Font Size: a A A

The Design And Implementation Of Prophase Management System In Power Supply Companies

Posted on:2022-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:L M ChengFull Text:PDF
GTID:2518306524471824Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the deepening of the informatization construction and digital transformation of military enterprises,most military enterprises have formed many application systems which cover the whole business areas such as R & D design,production &manufacturing,and quality control,etc.These systems will produce a large amount of data.How to store these data effectively has become an urgent research problem.The most used method is to expand the storage capacity,which leads to significantly high cost of data storage and does not change the traditional situation of "unified storage regardless of data value and data size".Meanwhile,the military enterprise information system must also comply with the national confidentiality management requirements of classified protection,especially in terms of production,transmission,and data storage.In order to maximize the value of data storage and meet the special security requirements,the design of hierarchical storage for effective data becomes an urgent problem for military enterprises.This paper mainly focuses on the designs and realization of hierarchical storage structure of the data for military enterprises.According to the structure,the data in the intranet of military enterprises are mainly divided into structured data,semi-structured data and unstructured data.Based on the business,it is mainly separated into products,projects,R & D and design,technology,manufacturing,quality,supply chain,finance,etc.When the data produce,transfer or store,there must be strict requirements on users' confidentiality level and scope of knowledge.In order to ensure users' access to different levels of data to follow the security regulations of military enterprises,a hierarchical data storage and access model for enterprise users must be established in the internal network of military enterprises according to the data structure,business type,data ownership,user's secret level and scope of knowledge.And the hierarchical data storage and access model can also realize the early warning and analysis of data access behavior in the internal network of military enterprises which can maximize the value of enterprise storage data and provide data support for data security risk analysis ultimately.Therefore,the purpose of this paper is to design and implement a hierarchical data storage system to meet the requirements of military enterprises' confidentiality management.The content of this paper includes the following parts.First,this paper analyzes the influence of data growth on data storage of military enterprise information system,compares the advantages and disadvantages of data hierarchical storage technology at home and abroad,analyzes the difference of the current situation,and describes the significance of design infrastructure;Second,the article describes the model and framework involved in the design infrastructure which includes data object storage technology,distributed data storage,distributed real-time search engine.The third part is to research the overall design and core function modules of infrastructure,and design the non-functional infrastructure;The last part is to design and implement the main functions of the infrastructure,verify the performance requirements of the architecture for data hierarchical storage,and realize the advantages of good scalability and large-scale concurrent processing.The main idea of this paper is to design and implement the hierarchical storage infrastructure of enterprise data under the regulations of military enterprise confidentiality management.It integrates the distributed data storage,the storage space management and its control,and the distributed full-text retrieval engine,and realizes the high availability,high reliability and high performance of the data.
Keywords/Search Tags:Information Security, Data Hierarchical Storage, Security Situation Analysis, Data Access Path
PDF Full Text Request
Related items