计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240500045-8.doi: 10.11896/jsjkx.240500045

• 大数据&数据科学 • 上一篇    下一篇

数字政府数据库运维的自动化与安全策略及实证研究

王昀1,2, 赵剑明2, 郭毅峰2, 周欢欢2, 周武爱2, 张皖哲2, 冯建华1   

  1. 1 清华大学计算机科学与技术系 北京 100084
    2 中移信息系统集成有限公司 北京 100032
  • 出版日期:2025-06-16 发布日期:2025-06-12
  • 通讯作者: 周欢欢(1547358466@qq.com)
  • 作者简介:(wangyun@cmict.chinamobile.com)

Automation and Security Strategies and Empirical Research on Operation and Maintenance of Digital Government Database

WANG Yun1,2, ZHAO Jianming2, GUO Yifeng2, ZHOU Huanhuan2, ZHOU Wuai2, ZHANG Wanzhe2, FENG Jianhua1   

  1. 1 Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China
    2 China Mobile Information System Integration Co.,Ltd.,Beijing 100032,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:WANG Yun,born in 1979,master,se-nior engineer.His main research interest is digital government.
    ZHOU Huanhuan,born in 1994,bachelor,engineer.His main research interests include database performance optimization and architecture optimization.

摘要: 随着政府数字化转型的持续深入,数字政府建设迎来了一轮新的建设高潮。但也带来了很多挑战和问题,尤其是在数据库运维方面,如数据库数量多、种类多,数据安全标准建设不足,网络攻击事件频发,运维成本高,性能优化难等。为此,以自动化技术与安全优化为基础,提出了一种新的策略框架,并将相关理论进行实证研究。该框架结合了自动化、云计算、人工智能等技术,提供了一种综合解决方案,包括自动化巡检和监控、自动化调优、数据备份和恢复、高可用管理、故障自动修复、安全优化管理、性能容量管理、SQL审核管理等功能。此外,在甘肃和黑龙江省数字政府项目中进行实证研究,证明了该框架能够有效提升运维效率,积累了宝贵的数字政府数据库运维经验。

关键词: 数字政府, 数据库运维, 自动化, 安全策略, 人工智能

Abstract: As the continuous deepening of government digital transformation,the construction of digital government has ushered in a new wave of high tide.However,it also brings a lot of challenges and problems.Especially in terms of database maintenance,it brings many challenges and problems,such as large number of databases,variety of types,insufficient construction of data security standards,frequent network attacks,high operation and maintenance cost,and difficulty in performance optimization.This paper proposes a new strategy framework based on automation technology and security optimization to cope with this situation,and carries out empirical research on related theories.This framework integrates technologies such as automation,cloud computing,and artificial intelligence,providing a comprehensive solution that includes automatic inspection and monitoring,automatic tuning,data backup and recovery,high availability management,automatic error repair,security optimization management,performance capacity management,SQL audit management,etc.In addition,empirical research conducted in digital government projects in Gansu and Heilongjiang provinces proves that this kind of framework can effectively improve operation and maintenance efficiency,accumulating valuable experience in the operation and maintenance of digital government databases.

Key words: Digital government, Database operation and maintenance, Automation, Security strategy, Artificial intelligence

中图分类号: 

  • G250
[1]WANG Q,SHENG Y.Establishment of enterprise IT service management system based on ITIL practice [J].Scientific Research,2016(6):283.
[2]GU J,WANG Z.Evaluation and practice of provincial digitalgovernment construction index in China [J].Shanghai Economy,2023,37(3):14-15
[3]CUI X F,FAN H Q.Outlook on the development trend of China’s digital government construction in the new era [J].Digital Economy,2023,4(1):28-100.
[4]MA J,ZHOU J,LI Z W,et al.Research on operation and maintenance mode of information system in cloud computing environment [J] Power Information and Communication Technology,2015,13(8):140-144.
[5]FENG D G,ZHANG M,LI H.Big Data security and privacyprotection [J].Chinese Journal of Computer,2014,37(1):12-246.
[6]LI Z S.Security threat analysis of cloud computing [J].Communications Technology,2012,29(4):132-280.
[7]LI H,SUN W H,LI F H,et al.Review on data security and privacy protection technology of public Cloud Storage services [J].Journal of Computer Research and Development,2014,7(4):3-68.
[8]WEST D.Digital Government:Technology and Public DomainPerformance[M].Science Press,2011.
[9]XU Y J,HU Y,SHANGGUAN X L.Overview of data security standardization in China [J].China Information Security,2019,9(3):1-25.
[10]WEI S Y.The responsibility of network operators for the security management of third-party applications from the Facebook data breach [J].Cyberspace Security,2018,4(3):1-12.
[11]GUO ZN,MENG F R.Research on performance optimization of relational Database [J].Computer Engineering and Design,2006,27(23):4-32.
[12]WU Z Q,GUO J,WEI C Q,et al.A database operation and maintenance method and its device:CN2021112 54912.8[P].CN211 1254912.8[2023-08-26].
[13]AN J P.Solution of Oracle Database Optimization Design and automated operation and maintenance [J].Electronic World,2018,2(17):17-112.
[14]WANG F,ZHANG X J.Design of database security policy based on Virtual User Management [J].Network Security Technology and Application,2012,5(7):235-438.
[15]HUANG L S,ZHANG F,ZHANG X F,et al.Heterogeneousdatabase security synchronization system based on network gate [J].Journal of Dali University,2022,7(12):25-30.
[16]WANG Z L.How to optimize SQL statements to improve database efficiency [J].Consumer Electronics,2014(24):196-196.
[17]LI M,TIAN H.Management and operation strategy of database in cloud computing environment [J].Information Technology,2017,21(5):56-60.
[18]ZHAO G H,YANG X L.Research on Database operation and Maintenance Automation for Big Data [J].Electronic Science and Technology,2018,30(4):112-116.
[19]ZHANG Q,SUN W.Performance optimization Method in Database operation and Maintenance [J].Computer Engineering,2016,42(9):23-29.
[20]LIU J H,CHENG Y Q.Exploration of automatic mode of database operation and maintenance based on AI technology [J].Electronic Technology and Software Engineering,2020,38(8):7-12.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!