Hybrid cloud private deployment data acquisition method, electronic equipment and storage medium
A data acquisition and hybrid cloud technology, applied in the field of communication, can solve problems such as low security and low efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] Such as figure 1 As shown, this embodiment provides a hybrid cloud privatization deployment data acquisition method for the public cloud side, including the following steps:
[0064] Step S102, detecting the type of user accessing the public cloud;
[0065] Step S104, in the case of user type configuration privatization deployment data, send a database operation request to the data proxy access layer;
[0066] Step S106, receiving the request result sent by the data proxy access layer.
[0067] In the public cloud SaaS service, for data with strong security and high confidentiality, a hybrid cloud private data solution can be used. Enterprises use public cloud services, and databases, file services, etc. are deployed on customers' intranet machines. Adopting the public cloud model can bring zero maintenance, rapid iteration, cost reduction and better after-sales service. For sensitive data and confidential data of some enterprises, through the privatized deployment d...
Embodiment 2
[0072] Such as figure 2 As shown, this embodiment provides a hybrid cloud privatization deployment data acquisition method, in addition to the technical features of the above embodiments, this embodiment further includes the following technical features:
[0073] In the case of user type configuration privatization deployment data, send the database operation request to the data proxy access layer, specifically including the following steps:
[0074] Step S202, accessing the SaaS service of the public cloud;
[0075] Step S204, requesting the data service proxy server through the key pair to obtain the authentication token;
[0076] Step S206, after obtaining the authentication token, send the database operation request with the authentication token to the data proxy access layer.
[0077] Token (authentication token) is generated under the background that the client frequently requests data from the server, and the server frequently goes to the database to query the user n...
Embodiment 3
[0080] Such as image 3 As shown, this embodiment provides a hybrid cloud privatization deployment data acquisition method, which is used on the data proxy access layer side. The data acquisition method includes the following steps:
[0081] Step S302, receiving a database operation request sent by the public cloud;
[0082] Step S304, serializing the database operation request, and converting the database operation request into a first format request parameter;
[0083] Step S306, sending the first format request parameter to the gateway;
[0084] Step S308, receiving the first format request result sent by the gateway;
[0085] Step S310, deserializing the request result in the first format to obtain the request result;
[0086] Step S312, sending the request result to the public cloud.
[0087] In the public cloud SaaS service, for data with strong security and high confidentiality, a hybrid cloud private data solution can be used. Enterprises use public cloud services,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


