CN114594916A - Enterprise file storage management method and device, electronic equipment and storage medium - Google Patents

Enterprise file storage management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114594916A
CN114594916A CN202210272777.8A CN202210272777A CN114594916A CN 114594916 A CN114594916 A CN 114594916A CN 202210272777 A CN202210272777 A CN 202210272777A CN 114594916 A CN114594916 A CN 114594916A
Authority
CN
China
Prior art keywords
disk
file data
information
self
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210272777.8A
Other languages
Chinese (zh)
Other versions
CN114594916B (en
Inventor
袁帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Trilobite Information Technology Co ltd
Original Assignee
Shanxi Trilobite Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Trilobite Information Technology Co ltd filed Critical Shanxi Trilobite Information Technology Co ltd
Priority to CN202210272777.8A priority Critical patent/CN114594916B/en
Publication of CN114594916A publication Critical patent/CN114594916A/en
Application granted granted Critical
Publication of CN114594916B publication Critical patent/CN114594916B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present application relates to the field of data storage, and in particular, to a method and an apparatus for managing enterprise file storage, an electronic device, and a storage medium. The method comprises the following steps: acquiring disk information of a storage server and disk splitting information input by a user; dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information; acquiring IP address information of at least one employee-side electronic device, and respectively mounting the information of a self-service disk into each electronic device according to the IP address information; the method comprises the steps of obtaining file data saved into a self-use disc by a user in the electronic equipment, saving the file data into the self-use disc, and saving the file data into a standby disc at the same time. The method and the device have the effect of improving the security of the enterprise file data.

Description

Enterprise file storage management method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data storage, and in particular, to a method and an apparatus for managing enterprise file storage, an electronic device, and a storage medium.
Background
A File server (File server), also known as a File server, refers to a File storage device that all users can access in a computer network environment. The file server is responsible for centrally storing and managing data files, allowing users to share information over a network without the need for physical transfer of information via floppy disks or other external storage devices, while other computers connected to the same network as the file server may also access files stored within the file server.
The access of important or related files of an enterprise by using the file server becomes the popular trend of medium and large enterprises, important files or related files are encrypted and stored in the file server by each department in the enterprise, and enterprise managers can read, write, check and other operations according to the related files stored in the file server, so that unified management is facilitated.
The Leso virus is a virus file, after the file of the Leso virus is opened by a user, the Leso virus traverses a series of files such as office documents, pictures and the like in all local disks, the formats of the files are tampered, the files are all encrypted, and after the files are encrypted, most enterprises can only exchange the keys by cracking the keys or paying the 'redemption' to change the keys, and the files are 'redeemed', so that serious loss is caused to the enterprises.
However, when an enterprise builds a file server, the file server is often built on a computer host directly, all files are stored on one computer host, even if the files are backed up in a local system, the files can be discovered by a Lesso virus, and the security of the enterprise files is greatly threatened.
Disclosure of Invention
In order to improve the security of enterprise file storage, the application provides an enterprise file storage management method and device, electronic equipment and a storage medium.
In a first aspect, the present application provides an enterprise file storage management method, which adopts the following technical scheme:
an enterprise file storage management method comprises the following steps:
acquiring disk information of a storage server and disk splitting information input by a user;
dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disk information into each electronic device according to the IP address information;
and acquiring file data to be stored in a self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk.
By adopting the technical scheme, the magnetic disk of the storage server is divided into a self-service disk and a standby disk according to the magnetic disk information of the storage server and the disk distribution information input by a user, the self-service disk is mounted on the electronic equipment of the employee end of an enterprise, after the self-service disk is mounted, the electronic equipment end of the staff has the condition of checking the information data in the disk for use, and after the staff is mounted, if the staff saves the file data in the electronic equipment to the disk for use, meanwhile, the file data is stored in the standby disk, the data in the self-use disk and the standby disk are stored in the system of the storage server, when the file is invaded by the Lesovirus, the data in the spare disk is difficult to be invaded by the Lesovirus, the file can be retrieved through the data in the spare disk after the enterprise file is lost, therefore, the possibility of file data loss of the enterprise is reduced, and the security of the file data of the enterprise is improved.
In a possible implementation manner, the saving the file data to the spare disk simultaneously with the saving the file data to the spare disk includes:
pre-storing the file data into a preset solid state disk;
acquiring initial timing time;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value or not, if so, acquiring all file data in the solid state disk, and then storing all the file data in the self-use disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to be zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the timing is started from the initial timing time.
By adopting the technical scheme, when the file data is stored, the file data is firstly stored in the solid state disk, and the file data in the solid state disk is stored in the self-use disk and the standby disk after the time interval of the preset time threshold value, so that the speed of storing the file data is improved.
In a possible implementation manner, the saving the file data to the self-use disk and simultaneously saving the file data to the spare disk includes:
and compressing the file data and storing the compressed file data into the self-use disk and the standby disk.
By adopting the technical scheme, when the file data is stored, the file data is firstly compressed, and the compressed file data is stored in the self-service disk and the standby disk, so that the memory occupation of the storage server is reduced, and the memory utilization rate of the storage server is improved.
In a possible implementation manner, the saving the file data to the spare disk simultaneously with the saving the file data to the spare disk further includes:
acquiring position information corresponding to each employee respectively;
determining authority information corresponding to each position information according to each position information, wherein the authority information comprises a manageable directory and available operation;
controlling each employee-side electronic device to display the corresponding directory of the self-service disk according to the manageable directory;
and setting the operation authority of each employee-side electronic device on the catalog according to the available operation.
By adopting the technical scheme, the operation authority of each employee on the information in the self-service disk and the part or all of the catalogues in the self-service disk which can be checked are determined according to the positions of each employee, the operation of each employee on the self-service disk is limited, the possibility of data leakage is reduced, and the probability of mistakenly deleting data is reduced.
In a possible implementation manner, the saving the file data to the spare disk simultaneously with the saving the file data to the spare disk further includes:
acquiring source information of each file data;
determining the security level of all the file data according to each source information;
determining abnormal file data according to all the file data and the security levels thereof;
when a virus attack signal is obtained, the abnormal file data and the corresponding security level are fed back to the electronic equipment corresponding to the administrator of the storage server;
and the abnormal file data is data with low safety level.
By adopting the technical scheme, the security level of each file data is determined according to the source information of each file data stored in the self-use disk, the file data with low security level is taken as abnormal file data, and the abnormal file data and the corresponding security level are fed back to the electronic equipment of the administrator when the virus attack signal is obtained, so that the administrator is prompted to carry out virus searching and killing work on the abnormal file data, and the probability of virus files after the data are recovered is reduced.
In a possible implementation manner, the feeding back the abnormal file data and the security level corresponding to the abnormal file data to the electronic device corresponding to the administrator of the storage server when the virus attack signal is obtained includes:
when a virus attack signal is obtained, obtaining the current moment;
determining a period to be checked according to the current moment;
acquiring all abnormal file data in the period to be checked;
all abnormal file data in the period to be checked and the security level corresponding to the abnormal file data are fed back to the electronic equipment corresponding to the manager of the storage server;
and the period to be checked is a time period corresponding to a preset date range before the current time.
By adopting the technical scheme, after the data are attacked by the virus, all abnormal file data within the preset date range before the data are attacked by the virus and in the period to be checked are fed back to the electronic equipment of the manager, so that the abnormal file data closer to the virus attack date can be checked, the number of file data for performing virus check on the data in the self-service disk is reduced, and the virus check efficiency is improved.
In a possible implementation manner, the saving the file data to a self-use disk and simultaneously saving the file data to the spare disk further includes:
acquiring all file data stored in a standby disc;
and uploading the file data to a cloud server.
By adopting the technical scheme, the file data in the standby disk are uploaded to the cloud server, and are stored in the cloud server, so that the protective layer of the file data is increased, and the security of the enterprise file data is further improved.
In a second aspect, the present application provides an enterprise file storage management apparatus, which adopts the following technical solutions:
an enterprise file storage management apparatus may specifically include: the device comprises a first acquisition module, a disk dividing module, a second acquisition module and a file data storage module, wherein:
the first acquisition module is used for acquiring the disk information of the storage server and the disk splitting information input by a user;
the disk dividing module is used for dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
the second acquisition module is used for acquiring the IP address information of at least one employee-side electronic device and respectively mounting the self-service disk information into each electronic device according to the IP address information;
and the file data storage module is used for acquiring file data to be stored in a self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk and storing the file data in the standby disk at the same time.
By adopting the technical scheme, the disk dividing module divides the disk of the storage server into the self-use disk and the standby disk according to the disk information of the storage server acquired by the first acquisition module and the disk dividing information input by the user, the self-use disk is mounted on the electronic equipment at the employee end of the enterprise by the second acquisition module, and after the self-use disk is mounted, the electronic device of the employee will have a condition for viewing the information data in the user disk, and after being mounted, when the file data storage module stores the file data in the electronic equipment of the staff into the self-service disk, the file data is saved in a spare disk, the data in the spare disk and the spare disk are stored in a system of a storage server, when the file data is invaded by the Lesovirus, the data in the standby disk is difficult to be invaded by the Lesovirus, the possibility of file data loss of an enterprise is reduced, and the security of the file data of the enterprise is further improved.
In a possible implementation manner, when the file data storage module stores the file data in a self-use disc and stores the file data in the spare disc, the file data storage module is specifically configured to:
pre-storing the file data into a preset solid state disk;
acquiring initial timing time;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value or not, if so, acquiring all file data in the solid state disk, and then storing all the file data in the self-use disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to be zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the timing is started from the initial timing time.
In a possible implementation manner, when the file data storage module stores the file data in a self-use disc and stores the file data in the spare disc, the file data storage module is specifically configured to:
and compressing the file data and storing the compressed file data into the self-use disk and the standby disk.
In one possible implementation, the apparatus further includes:
the position acquisition module is used for acquiring position information corresponding to each employee;
the authority determining module is used for determining authority information corresponding to each position information according to each position information, and the authority information comprises a manageable directory and available operation;
the authority setting module is used for controlling each employee-side electronic device to display the corresponding directory of the self-service disk according to the manageable directory;
the permission setting module is also used for setting the operation permission of each employee-side electronic device to the catalog according to the available operation.
In one possible implementation, the apparatus further includes:
the source acquisition module is used for acquiring source information of each file data;
the security level determining module is used for determining the security levels of all the file data according to each source information;
the abnormal file determining module is used for determining abnormal file data according to all the file data and the security levels thereof;
the feedback module is used for feeding back the abnormal file data and the corresponding security level to the electronic equipment corresponding to the manager of the storage server when the virus attack signal is acquired;
and the abnormal file data is data with low safety level.
In a possible implementation manner, when the feedback module feeds the abnormal file data and the security level corresponding to the abnormal file data back to the electronic device corresponding to the administrator of the storage server when acquiring the virus attack signal, the feedback module is specifically configured to:
when a virus attack signal is obtained, obtaining the current moment;
determining a period to be checked according to the current moment;
acquiring all abnormal file data in the period to be checked;
all abnormal file data in the period to be checked and the security level corresponding to the abnormal file data are fed back to the electronic equipment corresponding to the manager of the storage server;
and the period to be checked is a time period corresponding to a preset date range before the current time.
In one possible implementation, the apparatus further includes:
the third acquisition module is used for acquiring file data stored in the standby disk;
and the backup uploading module is used for uploading the file data to a cloud server.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
an electronic device, comprising:
at least one processor;
a memory;
at least one application, wherein the at least one application is stored in the memory and configured to be executed by the at least one processor, the at least one application configured to: and executing the enterprise file storage management method.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, comprising: a computer program is stored which can be loaded by a processor and which implements the above-described enterprise file storage management method.
To sum up, the application comprises the following beneficial technical effects:
according to the disk information of the storage server and the disk splitting information input by a user, a disk of the storage server is divided into a self-use disk and a standby disk, the self-use disk is mounted on an electronic device of an enterprise employee terminal, after mounting, the electronic device terminal of an employee has conditions for checking information data in the self-use disk, after mounting, if the employee stores file data in the electronic device into the self-use disk, the file data is stored in the standby disk, the data in the self-use disk and the standby disk are stored under a system of the storage server, and when the file data is infringed by a Lesog virus, the data in the standby disk is difficult to be infringed by the Lesog virus, so that the possibility of file data loss of an enterprise is reduced, and the security of the file data of the enterprise is further improved.
The operation authority of each employee on the information in the self-service disk and a part or all of directories in the self-service disk which can be viewed are determined according to the positions of each employee, the operation of each employee on the self-service disk is limited, the possibility of data leakage is reduced, and the probability of mistakenly deleting data is reduced.
Drawings
FIG. 1 is a flowchart illustrating an enterprise file storage management method according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of an enterprise file storage management apparatus according to an embodiment of the present application;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-3.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to prevent most of file data of an enterprise from being lost due to Lessovirus or other human misoperation, the embodiment of the application designs the storage server, the storage server is connected with computers and other electronic devices such as servers in the same area network in the enterprise, and the storage server adopts a FreeBSD system and is used for storing enterprise files.
An embodiment of the present application provides an enterprise file storage management method, which is executed by a storage server with reference to fig. 1, and includes:
and S101, acquiring the disk information of the storage server and the disk splitting information input by the user.
And S102, dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information.
Specifically, the disk information is disk capacity information in the server, including total disk capacity and disk usage capacity, a preset storage system is installed in the storage server, and the storage server automatically reads the total disk capacity and the disk usage capacity to obtain the disk information.
After the storage system is installed in the storage server, a user can enter a disk dividing interface through a webpage, disk dividing operation is carried out on the disk dividing interface, disk information of the storage server is displayed on the disk dividing interface, namely the total disk capacity and the disk using capacity of the storage server are displayed, the user can input the disk dividing information on the disk dividing interface according to the displayed disk capacity and the self requirement, and the storage server divides the disk into sub disks according to the disk dividing information; the disk dividing information comprises sub-disk number information and sub-disk capacity information, the storage server determines the number of the divided sub-disks according to the sub-disk number information, and determines the capacity of the divided sub-disks according to the sub-disk capacity information.
And determining a self-use disc and a standby disc according to each divided sub-disc, wherein the self-use disc is used for directly storing the enterprise files by the user, and the standby disc is used for backing up the stored enterprise files to generate backup files.
The disk of the storage server may be divided into two sub disks or may be a plurality of sub disks, the capacities of the sub disks may be the same or different, the disks are divided according to different requirements of users, and it is determined which of the disks are self-use disks and which of the disks are standby disks, for example, when the storage capacity requirement of an enterprise user is large, the disk is divided into two sub disks, a first sub disk is used for storing daily files, the capacity of the first sub disk accounts for 80% of the total capacity, a second sub disk is only used for backing up important files, and the capacity of the second sub disk accounts for 20% of the total capacity.
After determining the self-use disc and the spare disc, the self-use disc and the spare disc correspond to each other, and files in the self-use disc are backed up to the corresponding spare disc, for example, the magnetic disc is divided into 2 sub-discs, one of the two sub-discs is the self-use disc, the other sub-disc is the spare disc, the self-use disc corresponds to the spare disc, and the files in the self-use disc are backed up to the spare disc; if the magnetic disk is divided into 5 sub disks, if one sub disk is a spare disk, the remaining four sub disks are spare disks, the spare disk corresponds to each spare disk, if one sub disk is a spare disk, the four sub disks are spare disks, and data in the four spare disks are all backed up into one spare disk; if the magnetic disk is divided into 4 sub disks, two sub disks are self-use disks, the remaining two sub disks are standby disks, each self-use disk corresponds to each standby disk one by one, and the data of the self-use disks are backed up to the corresponding standby disks.
For convenience of explanation, in the embodiment of the present application, a self-use disc and a spare disc are exemplified, wherein the self-use disc and the spare disc correspond to each other.
The method comprises the steps that a self-use disk and a spare disk are assigned to the same disk array, a built-in raid tool can be adopted in the dividing mode, the raid1 mirror disk array technology is utilized, data of the self-use disk point to the position of the spare disk at the same position, and the self-use disk and the spare disk form a mirror disk array; when the user saves the enterprise file, the file data written in the self-use disk is copied to the spare disk in a hundred percent manner, and the data in the self-use disk is stored in a hundred percent manner.
When reading data, the data in the self-use disc is read first, and the data in the spare disc is not read, and when the data reading of the self-use disc fails, the data in the spare disc is automatically read.
And S103, acquiring IP address information of at least one employee-side electronic device, and respectively mounting the information of the disk to each electronic device according to the IP address information.
Specifically, a plurality of computers are configured in an enterprise, each employee corresponds to one computer, and the computer used by the employee is the employee-side electronic device; the IP address information is the IP address of the employee computer, and the IP address information of each computer corresponds to one computer one by one.
The user can check each file stored in the user disk after entering the user disk, and the user can also store the files in the user disk through the user disk, so that sharing is realized.
The mounting means a process that an operating system makes files and directories on a storage device accessible to a user through a computer file system, that is, after a disk of a storage server is mounted in a computer system of the user, a new shared disk is added to the computer of the user compared with a disk before mounting, the shared disk is a disk of the user, and the directories and files in the disk of the user can be read and written in the computer file system by the user.
And step S104, acquiring file data to be stored in the self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk.
Specifically, a user accesses a directory of a self-use disk displayed in the computer system through an original computer system, enters a corresponding directory of the self-use disk, can access data of enterprise files under the corresponding directory, simultaneously can access a corresponding folder under the directory, stores files to be stored under the corresponding directory to be stored, and acquires file data stored by the user when the user stores the files in the self-use disk by a storage server.
The acquired file data are stored in a corresponding path in the storage server, and the self-use disk and the standby disk are a mirror disk array, so that when the file data are stored in the self-use disk, the file data are also stored in the standby disk, finally the file data which an enterprise wants to store are stored in the storage server, two disks are separately stored at the same time, the data stored in the two disks are the same, and the standby disk plays a role in real-time backup.
When a strange virus occurs, the strange virus traverses all local files in the windows system, but the data in the standby disk is still stored in the storage server, the storage server system is a FreeBSD system, 90% of the strange virus can only run in the windows system, and therefore the strange virus cannot traverse the system in the storage server, namely, the file data in the standby disk is difficult to strange.
After the Lessovirus accesses all local files stored locally and files in a self-use disk under the system, the data in the standby disk cannot be scanned by the Lessovirus, the security is high, and after the Lessovirus invades, the file data in the standby disk can be used for recovery, so that the security of enterprise file storage is improved.
The embodiment of the application provides an enterprise file storage management method, a magnetic disk in a server is divided into two magnetic disks, one is a self-use disk and the other is a spare disk, the self-use disk and the spare disk are divided into a magnetic disk array by utilizing a raid tool, the self-use disk is mounted on a computer of an enterprise, when an enterprise user stores a file, the file is stored in the self-use disk, the file is automatically stored to the spare disk at the same time, backup is achieved, if the computer is damaged by a lasso virus, the lasso virus can only access data in a local magnetic disk of the enterprise computer, the file in the local magnetic disk is encrypted, the enterprise user can restore through the data in the self-use disk and the spare disk, and the security of enterprise file storage is improved.
In step S104, a possible implementation manner of the embodiment of the present application is that saving the file data into the self-use disk and saving the file data into the corresponding standby disk at the same time includes:
step S41a (not shown), pre-storing the file data in the preset solid state disk.
Specifically, the storage server is provided with a solid state disk, the solid state disk is a storage device using a flash memory as a permanent memory, and compared with a traditional mechanical hard disk, the solid state disk has a higher read-write speed, so that when storing file data, the file data is directly stored into a storage space corresponding to the solid state disk, and the storage server has a higher read-write speed when storing the file data.
The traditional mechanical hard disk comprises a motor, disk surfaces and magnetic heads, wherein data can be stored on the front and back surfaces of each disk surface, each disk surface corresponds to one magnetic head which is used for reading and writing, all the magnetic heads are connected to a shared magnetic wall, when a magnetic arm moves, all the magnetic heads move in the same way, the disk surface continuously rotates, and the magnetic heads realize the operation of reading and writing data on the disk surfaces.
The solid state disk is a storage medium without mechanical motion, adopts a disk constructed by the same or similar storage medium as an internal memory, and consists of a control unit and a storage unit, wherein the storage unit comprises a flash memory chip and a DRAM chip, and when the file data is read and written, the data storage is realized by using an electric signal, so that the time influence of track seeking and rotation delay is reduced, and the reading and writing speed is improved.
Step S42a (not shown), acquiring an initial timing; starting timing from the initial timing moment to generate time information; and judging whether the time information is equal to a preset time threshold, if so, acquiring all file data in the solid state disk, and then storing all the file data in a self-use disk and a standby disk.
Step S43a (not shown), regarding the time when the time information is equal to the preset time threshold as the next timing time; the time information is reset to zero.
Step S42a and step S43a are cyclically executed with the next chronograph time as the initial chronograph time.
Specifically, after the solid state disk is installed on the storage server, the storage server acquires data stored in the solid state disk at regular time, and stores all file data stored in the solid state disk into the self-use disk and into the standby disk at the same time.
The initial timing moment is the moment when the solid state disk is installed and starts to be normally used; starting timing from the initial timing moment, generating time information, acquiring all file data stored in the solid state disk when the time information is equal to a preset time threshold, storing all the file data stored in the solid state disk into a self-use disk and a standby disk, simultaneously timing and resetting, taking the moment when the time information is equal to the preset time threshold as the initial timing moment, restarting timing, generating the time information, and continuously circulating until the storage space of the solid state disk is full.
When the file data of the user system is stored, the file data is stored to the solid state disk, the reading and writing speed is accelerated, when the data in the solid state disk is transferred to the self-use disk and the standby disk, the speed is accelerated correspondingly, and the solid state disk is used as a cache disk, so that the effect of accelerating the storage speed is achieved.
Furthermore, every time the time information reaches the preset time threshold, all file data in the solid state disk need to be saved into the self-use disk and the standby disk, which increases the waste of a lot of unnecessary storage bandwidth, because in order to improve the storage speed, when the time information reaches the preset time threshold for the first time, all current file data are recorded; when one file data is stored, the storage time of each file data is recorded together, when the time information reaches a preset time threshold value each time, only the file data of which the storage time is within the current time period is obtained, and all the file data within the current time period are stored in a self-use disk and a standby disk, so that the storage speed is improved.
In a possible implementation manner of the embodiment of the present application, in step S104, storing the file data in the self-use disk, and simultaneously storing the file data in the corresponding standby disk includes:
compressing the file data and storing the compressed file data in the self-use disk and the standby disk.
Specifically, when the file data is stored to the self-use disk and the spare disk from the computer system of the user, the file data is firstly compressed and then stored in the self-use disk and the spare disk, and compared with direct storage, the mode of compressing and then storing saves the disk capacity in the self-use disk and the spare disk, so that the service lives of the self-use disk and the spare disk are simply prolonged.
The computer stores the same character strings in binary information of the file data after marking the same character strings with special characters, so that the storage positions of the same character strings are reduced, and the file data is compressed.
A possible implementation manner of the embodiment of the present application further includes, after step S104:
step Sa1 (not shown) acquires job information corresponding to each employee.
Step Sa2 (not shown in the figure) determines, according to each position information, authority information corresponding to each position information, where the authority information includes a manageable directory and available operations.
Step Sa3 (not shown in the figure), according to the manageable directory, controls the equipment at each employee end to display the directory of the corresponding self-service disc.
Step Sa4 (not shown in the figure), according to the available operation, sets the operation authority of the device of each employee side to the directory.
Specifically, the document data saved by the enterprise mostly comes from confidential or non-confidential documents generated in the actual life process of each employee of the enterprise, such as financial statements, invoices, contracts, technical documents, customer information, and the like, and these document data are not limited to be stored by the enterprise management layer, but also need to be saved and uploaded by other employees of the enterprise.
Therefore, the self-use disk is shared to the employee end according to the needs of the enterprise, and the sharing mode may be an smb (server Message block) mode, may be set by an iscsi (internet Small Computer System) protocol, or may be shared by an NFS (Network File System). After the disk is shared to the employee end, the employee can see the shared disk on the computer, and then the operation of reading the file data is performed through the disk.
The authority refers to the operation limit of the employee on the file under the self-service disk directory, including the manageable directory and the available operation; the manageable directory representation user can only check files in the manageable directory and can only read file data and other operations in the manageable directory; the available operations may characterize only operations that the employee may use. For example: the highest management layer of the company can perform operations of adding (uploading/saving), deleting (deleting), changing (modifying), reading (reading) and the like on all directories in the self-service disk and all files under all directories; the basic level employee can only read and upload files in one of the folders in the directory.
The corresponding authorities are respectively set for the employees of different positions and different departments, so that the risk of secret leakage of confidential documents can be reduced, the probability of mistakenly deleting the confidential documents by the employees can also be reduced, and the function of protecting enterprise documents is achieved.
Specifically, the position information is each position divided by a department and a management level in the enterprise, and is determined and input by the enterprise; for example, the following steps are carried out: the enterprise comprises a administration department, a technical department, a manpower department, a market department, a financial department and the like, wherein all levels of supervisors and basic employees are also divided in the administration department, and the position information comprises all the departments and the division of the positions under all the departments.
When dividing the authority for the position information, firstly determining the directory authority according to the department in the position information, namely: the file directory in the self-use disc is divided, directory combinations corresponding to all departments are divided, the departments correspond to the directory combinations one by one, the directory combination corresponding to the department in the self-use disc is used as a manageable directory of the department, and the directory authority corresponding to the department is determined.
For example, the following steps are carried out: the enterprise comprises six departments of administration, technology, manpower, market, finance and management, the directory of the self-service disk comprises 8 folders of administration 1, administration 2, technology 1, technology 2, technology 3, manpower 1, market 1 and finance 1, and the directory combination corresponding to the administration department is administration 1 and administration 2; the directory combination corresponding to the technical department is technology 1, technology 2 and technology 3; the corresponding catalog combination of the manpower department is manpower 1; the catalog combination corresponding to the market department is market 1; the corresponding directory combination of the financial department is finance 1; the directory combination corresponding to the management layer is all folders consisting of administration 1, administration 2, technology 1, technology 2, technology 3, manpower 1, market 1 and finance 1; all employees in the administrative department can only see the folders of the administration 1 and the administration 2 at the employee end, other folders are hidden at the employee end of the administrative department, and the employees in the administrative department can only perform corresponding operations on the folders of the administration 1 and the administration 2.
And after determining the manageable directories of each department, determining the usable operation corresponding to each employee as the operation authority according to the position distribution under the department.
The file operation under the self-service disk directory comprises four operations of adding, deleting, reading and changing, the operation authority is determined according to the position grade under the department, and the mode of determining the operation authority can be respectively determining the operation according to the grade, for example, four operations of opening the highest grade of the department, three operations of opening the second grade, two operations of opening the third grade and one operation of opening the fourth grade; the usable operation of all managers under the department can also comprise four operations of adding, deleting, reading and modifying, and the usable operation of all base-level employees under the department comprises two operations of adding and reading.
After determining the directory authority and the operation authority, the authority setting for each employee is completed, for example: if the employee A is a manager of an administrative department and the employee B is a basic employee of a market department, the employee A can perform addition, deletion, reading and modification operations on all files under the two folder directories of the administrative 1 and the administrative 2; employee B can upload and download files from the market 1 folder directory. Therefore, the employee only limits the operation of the document of the corresponding department, the possibility that the document of other departments is falsified or the confidential document is divulged is reduced, the operation authority of the base-level employee is limited, and the probability that the employee wrongly changes and deletes the original document is reduced.
A possible implementation manner of the embodiment of the present application further includes, after step S104:
step Sb1 (not shown), source information of each file data is acquired.
Step Sb2 (not shown in the figure), determines the security level of all file data based on each source information.
Step Sb3 (not shown in the figure) determines abnormal file data from all the file data and their security levels.
In step Sb4 (not shown), when the virus attack signal is acquired, the abnormal file data and the security level corresponding to the abnormal file data are fed back to the electronic device corresponding to the administrator of the storage server.
The abnormal file data is data with low safety level.
Specifically, most of the file data stored by the employee terminal comes from webpage downloading, storage medium transmission, application software downloading and the like; the virus is originally derived from files downloaded from web pages, if the virus files are downloaded in the web pages carelessly by employees, the possibility of damaging other files is increased, if the employees are not aware of the fact, the virus files are stored in the directories of the self-use disks, the virus files are hidden in the self-use disks and the standby disks, although the Lesog virus is difficult to damage the files under the system of the storage server, after the standby disks are used for recovering data, the virus files exist in the system of an enterprise terminal, the files are damaged again, secondary damage is caused to the enterprise, and therefore, after the virus attacks, the virus files need to be thoroughly cleaned and killed, so that the damage to the enterprise is reduced.
The security level represents the security degree of the file, and comprises a first level, a second level and a third level; the security level corresponding to the first level is the highest, and the security level corresponding to the third level is the lowest. The abnormal file data is file data corresponding to the file with the security level of three levels.
When a file is stored in a self-service disk, a storage server firstly obtains a file source of the file, wherein the file source refers to a downloading source of the file, and after the downloading source is determined, the security level of the file is determined according to the downloading source.
When the file is stored to the local from a webpage at first, and when the file is cached to an internal memory, a computer of an employee side accesses a link address of the file, monitors a data stream when the file is stored, and marks the link address in the corresponding file; when the file is saved in the self-service disk, the storage server acquires the link address of the file to serve as the file source of the file.
When a file source is obtained, the security degree of the file is judged by judging the file source, and when the file comes from a website with low security level, the file is marked to be in three levels; when the file is from the official website, marking the file as secondary; when the file originates from a company internal website, marking the file as a first level; after the marking, if the employee propagates the marked file through the network or through third-party software (such as QQ), the original file download source, i.e., the link mark retained during the website download, will be retained. After the security level of the file is marked, the file is stored in the self-use disc and the standby disc.
The virus attack signal is a signal sent by a virus when the virus attacks a computer system where a manager is located, and the virus attack signal can be obtained by the storage server when the manager enters the storage server for data recovery after the virus invasion. When the Lesso virus or other viruses are invaded, the storage server calls the pre-stored IP address of the computer of the management layer, firstly, the file with low security level, namely the file marked as the third level, is fed back to the computer of the manager through the IP address, and the file is displayed in the computer of the manager to prompt that the current file of the management layer possibly contains the viruses, so that the unsafe file is checked, the virus file is searched for to carry out the checking and killing operation, and the secondary influence of the viruses on enterprises is reduced.
In a possible implementation manner of the embodiment of the present application, in step Sb4, when a virus attack signal is obtained, feeding back the abnormal file data and the security level corresponding to the abnormal file data to the electronic device corresponding to the administrator of the storage server includes:
in step Sb41 (not shown), when the virus attack signal is acquired, the current time is acquired.
Step Sb42 (not shown in the figure) determines the period to be checked from the current time.
Step Sb43 (not shown), acquires all the abnormal file data in the period to be checked.
Step Sb44 (not shown), feeds back all the abnormal file data and the security level corresponding to the abnormal file data in the waiting period to the electronic device corresponding to the administrator of the storage server.
The period to be checked is a time period corresponding to a preset date range before the current time.
Specifically, the latent period of the virus is often short, for example, the occurrence of the leso virus is often free from any sign, and after the computer is infected with the leso virus, the attack is often completed within one minute or even shorter time, so that when data saved by an enterprise is killed after infection, the file data in the past for too long time does not need to be killed, for example, file data one year ago or file data half year ago, and the possibility of the virus existence is very low. If all files are checked one by one, the time is greatly consumed, and the files with higher risk and closer dates are not screened preferentially in the checking process.
Therefore, in order to improve the efficiency of virus investigation, when a virus attack signal is acquired, the moment of acquiring the virus attack is taken as the current moment; and determining a time period of the date in the abnormal file data close to the virus attack date according to the virus attack time, namely determining a period to be checked, determining all abnormal file data in the period to be checked, and feeding back.
When the period to be checked is determined, a date range is preset in the storage server, and according to the date range, a period of time before the current time is determined as the period to be checked by taking the current time as a starting point and the date range as a time period. For example, the current time is 8 months, 4 days, and 10 in 2001: 30, if the preset date range is 2 months, the waiting period is 6 months and 4 days in 2001 and 10: 30-2001, 8-month, 4-day, 10: 30.
after the period to be checked is determined, screening out file data in the period to be checked from all abnormal file data, and specifically, generating a storage moment when each file data is stored in a storage server; each file data corresponds to a storage moment, all file data in the period to be checked can be determined according to the period to be checked and the storage moments of the file data, all abnormal file data in the period to be checked are screened out from all the file data, all the abnormal file data in the period to be checked are fed back to the electronic equipment of a storage server manager, the abnormal file data in the period to be checked are fed back firstly, checking of files with high safety levels is reduced, and virus file checking efficiency is improved.
Further, if all abnormal file data in the period to be checked do not contain viruses after checking the abnormal file data in the period to be checked and the safety is reliable, other file data in the period to be checked are fed back, and the other file data refer to non-abnormal file data in all the file data. And if all the file data in the period to be checked do not contain the virus files, feeding the file data in other dates back to the electronic equipment of the manager for displaying and killing the virus files.
Further, in order to facilitate confirmation of the file data, each file data may be sorted. Specifically, each file data corresponds to a storage time, and each file data is sorted according to a preset arrangement rule based on the storage time and the current time corresponding to each file data; the preset arrangement rule is a rule that the storage time is close to the current time and the storage time is far from the current time, and the preset arrangement rule is arranged in sequence. For example, the storage time of the file a is 1 month, 5 days and 10:00, the storage time of the file b is 1 month, 6 days and 15:00, and the storage time of the file c is 1 month, 5 days and 20: 00; the current time is 1 month, 6 days, 17: 00; then the file data is sorted as follows: file b, file c, file a.
And the file data is sorted according to the stored sequence and then uploaded, so that virus searching and killing operations are facilitated, and the efficiency is improved.
A possible implementation manner of the embodiment of the present application further includes, after step S104:
acquiring all file data stored in a standby disc; and uploading the file data to a cloud server.
In particular, cloud storage serves as a virtualized, easily scalable storage resource pool. Cloud storage is a storage system maintained by a third party and used for realizing remote storage of data instead of storing the data into a local storage device. After the enterprise file is stored in the storage server, if storage equipment of the storage server is abnormal, the data are also lost, so that after the enterprise file is stored in the storage server, the data in the storage server are copied to the cloud server at preset copying time intervals, a layer of protection on the enterprise file data is additionally added, and the safety of the file data is improved.
The foregoing embodiment introduces a method for enterprise file storage management from the perspective of method flow, and the following embodiment introduces an apparatus for enterprise file storage management from the perspective of virtual modules or virtual units, and refer to fig. 2, which refers to the following embodiment in detail.
The enterprise file storage management device 100 may specifically include: a first obtaining module 1001, a disk dividing module 1002, a second obtaining module 1003, and a file data storage module 1004, wherein:
a first obtaining module 1001, configured to obtain disk information of a storage server and disk splitting information input by a user;
the disk dividing module 1002 is configured to divide the disk information of the storage server into self-use disk information and spare disk information according to the disk information and the disk dividing information;
a second obtaining module 1003, configured to obtain IP address information of at least one employee-side electronic device, and mount the disk information to each electronic device according to the IP address information;
the file data storage module 1004 is configured to obtain file data to be stored in the disk of the user from the employee-side electronic device, store the file data in the disk of the user, and store the file data in the spare disk at the same time.
Specifically, the disk dividing module 1002 divides the disk of the storage server into a self-use disk and a spare disk according to the disk information of the storage server acquired by the first acquiring module 1001 and the disk dividing information input by the user, mounts the self-use disk to the electronic device at the employee end of the enterprise by the second acquiring module 1003, and after the mounting, the electronic equipment end at the employee end is provided with a condition for viewing the information data in the disk, and after mounting, when the file data is saved in the employee electronic device into the user disk by the file data storage module 1004, storing the file data into a spare disk, storing the data in the spare disk and the self-use disk in a system of a storage server, when the file data is invaded by the Lesovirus, the data in the standby disk is difficult to be invaded by the Lesovirus, the possibility of file data loss of an enterprise is reduced, and the security of the file data of the enterprise is further improved.
In a possible implementation manner of the embodiment of the present application, when the file data storage module 1004 stores the file data in a self-use disk and stores the file data in a standby disk, the file data storage module is specifically configured to:
pre-storing file data into a preset solid state disk;
acquiring initial timing time;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value or not, if so, acquiring all file data in the solid state disk, and then storing all the file data in a self-use disk and a standby disk;
taking the moment when the time information is equal to the preset time threshold as the next timing moment, and resetting the time information to zero;
and circularly executing the steps after the time is counted from the initial timing time by taking the next timing time as the initial timing time.
In a possible implementation manner of the embodiment of the present application, when the file data storage module 1004 stores the file data in a self-use disk and stores the file data in a standby disk, the file data storage module is specifically configured to:
compressing the file data and storing the compressed file data in a self-use disc and a standby disc.
In a possible implementation manner of the embodiment of the present application, the apparatus 100 further includes:
the system comprises a position acquisition module, a position acquisition module and a position information acquisition module, wherein the position acquisition module is used for acquiring position information corresponding to each employee;
the authority determining module is used for determining authority information corresponding to each position information according to each position information, and the authority information comprises a manageable directory and available operation;
the authority setting module is used for controlling each employee terminal electronic device to display the corresponding catalogue of the self-service disc according to the manageable catalogue;
and the permission setting module is also used for setting the operation permission of each employee-side electronic device on the directory according to the available operation.
In a possible implementation manner of the embodiment of the present application, the apparatus 100 further includes:
the source acquisition module is used for acquiring source information of each file data;
the security level determining module is used for determining the security levels of all file data according to each source information;
the abnormal file determining module is used for determining abnormal file data according to all file data and the security levels thereof;
the feedback module is used for feeding back the abnormal file data and the corresponding security level to the electronic equipment corresponding to the manager of the storage server when the virus attack signal is acquired;
the abnormal file data is data with low security level.
In a possible implementation manner of the embodiment of the present application, when the feedback module feeds back the abnormal file data and the security level corresponding to the abnormal file data to the electronic device corresponding to the administrator of the storage server when the virus attack signal is obtained, the feedback module is specifically configured to:
when a virus attack signal is obtained, obtaining the current moment;
determining a period to be checked according to the current moment;
acquiring all abnormal file data in a period to be checked;
all abnormal file data in the period to be checked and the security level corresponding to the abnormal file data are fed back to the electronic equipment corresponding to the manager of the storage server;
the period to be checked is a time period corresponding to a preset date range before the current time.
In a possible implementation method of the embodiment of the present application, the apparatus 100 further includes:
the third acquisition module is used for acquiring file data stored in the standby disk;
and the backup uploading module is used for uploading the file data to the cloud server.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiment of the present application also introduces an electronic device from the perspective of a physical apparatus, as shown in fig. 3, an electronic device 1100 shown in fig. 3 includes: a processor 1101 and a memory 1103. The processor 1101 is coupled to the memory 1103, such as by a bus 1102. Optionally, the electronic device 1100 may also include a transceiver 1104. It should be noted that the transceiver 1104 is not limited to one in practical applications, and the structure of the electronic device 1100 is not limited to the embodiment of the present application.
The Processor 1101 may be a CPU (Central Processing Unit), a general purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 1101 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Bus 1102 may include a path that transfers information between the above components. The bus 1102 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 1102 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The Memory 1103 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 1103 is used for storing application program codes for executing the present application, and the execution is controlled by the processor 1101. The processor 1101 is configured to execute application program code stored in the memory 1103 to implement the content shown in the foregoing method embodiments.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (10)

1. An enterprise file storage management method is characterized by comprising the following steps:
acquiring disk information of a storage server and disk splitting information input by a user;
dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
acquiring IP address information of at least one employee-side electronic device, and respectively mounting the self-service disk information into each electronic device according to the IP address information;
and acquiring file data to be stored in a self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk, and simultaneously storing the file data in the standby disk.
2. The method of claim 1, wherein saving the file data to a spare disk simultaneously with saving the file data to the spare disk comprises:
pre-storing the file data into a preset solid state disk;
acquiring initial timing time;
starting timing from the initial timing moment to generate time information;
judging whether the time information is equal to a preset time threshold value or not, if so, acquiring all file data in the solid state disk, and then storing all the file data in the self-use disk and the standby disk;
taking the moment when the time information is equal to a preset time threshold value as the next timing moment, and resetting the time information to be zero;
and taking the next timing time as the initial timing time to circularly execute the steps after the timing is started from the initial timing time.
3. The method of claim 1, wherein saving the file data to a spare disk simultaneously with saving the file data to the spare disk comprises:
and compressing the file data and storing the compressed file data into the self-use disk and the standby disk.
4. The method of claim 1, wherein saving the file data to a spare disk simultaneously with saving the file data to the spare disk, further comprises:
acquiring position information corresponding to each employee respectively;
determining authority information corresponding to each position information according to each position information, wherein the authority information comprises a manageable directory and available operation;
controlling each employee-side electronic device to display the corresponding directory of the self-service disk according to the manageable directory;
and setting the operation authority of each employee-side electronic device on the catalog according to the available operation.
5. The method of claim 1, wherein saving the file data to a spare disk simultaneously with saving the file data to the spare disk, further comprises:
acquiring source information of each file data;
determining the security level of all the file data according to each source information;
determining abnormal file data according to all the file data and the security levels thereof;
when a virus attack signal is acquired, the abnormal file data and the corresponding security level are fed back to the electronic equipment corresponding to the manager of the storage server;
and the abnormal file data is data with low safety level.
6. The method according to claim 5, wherein when the virus attack signal is obtained, feeding back the abnormal file data and the security level corresponding to the abnormal file data to an electronic device corresponding to a manager of a storage server comprises:
when a virus attack signal is obtained, obtaining the current moment;
determining a period to be checked according to the current moment;
acquiring all abnormal file data in the period to be checked;
all abnormal file data in the period to be checked and the security level corresponding to the abnormal file data are fed back to the electronic equipment corresponding to a manager of the storage server;
and the period to be checked is a time period corresponding to a preset date range before the current time.
7. The method of claim 1, wherein saving the file data to a spare disk simultaneously with saving the file data to the spare disk, further comprises:
acquiring file data stored in a standby disc;
and uploading the file data to a cloud server.
8. An enterprise file storage management apparatus, comprising:
the first acquisition module is used for acquiring the disk information of the storage server and the disk splitting information input by a user;
the disk dividing module is used for dividing the disk information of the storage server into self-use disk information and standby disk information according to the disk information and the disk dividing information;
the second acquisition module is used for acquiring the IP address information of at least one employee-side electronic device and respectively mounting the self-service disk information into each electronic device according to the IP address information;
and the file data storage module is used for acquiring file data to be stored in a self-service disk from the employee-side electronic equipment, storing the file data in the self-service disk and storing the file data in the standby disk at the same time.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor;
a memory;
at least one application, wherein the at least one application is stored in the memory and configured to be executed by the at least one processor, the at least one application configured to: executing the enterprise file storage management method according to any one of claims 1 to 7.
10. A computer-readable storage medium having stored thereon a computer program, wherein the computer program, when executed on a computer, causes the computer to perform the enterprise file storage management method of any one of claims 1-7.
CN202210272777.8A 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium Active CN114594916B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210272777.8A CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210272777.8A CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114594916A true CN114594916A (en) 2022-06-07
CN114594916B CN114594916B (en) 2023-08-18

Family

ID=81810987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210272777.8A Active CN114594916B (en) 2022-03-19 2022-03-19 Enterprise file storage management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114594916B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707440A (en) * 2004-12-21 2005-12-14 西安三茗科技有限责任公司 Data backup recovery and authority control method for hard disk linux document system
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN103019890A (en) * 2012-12-24 2013-04-03 清华大学 Block-level disk data protection system and method thereof
CN103761478A (en) * 2014-01-07 2014-04-30 北京奇虎科技有限公司 Judging method and device of malicious files
WO2016180049A1 (en) * 2015-05-14 2016-11-17 中兴通讯股份有限公司 Storage management method and distributed file system
CN111538461A (en) * 2020-04-21 2020-08-14 招商局金融科技有限公司 Data reading and writing method and device based on solid state disk cache and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707440A (en) * 2004-12-21 2005-12-14 西安三茗科技有限责任公司 Data backup recovery and authority control method for hard disk linux document system
CN101986651A (en) * 2010-08-26 2011-03-16 上海网众信息技术有限公司 Remote storage method, remote storage system and client
CN103019890A (en) * 2012-12-24 2013-04-03 清华大学 Block-level disk data protection system and method thereof
CN103761478A (en) * 2014-01-07 2014-04-30 北京奇虎科技有限公司 Judging method and device of malicious files
WO2016180049A1 (en) * 2015-05-14 2016-11-17 中兴通讯股份有限公司 Storage management method and distributed file system
CN111538461A (en) * 2020-04-21 2020-08-14 招商局金融科技有限公司 Data reading and writing method and device based on solid state disk cache and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵妍;: "企业数据备份与容灾问题的探讨", 电子世界, no. 10, pages 93 *

Also Published As

Publication number Publication date
CN114594916B (en) 2023-08-18

Similar Documents

Publication Publication Date Title
US6880051B2 (en) Method, system, and program for maintaining backup copies of files in a backup storage device
US9892276B2 (en) Verifiable data destruction in a database
US9165155B2 (en) Protecting the integrity and privacy of data with storage leases
US7383407B1 (en) Synchronous replication for system and data security
US9165002B1 (en) Inexpensive deletion in a data storage system
Kent et al. Guide to integrating forensic techniques into incident
US7162593B2 (en) Assuring genuineness of data stored on a storage device
US7523149B1 (en) System and method for continuous protection of working set data using a local independent staging device
US20060294589A1 (en) Method/system to speed up antivirus scans using a journal file system
US10521423B2 (en) Apparatus and methods for scanning data in a cloud storage service
US7487219B1 (en) Virtual storage device from multiple online accounts
US11042507B2 (en) System and method of deletion of files and counteracting their restoration
WO2016148738A1 (en) File management
US10547633B1 (en) Systems and methods for mapping services utilized by network domains
US7519610B2 (en) Method and apparatus for efficiently storing audit event data having diverse characteristics using tiered tables
CN108139868A (en) For the system and method for image segment frequently used from cache supply
Kent et al. Sp 800-86. guide to integrating forensic techniques into incident response
CN114594916A (en) Enterprise file storage management method and device, electronic equipment and storage medium
EP3674876B1 (en) System and method of deletion of files and counteracting their restoration
Grance et al. Guide to computer and network data analysis: Applying forensic techniques to incident response
US8176105B2 (en) Automated file relocation
CN114328373A (en) Method, electronic device and computer program product for managing a file system
Faria et al. Backup Storage Block Level Deduplication with DDUMBFS and BACULA
JP2006195992A (en) File usage storage method and computer-readable storage medium
US20230306129A1 (en) Sensitive data discovery for databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant