * 2007-02-15 2007-09-05 华为技术有限公司 Method and apparatus for realizing high-reliability chain list
US20080226081A1 (en) * 2007-03-16 2008-09-18 Yuichi Terao Data recovery method, image processing apparatus, controller board, and data recovery program
CN101546291A (en) * 2009-05-12 2009-09-30 华为技术有限公司 Access method and device for increasing robustness of memory data
CN103870362A (en) * 2014-03-21 2014-06-18 华为技术有限公司 Data recovery method, data recovery device and backup system
CN104393999A (en) * 2014-12-10 2015-03-04 暨南大学 Slave device authentication method and system for master device
CN104598330A (en) * 2013-10-30 2015-05-06 中国航空工业集团公司第六三一研究所 Data storage and verification method based on dual backup
US20150143198A1 (en) * 2013-11-15 2015-05-21 Qualcomm Incorporated Method and apparatus for multiple-bit dram error recovery
CN105893181A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Cloud hard disk data recovery method
CN106612171A (en) * 2016-07-14 2017-05-03 四川用联信息技术有限公司 Data soft recovery method in cloud storage
CN106959910A (en) * 2017-05-09 2017-07-18 广州响动信息科技有限公司 Remote data management method and system
CN108572887A (en) * 2017-03-14 2018-09-25 上海骐宏电驱动科技有限公司 Data detection bearing calibration
CN111008094A (en) * 2018-10-08 2020-04-14 阿里巴巴集团控股有限公司 Data recovery method, equipment and system
CN111446970A (en) * 2020-02-11 2020-07-24 上海威固信息技术股份有限公司 Method for preprocessing low-density parity check code decoding soft decision information
CN111628864A (en) * 2020-06-05 2020-09-04 微位(深圳)网络科技有限公司 Method for carrying out secret key safety recovery by using SIM card

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030168A (en) * 2007-02-15 2007-09-05 华为技术有限公司 Method and apparatus for realizing high-reliability chain list
US20080226081A1 (en) * 2007-03-16 2008-09-18 Yuichi Terao Data recovery method, image processing apparatus, controller board, and data recovery program
CN101546291A (en) * 2009-05-12 2009-09-30 华为技术有限公司 Access method and device for increasing robustness of memory data
CN104598330A (en) * 2013-10-30 2015-05-06 中国航空工业集团公司第六三一研究所 Data storage and verification method based on dual backup
US20150143198A1 (en) * 2013-11-15 2015-05-21 Qualcomm Incorporated Method and apparatus for multiple-bit dram error recovery
CN103870362A (en) * 2014-03-21 2014-06-18 华为技术有限公司 Data recovery method, data recovery device and backup system
CN104393999A (en) * 2014-12-10 2015-03-04 暨南大学 Slave device authentication method and system for master device
CN105893181A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Cloud hard disk data recovery method
CN106612171A (en) * 2016-07-14 2017-05-03 四川用联信息技术有限公司 Data soft recovery method in cloud storage
CN108572887A (en) * 2017-03-14 2018-09-25 上海骐宏电驱动科技有限公司 Data detection bearing calibration
CN106959910A (en) * 2017-05-09 2017-07-18 广州响动信息科技有限公司 Remote data management method and system
CN111008094A (en) * 2018-10-08 2020-04-14 阿里巴巴集团控股有限公司 Data recovery method, equipment and system
CN111446970A (en) * 2020-02-11 2020-07-24 上海威固信息技术股份有限公司 Method for preprocessing low-density parity check code decoding soft decision information
CN111628864A (en) * 2020-06-05 2020-09-04 微位(深圳)网络科技有限公司 Method for carrying out secret key safety recovery by using SIM card

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AMBIKA GUPTA 等: "Implementation of Storage in Virtual Private Cloud using Simple Storage Service on AWS", 《PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA 2020)》 *
傅颖勋 等: "安全云存储系统与关键技术综述", 《计 算 机 研 究 与 发 展》 *
阮春阳 等: "基于再生码的数据完整性验证及恢复", 《计算机工程与设计》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114218018A (en) * 2022-02-18 2022-03-22 深圳佰维存储科技股份有限公司 System data protection method and device, readable storage medium and electronic equipment
CN114218018B (en) * 2022-02-18 2022-05-27 深圳佰维存储科技股份有限公司 System data protection method and device, readable storage medium and electronic equipment

Also Published As

Publication number Publication date
CN112181713B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN109885256B (en) Data storage method, device and medium based on data slicing
CN107612561B (en) Encoding and decoding method and device
US8250427B2 (en) Selecting erasure codes for a fault tolerant system
US20150178170A1 (en) Method and Apparatus for Recovering Data
RU2696425C1 (en) Method of two-dimensional control and data integrity assurance
US10885814B2 (en) Share recovery system, share recovery apparatus, share recovery method, and program
CN110532126A (en) Correcting and eleting codes memory system data quick recovery method, device and storage medium
CN110011998B (en) Identity-based multi-backup remote data holding verification method
CN106612272A (en) Verification and recovery algorithm for data tampering in cloud storage
Dichenko et al. Controlling and restoring the integrity of multi-dimensional data arrays through cryptocode constructs
CN112181713B (en) Data recovery method and system of computer storage system
CN103703446B (en) Data reconstruction that network storage Zhong Kang Byzantium lost efficacy, failure-data recovery method and device
CN112416891B (en) Data detection method, device, electronic equipment and readable storage medium
US8762336B2 (en) Geo-verification and repair
CN109101360B (en) Data integrity protection method based on bloom filter and cross coding
CN114780298A (en) File data processing method and device, computer terminal and storage medium
CN106227617A (en) Self-repair method and storage system based on correcting and eleting codes algorithm
CN105279048B (en) A kind of data reconstruction method and device
US7073024B1 (en) Data protection method wherein data protection code is stored together with parity
CN113282693A (en) 3 DGIS-based holographic data management method and system
CN116930727B (en) Chip detection method based on circuit board
WO2014051462A1 (en) Method for recovering recordings in a storage device and system for implementing same
CN115208554B (en) Management method and system for key self-checking, self-correcting and self-recovering
CN117349860A (en) File storage system and method based on matrix change and data segmentation
Colombier et al. Horizontal correlation attack on classic McEliece

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant