Data storage method and device, electronic equipment and computer readable medium
A data storage and data backup technology, applied in the Internet field, can solve problems such as information privacy leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0049] S302. According to the pre-established screening rules, select one of the distributed cloud data centers from multiple optional distributed cloud data centers as the target node, and the screening rules are: judging whether there is a distributed cloud data center with free storage space cloud data center.
[0050] In this embodiment, the screening rules may be based on the principle of geographical proximity and the principle of maximizing available storage space, that is, the greater the remaining storage space, the greater the possibility that the corresponding distributed cloud data center will be selected. That is, the screening rule is: judging whether there is a distributed cloud data center with free storage space. The specific judgment principle can be judged by the difference between the standard storage space and the used storage space. During specific implementation, it can be sorted according to the size of free storage space, and the distributed data cent...
example
[0069] 2.1 Suppose p=3, q=11 (p, q are both prime numbers), then N=pq=33;
[0070] 2.2r=Φ(n)=(p-1)(q-1)=(3-1)(11-1)=20;
[0071] 2.3 According to gcd(e,Φ(n))=1, that is, gcd(e,20)=1, let e=3, then d=7.
[0072] At this point, the public key and private key have been determined. The public key is (N,e)=(33,3), and the secret key is (N,d)=(33,7).
[0073] S403. The selected edge data center is used as a source node, and the selected distributed data center is used as a target node, so that the encrypted data to be backed up is backed up from the source node to the target node.
[0074] Further, in this embodiment, when backing up in step S402, it also includes: the encrypted data to be backed up is divided into several data packets, and a corresponding unique characteristic value is generated according to each of the data packets, and the several Packets are stored on different destination nodes.
[0075] Optionally, in this embodiment, multiple target nodes are used as a bl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com