Domov technika Netdisk

Netdisk



Definition

What is a network disk. Netdisk, also known as network hard disk and network U disk, is an online storage service based on the network. Netdisk provides users with file management functions such as file storage, sharing, access, and backup. Users can manage and edit files in the network disk through the Internet.

The essence of the network disk is that the network disk service provider allocates the hardware resources of its server to registered users. Therefore, the investment in the online disk is huge, and the free online disk generally has a relatively small capacity; in addition, in order to prevent users from abusing the resources of the online disk, the size of a single file and the size of the uploaded file are usually limited. Free web disks are usually only used to store smaller files. The paid network disk has the advantages of fast speed, good security performance, high capacity, and allows large file storage, which is suitable for users with higher requirements.

Evaluation indicators

The main evaluation indicators of the network disk:

First, the network disk must have convenient file management. It is necessary to support as many file types as possible to realize online centralized management; support breakpoint resumable upload; single file upload size is unlimited; to support online preview function, directly view file content without downloading. Have a directory structure that people are used to.

Second, the network disk must be able to achieve multi-platform data synchronization. Support WEB client, computer client, mobile client operation. Shared files can be automatically synchronized, and the latest modified content can be viewed in real time.

Third, the network disk must realize efficient collaborative sharing. When multiple people edit a document together, the document can be updated synchronously without resorting to other tools, the version can be automatically generated, and the historical version can be retrieved for restoration at any time. Access permissions to shared folders can be dynamically set based on roles. Notification of changes to the folder via e-mail.

Fourth, the network disk must realize the fast file sharing function. Can realize seamless link with other applications.

Fifth, the network disk must have flexible authority management functions. You can allocate space for sub-accounts as needed, and manage departments or teams by group. Supports detailed log query and usage records; supports accidental deletion and recovery of recycle bins.

Sixth, the network disk must have a comprehensive security mechanism. Adopt necessary encryption measures; complete data backup and disaster recovery mechanisms to ensure stable operations. Data is automatically backed up to ensure data security.

Classification

The purpose of web disks is to provide file storage and management functions. However, due to their different business and management models, web disks can be divided into the following two types.

1. A web disk that makes a profit from space usage fees

When a user uploads a file to the web disk, the system will automatically assign an account to the file and provide a download interface for the file. Users can access this interface to view or download the files; in addition, users can also encrypt their uploaded files by setting the file extraction code, and share the files with designated friends or users. In the initial stage, the system will provide users with a small-capacity network disk space. If users want to obtain a larger space capacity, they must pay a certain fee to the network disk service provider to obtain additional network disk space capacity and obtain other high Level of rights.

2. The network disk with space usage fees and advertisements for profit together

This kind of network disk model adopts the user classification method, which is divided into ordinary users and advanced users. The user first registers an account, and he will get a certain amount of storage space on the network disk, which is the right for ordinary users and advanced users. If ordinary users want to obtain larger capacity or other more functions on this basis, such as the size of the uploaded file memory, the speed of uploading and downloading resources, the length of time the resources are stored, etc., ordinary users can log in multiple times, Recommend others to register or download the client to get certain points in exchange for.... Most of my country's online disks fall into this category, such as Sina Microdisk, Baidu Cloud and other online disk service providers with a large number of users; advanced users need to pay some fees to enjoy more advanced services, but the sharing of advanced user resources is mainly limited to advanced users The set fixed members directly share, and advanced users can obtain the network disk space with the advantages of large capacity, high transmission speed, and high security. This mode is mainly concentrated in the collective use of the company.

Data security measures

In terms of data security mechanisms, in order to protect the privacy and security of user data, the following technical measures are adopted:

(1 ) Authority control:

Because the system is open, if there is no authority restriction, then all users can access the resources, which will affect the security of the data. Then you need to set up permission control, and other users or business access can only access the resources that the user confirms to share. Through user management, the identity of the user is authenticated, the key is assigned to the user, and the user's key chain is maintained.

(2) Data isolation:

The storage space created by the system exists independently and serves a single user. When controlling data access in the user space, it is based on the user Identification and corresponding authority, so as to ensure that other users' data and user information will not be accessed by unauthorized users. When various storage services store and read data, different applications have very different permissions. In order to avoid unauthorized access to data, the system will isolate data based on different applications.

(3) Data encryption:

The system uses 128bitAES encryption algorithm when encrypting user files, which can prevent other illegal users from stealing key information. When uploading files, users can encrypt file data, and when acquiring data, they only need to decrypt it automatically or manually. It is important to note that in order to maintain data security, the user's encrypted data cannot be obtained even by the system administrator. The user can independently choose the user password, user authentication identity, and can also take some other means to perform auxiliary authentication, such as UKEY, password card, and so on. According to the public key encryption standard, the user password can be upgraded to the user key, but the user will only generate the key after each successful login. If the session is ended, the key will be cleared immediately. Therefore, such user keys can only be obtained by authorized users. The system administrator assigns the user's private key, and its generation is based on the ciphertext strategy and through attribute encryption. Documents are encrypted using a key. Each document has a dedicated key. Using the CP-ABE mechanism, this key can effectively control access.

Resource Infringement

(1) The trading of online disk resources

The trading of online disk resources is presented in a variety of ways, mainly website sales, and some Individual users upload some scarce resources to their own online disk space, and obtain the opening password of the online disk by paying a certain amount of cash to obtain these resources. Some websites classify different resources according to their needs and store them in their respective web disk spaces. The prices of resources in the web disk are clearly marked on the web pages. Users can browse the web pages to select the resources they need and pay a certain amount to get the web disk. The resources in it, such as the flash news virtual source network, adopt such a marketing model. Individual users purchase genuine resources, store these resources in their personal network disks after downloading them online, and use e-commerce platforms or QQ groups to sell these resources for profit. This type of marketing model is relatively common, focusing on online courses and scarce software, which brings different losses to copyright owners.

(2) The dissemination of film and television resources

There are many categories of film and television resources in online disks, including popular TV shows, movies that have just been released, and some music MVs, among which are popular TV series and movies are the main ones, which will bring more clicks and downloads to the network disk. The video resources uploaded by users are often not shared to the online disk through legal means. For example, the very hot Miyue Chuan incident that was speculated some time ago is the user uploading the unbroadcast episode of Miyue Chuan to the online disk space for Online disk users download and watch. In order to cope with the copyright filtering of online disk service providers, some users modify the names of videos uploaded to the online disk to avoid being directly cleaned up due to overlapping names, thereby reducing the ratings of TV programs and causing economic losses to the copyright owner; in addition, it also Some users upload secretly filmed resources of recently released movies with good reputation to the online disk space, which affects the box office income of copyright owners and causes loss of box office income to copyright owners.

(3) Downsizing of music resources

The protection of music copyright is an aspect that the country has paid more attention to in recent years. The download of music resources has gradually become standardized on music websites. Some music cannot be downloaded without restrictions due to copyright restrictions. This has caused some users to download these music resources involving copyright issues to the Internet disk through legitimate means, and then use the Internet disk for illegal purposes. Dissemination, these music resources involving copyright issues are shared in the online space without the copyright owner’s permission; some users upload links to some pirated music to the online disk space for free or paid users to download, which facilitates pirated music Spread.

Copyright protection

(1) Improve the legal system and increase law enforcement

Strengthen the crackdown on piracy and increase the cost of piracy. Infringement is often fragmented and arbitrary. If a lawsuit is filed, the resultant compensation is not enough to cover the transportation, board and lodging, and attorney fees during the litigation; for those who know that the infringing or pirated works are still downloaded and used, the penalties equivalent to those of the publisher of the work shall be imposed in legislation; The rights and obligations of disk service providers, online disk content uploaders, and online disk users should not be limited to the disseminator, but should also be punished for all participants in the online disk. The "Notice on Regulating the Copyright Order of Online Disk Services" also clearly stipulates the rights and obligations of users, online disk service providers, and right holders to regulate the copyright order of online disk services.

(2) Establish a new operating mechanism for copyright protection of online disks

Copyright is the source of value of the online disk industry and the foundation of the business model. Article 2 of the "Notice on Regulating the Order of Copyright in Online Disk Services" states that "Internet disk service providers shall establish necessary management mechanisms and use effective technical measures to actively block and remove infringing works, and prevent users from illegally uploading, storing and sharing others' works. Therefore, at the technical level, it is recommended to further improve the monitoring technology to curb the emergence of online disk piracy resources from the source, strive to build a monitoring platform for national online copyright in the online disk, and establish a network disk resource monitoring system that can detect any resource upload. Automatically collect and identify resources, adopt advanced comparison and identification technology to check whether the uploaded resources are pirated or illegally uploaded, and improve the existing technology so that the review method of online disk content can achieve the effect of combating piracy.

(3 ) Strengthen the awareness of copyright protection of online disk users.

In the fight against copyright infringement of online disk resources, it is necessary to make full use of the Internet, let the law of protecting intellectual property rights be deeply rooted in the hearts of the people, and use the opportunity to spread the law to promote more citizens Easy-to-access and easy-to-violate laws. In the "Notice on Regulating the Order of Copyright of Online Disk Services", it is pointed out that online disk service providers should mark the way of notification and complaint by the right holder in an obvious place, and 24 after receiving the notification and complaint from the right holder. Remove related infringing works within hours, delete or disconnect related infringing works links. Therefore, right holders should be good at using legal weapons to protect their legitimate rights and interests after the rights of works are infringed, and for acts that regard the law as a "safe haven", We must be more vigilant. Copyright owners should consciously protect their copyrights and network communication rights.

(4) Establish a standardized online disk copyright trading platform

The online disk platform can establish a trading platform for the copyright of online disk files, so that functions that should be beneficial to the work of online disk users can play their due role. The "Notice on Regulating the Order of Online Disk Service Copyright" strengthens the role of online disk service providers The obligation is to strengthen user management, fully preserve user information, and establish infringement disposal mechanisms. The author believes that for the establishment of online disk file copyright trading platforms, online disk service providers and government departments can cooperate to improve user information and trade file copyrights. Be transparent and open, and earnestly safeguard the interests of online disk users, in order to establish a standardized online disk copyright trading platform.

Tento článek je ze sítě, nereprezentuje pozici této stanice. Uveďte prosím původ dotisku
HORNÍ