Disclosure of Invention
The invention aims to provide a distributed backup synchronization system for public cloud tenant service sensitive data, aiming at the defects of the current sensitive data processing.
In order to overcome the defects of the prior art, the invention adopts the following technical scheme:
a distributed backup synchronization system for public cloud tenant service sensitive data comprises an acquisition module, a security module, a backup module, a synchronization module, a verification module and a processor,
the processor is respectively in control connection with the acquisition module, the security module, the backup module, the synchronization module and the verification module, wherein the acquisition module is used for acquiring data of a tenant so as to acquire service and Identity (ID) of the tenant; the verification module is used for verifying the identity of the tenant and the accessed mobile terminal; the safety module is used for protecting the data of the tenant so as to cooperate with the backup module to backup the data of the tenant; the backup module is used for backing up data of each tenant and storing the data in a personal database of the tenant;
the synchronization module triggers the synchronization of the tenant data when receiving the access request which is verified by the verification module;
the acquisition module comprises a networking unit and a database, the networking unit is used for networking with the mobile terminals of the tenants to establish a transmission network, and the transmission network verifies the authorization permission of the mobile terminal corresponding to each tenant through the verification module before connection; the database is used for storing the information of each tenant collected by the networking unit and feeding back a storage serial number;
the acquisition module also comprises a management unit, wherein the management unit generates a corresponding pass code by using the identity information provided by the tenant, checks the access position when using the pass code, and accesses the required service if the pass code meets the pass condition;
the management unit further comprises a passcode generator for automatically generating a passcode and a backup ID, the passcode generator generating a passcode pass through the following formulai:
Wherein u is
iTotal number of visits for tenant i; task
iThe number of visits for the day; z is a radical of
iIs the current time; d
iIs the cut-off time; w is a
iIs the latency of the trigger at access; k is a radical of
iIs the pass code of the last access,
wherein series is the identity ID of the tenant; when a new pass code is generated, the pass code is updated;
the passcode generator generates a backup ID by:
wherein, BackupiIs a backup ID; a and b are coefficients, and the values of the coefficients are related to items or demands issued by tenants; giThe total storage capacity of data uploaded for the tenants; k is a radical ofiThe password is the last access password;
before responding to the access request of the tenant, the management unit needs to utilize the passcode generator to generate a new passcode and a backup ID, and the newly issued passcode and backup ID are valid only if the passcode and the backup ID are inconsistent with the original passcode and the backup ID, so that the record of the access request can be traced.
Optionally, the verification module includes a verification unit and an authorization unit, where the verification unit is configured to verify the identity of the tenant, and if the identity of the tenant is not registered, feed back a result of the verification to the tenant;
the verification unit comprises a registration subunit and an ID creation subunit, the registration subunit acquires identity information of the tenant, establishes an account for the tenant based on an ID registration protocol, and generates an authorization code through the authorization unit, wherein if the equipment adopted during current registration is a mobile terminal, the identification code of the equipment is read and is bound with the authorization code; if the current registration equipment is not the mobile terminal, the authorization code is granted when the next mobile terminal is used for logging in;
the ID creating subunit is used for creating the identity or the ID of the tenant and sending the generated ID to the transmission network;
the registration subunit is further configured to acquire a location of the mobile terminal related to the login account to acquire corresponding tenant information when the tenant registers or requests the list submission.
Optionally, the backup module includes an identification unit and a backup unit, where the identification unit identifies based on the data of the tenant to identify whether the data is private data, and if the data is private data, the backup module performs backup through the backup data; the backup unit is used for backing up the private data and protecting the private data through a safety module;
the identification unit determines whether the data is the private data or not through a privacy policy, wherein the privacy policy comprises that a plurality of storage units are opened up in an inherent storage space, and each storage unit stores at least one piece of personal data related to the tenant; generating a packing instruction after each storage unit is stored and meets a packing threshold, wherein the storage units are packed and backed up through the backup unit; wherein the backup unit performs a backup operation based on the packing instruction;
the backup unit is used for opening a storage area for storing the private data in a storage space of a tenant based on the backup ID and the data of the packaging instruction of the identification unit; and generating a backup instruction after the data is stored, wherein the backup instruction is used for interacting data with other tenants or tenants in the transmission network.
Optionally, the synchronization module includes a synchronization unit and an extraction unit, the synchronization unit synchronizes a requirement list of a tenant based on the extraction unit, and the synchronization unit triggers synchronous display of data in response to a searched tag when executing a synchronization operation;
wherein the synchronization operation comprises:
establishing a search database, wherein the database comprises data of each tenant;
searching the demands of the tenants through a search engine, and generating corresponding retrieval results after data matched with the demands of the tenants exist in the search database;
and displaying corresponding tenant information based on the search result, and sending the tenant information to a mobile terminal or a requirement submitting device of a tenant submitting requirement, wherein the tenant information comprises a tenant leasing address, an estimated distance between the tenant information and the requirement submitting device in real time, and a contact telephone.
Optionally, the security module is configured to protect data of a tenant, and when the tenant uploads data in the transmission network, the security module performs an encryption operation on the data; the security module hides the data which are published unnecessarily for the search result so as to protect the information security of the tenant.
Optionally, the encryption operation includes:
acquiring data capacity of a tenant, and distributing membership degrees to the data capacity, wherein the membership degrees are generated according to identity information of the tenant or the authorization code; obtaining a data sequence U = { C1, C2, C3, …, CmIs epsilon with R; the security module performs encryption according to the following equation:
wherein,
for encrypting a plaintext sequence, MI is an encrypted key; m is the number of elements of the data sequence; n is the number of elements of the encrypted plaintext sequence; and m = n.
The beneficial effects obtained by the invention are as follows:
1. the management unit is adopted to generate a new pass code and a backup ID by using the pass code generator before responding to the access request of the tenant, and the newly issued pass code and backup ID are valid only if the pass code and the backup ID are inconsistent with the original pass code and the backup ID, so that the record of the access request can be traced, meanwhile, the data of the tenant can be backed up through the backup ID, and the data of the tenant can be effectively protected based on the backup;
2. all the operations can be traced by performing backup operation on the data of the tenant and marking the backed-up data, so that the safety of the whole data is ensured;
3. searching the demands of the tenants through a search engine, and generating corresponding retrieval results after data matched with the demands of the tenants exist in the search database;
4. hiding data which is subjected to unnecessary publication on the search result through the security module so as to prevent the information security of the tenant;
5. through the cooperation among the encrypted plaintext sequence, the determinant of the authorization code and the determinant of the membership degree, the data is encrypted, and the data can be effectively protected;
6. by selecting the optimal matching degree for the satisfied demand list, the tenant can obtain the optimal resource in the process of leasing or releasing, and the protection on the private data is reduced to the maximum extent.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc. based on the orientation or positional relationship shown in the drawings, it is only for convenience of describing the present invention and simplifying the description, but it is not intended to indicate or imply that the device or component referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes and are not to be construed as limiting the present patent, and the specific meaning of the terms described above will be understood by those of ordinary skill in the art according to the specific circumstances.
The first embodiment is as follows: according to fig. 1 to 5, a distributed backup synchronization system for public cloud tenant service sensitive data is provided, which includes an acquisition module, a security module, a backup module, a synchronization module, a verification module and a processor, wherein the processor is respectively in control connection with the acquisition module, the security module, the backup module, the synchronization module and the verification module, and performs accurate backup or protection on data of each tenant under the centralized control of the processor. In addition, the synchronization system also comprises a server, wherein the server is connected with the processor and is networked with an external system or network through the server so as to realize the data protection of each tenant. The acquisition module is used for acquiring data of a tenant so as to acquire the service and the identity ID of the tenant; the verification module is used for verifying the identity of the tenant and the accessed mobile terminal; the safety module is used for protecting the data of the tenant so as to cooperate with the backup module to backup the data of the tenant; the backup module is used for backing up data of each tenant and storing the data in a personal database of the tenant;
the synchronization module triggers the synchronization of the tenant data when receiving the access request which is verified by the verification module;
the acquisition module comprises a networking unit and a database, wherein the networking unit is used for networking with the mobile terminals of the tenants to establish a transmission network, and the transmission network verifies the authorization permission of the mobile terminal corresponding to each tenant through the verification module before connection; the database is used for storing the information of each tenant collected by the networking unit and feeding back a storage serial number; when the mobile terminal is not authorized, prompting the tenant so that the tenant can obtain the best use experience.
The acquisition module also comprises a management unit, wherein the management unit generates a corresponding pass code by using the identity information provided by the tenant, checks the access position when using the pass code, and accesses the required service if the pass code meets the pass condition;
the identity information includes, but is not limited to, the following listed ones: the identity card (identity ID) is equivalent to the leasing combination of the immovable property right certificate, the immovable property right registration certificate and the notarization, and is used for ensuring that the leasing resources of the tenants are accurate and reliable. In addition, in this embodiment, the networking unit may also be in data connection with the server to obtain data such as a certification material of the real property right, so as to check whether the above information is accurate. Meanwhile, when the provided identity information is a lease contract, necessary check is carried out on the leasers and the lessees so as to ensure the reliability of the identity information provided by the two parties.
The management unit further comprises a passcode generator for automatically generating a passcode and a backup ID, the passcode generator generating a passcode pass through the following formulai:
Wherein u is
iTotal number of visits for tenant i; task
iThe number of visits for the day; z is a radical of
iIs the current time; d
iIs the cut-off time; w is a
iIs the latency of the trigger at access; k is a radical of
iFor last accessThe code of the pass is a code of the pass,
wherein series is the identity ID of the tenant; when a new pass code is generated, the pass code is updated;
the passcode generator generates a backup ID by:
wherein, BackupiIs a backup ID; a and b are coefficients, and the values of the coefficients are related to items or demands issued by tenants; giThe total storage capacity of data uploaded for the tenants; k is a radical ofiThe password is the last access password; if the tenant has not issued any project or requirement before, then a and b are both 1; if the item released by the tenant or the submitted demand is not 0, a and b satisfy the following relationship: a = G/GiB = f/G, where G is the total number of items of all items or requirements; f is the current backup frequency; in this embodiment, the resending of the passcode is triggered within a set time interval, so as to ensure that personal data of the tenant can be backed up. In other embodiments, the backup module may also be used to automatically perform backup according to a set backup time interval.
If the pass code is applied for the first time, setting zero to the pass code; in addition, in the pair kiIn the verification process, the identity information of the tenant is acquired, and meanwhile, special letters existing in the identity card are acquired, such as: discarding the appeared 'X', and generating the pass code by using data of 0-9.
Before responding to the access request of the tenant, the management unit needs to utilize the pass code generator to generate a new pass code and a backup ID, and the newly issued pass code and the backup ID are valid only if the pass code and the backup ID are inconsistent with the original pass code and the backup ID, so that the record of the access request can be traced. And backing up the data of the tenant through the backup ID, and effectively protecting the data of the tenant based on the backup.
Optionally, the verification module includes a verification unit and an authorization unit, where the verification unit is configured to verify the identity of the tenant, and if the identity of the tenant is not registered, feed back a result of the verification to the tenant; in the process of result feedback of the tenant, the feedback result does not contain any unnecessary information, so that the personal information is protected. Meanwhile, the verification unit and the authorization unit are matched for use, so that both verification and a registration request for a new tenant can be considered. The verification unit comprises a registration subunit and an ID creation subunit, wherein the registration subunit acquires identity information of the tenant, establishes an account for the tenant based on an ID registration protocol, and generates an authorization code through the authorization unit, wherein if the device adopted during current registration is a mobile terminal, an identification code of the device is read and bound with the authorization code, and after binding, the mobile terminal is granted to correspond to the tenant account and can perform access or request submission; if the current registration equipment is not the mobile terminal, the authorization code is granted when the next mobile terminal is used for logging in; the ID creating subunit is used for creating the identity or the ID of the tenant and sending the generated ID to the transmission network;
the registration subunit is further configured to acquire a location of the mobile terminal related to the login account to acquire corresponding tenant information when the tenant registers or requests the list submission. In addition, the login information and the location information can be manually added according to the tenant, so that the rental information near the location can be acquired, and the tenant can be greatly convenient to determine the rental providing place through the acquiring mode.
Optionally, the backup module includes an identification unit and a backup unit, where the identification unit identifies based on the data of the tenant to identify whether the data is private data, and if the data is private data, the backup module performs backup through the backup data; the backup unit is used for backing up the private data and protecting the private data through a safety module;
the identification unit determines whether the data is the private data or not through a privacy policy, wherein the privacy policy comprises that a plurality of storage units are opened up in an inherent storage space, and each storage unit stores at least one piece of personal data related to the tenant; generating a packing instruction after each storage unit is stored and meets a packing threshold, packing data in the storage units, and performing backup operation through the backup unit; wherein the backup unit performs a backup operation based on the packing instruction;
the backup unit is used for opening a storage area for storing the private data in a storage space of a tenant based on the backup ID and the data of the packaging instruction of the identification unit; and generating a backup instruction after the data is stored, wherein the backup instruction is used for interacting data with other tenants or tenants in the transmission network.
The backup command includes the backup ID and the set threshold information, and when both satisfy the above conditions, the backup operation is executed. In addition, the data units after backup are marked, and the marked information includes, but is not limited to, the following listed types: the execution device, the time at which the backup was performed, the identity ID of the operator, etc. All the operations can be traced by performing backup operation on the data of the tenant and marking the backed-up data, so that the safety of the whole data is ensured.
Optionally, the synchronization module includes a synchronization unit and an extraction unit, the synchronization unit synchronizes a requirement list of a tenant based on the extraction unit, and the synchronization unit triggers synchronous display of data in response to a searched tag when executing a synchronization operation; the demand list is submitted by the tenant, and the demand list comprises a lease demand position, a lease type or other demands.
Wherein the synchronization operation comprises: establishing a search database, wherein the database comprises data of each tenant; particularly, the tenant data includes data of renters and renters, and meanwhile, in the process of renting by the renters, required search needs to be performed through a search engine, so that required positions or renting information can be met. In addition, among the searched data, only some non-private data, which refers to data from which rental information of the other party can be known, is displayed. Meanwhile, the established search database is based on the server to which the search database belongs, so that the access of the tenants with large capacity can be met.
Searching the demands of the tenants through a search engine, and generating corresponding retrieval results after data matched with the demands of the tenants exist in the search database; the device which passes the verification of the verification module and is granted with the authorization code can execute the search operation, if the device is not granted with the authorization code, the search operation cannot be executed, and at the moment, the device is fed back to the tenant to perform real-name authentication or perform binding of the device. By recording the access records, the visitor can be recorded, and the data security is effectively improved. In addition, the search range of the search engine is based on a requirement list submitted by the tenant, and the database is also a new sub-database which is generated after the database is subjected to primary screening by the system and meets the requirement of the tenant.
And displaying corresponding tenant information based on the search result, and sending the tenant information to a mobile terminal or a requirement submitting device of a tenant submitting requirement, wherein the tenant information comprises a tenant leasing address, an estimated distance between the tenant information and the requirement submitting device in real time, and a contact telephone. The method can meet the requirements and the requirements of the lease service through displaying part of tenant information, and can also meet the protection of private data to the maximum extent.
Optionally, the security module is configured to protect data of a tenant, and when the tenant uploads data in the transmission network, the security module performs an encryption operation on the data; the security module hides the data which are not necessarily published in the search result so as to protect the information security of the tenant.
Optionally, the encryption operation includes: acquiring data capacity of a tenant, and distributing membership degrees to the data capacity, wherein the membership degrees are generated according to identity information of the tenant or the authorization code, and in addition, the membership degrees distributed aiming at different data capacities are inconsistent, so that when the stored data is changed, the data capacity is changed, and the change of the membership degrees is also brought; and meanwhile, determining the membership degree according to the weight of each datum.
Obtaining a data sequence U = { C1, C2, C3, …, CmIs epsilon with R; the security module performs encryption according to the following equation:
wherein,
for encrypting a plaintext sequence, MI is an encrypted key; m is the number of elements of the data sequence; n is the number of elements of the encrypted plaintext sequence; and m = n; m belongs to the group of R, and n belongs to the group of R. In addition, the encrypted plaintext sequences are both present in the encryption and decryption processes. At the same time, the encrypted plaintext sequence is related to the tenant's information and, according to the tenant's authorization code, specifically,
obtaining a ciphertext according to a plaintext; d is a determinant of an authorization code; h is determinant of degree of membership. Through the cooperation among the encrypted plaintext sequence, the determinant of the authorization code and the determinant of the membership degree, the data is encrypted, and the data can be effectively protected. In addition, the plaintext sequence may be determined according to D and H, and during the decryption process, the plaintext sequence may also be decrypted according to the above formula, which is not described in detail herein.
Example two: this embodiment should be understood to include at least all the features of any of the foregoing embodiments and further improve on the same, and according to fig. 1-5, further lie in determining a real-time estimated distance of a demand submitting device, wherein the providing location of the tenant and the estimated distance of the demand providing location are determined based on the demand provided by the tenant and by a search engine to meet the location in a demand list, and determining a real-time estimated distance of a demand submitting device, the estimated distance being determined according to the following formula:
wherein, in distance (u)i,uj) In uiPosition coordinates representing the mobile terminal or the tenant, the coordinates being expressed by (x)i,yi) Represents; u. ofjPosition coordinates representing a list of satisfied requirements, the coordinates being in (x)j,yj) Represents;
the coordinate position is determined according to the position issued by the renter, and the coordinate position is determined by GPRS;
wherein, MATHiMatching degree of the search; u. ofturePosition coordinates of the tenants to be selected;
wherein, MATHmaxIs the best match in the search. By selecting the optimal matching degree for the satisfied demand lists, the tenant can obtain the optimal resources in the process of leasing or releasing, and the protection on the private data is reduced to the maximum extent. In addition, the main points of the invention areThe private data of two parties or multiple parties is protected in a distributed mode, so that the non-private data can be disclosed in the process of searching the data, and other private data can be effectively protected.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.