计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240500045-8.doi: 10.11896/jsjkx.240500045
王昀1,2, 赵剑明2, 郭毅峰2, 周欢欢2, 周武爱2, 张皖哲2, 冯建华1
WANG Yun1,2, ZHAO Jianming2, GUO Yifeng2, ZHOU Huanhuan2, ZHOU Wuai2, ZHANG Wanzhe2, FENG Jianhua1
摘要: 随着政府数字化转型的持续深入,数字政府建设迎来了一轮新的建设高潮。但也带来了很多挑战和问题,尤其是在数据库运维方面,如数据库数量多、种类多,数据安全标准建设不足,网络攻击事件频发,运维成本高,性能优化难等。为此,以自动化技术与安全优化为基础,提出了一种新的策略框架,并将相关理论进行实证研究。该框架结合了自动化、云计算、人工智能等技术,提供了一种综合解决方案,包括自动化巡检和监控、自动化调优、数据备份和恢复、高可用管理、故障自动修复、安全优化管理、性能容量管理、SQL审核管理等功能。此外,在甘肃和黑龙江省数字政府项目中进行实证研究,证明了该框架能够有效提升运维效率,积累了宝贵的数字政府数据库运维经验。
中图分类号:
[1]WANG Q,SHENG Y.Establishment of enterprise IT service management system based on ITIL practice [J].Scientific Research,2016(6):283. [2]GU J,WANG Z.Evaluation and practice of provincial digitalgovernment construction index in China [J].Shanghai Economy,2023,37(3):14-15 [3]CUI X F,FAN H Q.Outlook on the development trend of China’s digital government construction in the new era [J].Digital Economy,2023,4(1):28-100. [4]MA J,ZHOU J,LI Z W,et al.Research on operation and maintenance mode of information system in cloud computing environment [J] Power Information and Communication Technology,2015,13(8):140-144. [5]FENG D G,ZHANG M,LI H.Big Data security and privacyprotection [J].Chinese Journal of Computer,2014,37(1):12-246. [6]LI Z S.Security threat analysis of cloud computing [J].Communications Technology,2012,29(4):132-280. [7]LI H,SUN W H,LI F H,et al.Review on data security and privacy protection technology of public Cloud Storage services [J].Journal of Computer Research and Development,2014,7(4):3-68. [8]WEST D.Digital Government:Technology and Public DomainPerformance[M].Science Press,2011. [9]XU Y J,HU Y,SHANGGUAN X L.Overview of data security standardization in China [J].China Information Security,2019,9(3):1-25. [10]WEI S Y.The responsibility of network operators for the security management of third-party applications from the Facebook data breach [J].Cyberspace Security,2018,4(3):1-12. [11]GUO ZN,MENG F R.Research on performance optimization of relational Database [J].Computer Engineering and Design,2006,27(23):4-32. [12]WU Z Q,GUO J,WEI C Q,et al.A database operation and maintenance method and its device:CN2021112 54912.8[P].CN211 1254912.8[2023-08-26]. [13]AN J P.Solution of Oracle Database Optimization Design and automated operation and maintenance [J].Electronic World,2018,2(17):17-112. [14]WANG F,ZHANG X J.Design of database security policy based on Virtual User Management [J].Network Security Technology and Application,2012,5(7):235-438. [15]HUANG L S,ZHANG F,ZHANG X F,et al.Heterogeneousdatabase security synchronization system based on network gate [J].Journal of Dali University,2022,7(12):25-30. [16]WANG Z L.How to optimize SQL statements to improve database efficiency [J].Consumer Electronics,2014(24):196-196. [17]LI M,TIAN H.Management and operation strategy of database in cloud computing environment [J].Information Technology,2017,21(5):56-60. [18]ZHAO G H,YANG X L.Research on Database operation and Maintenance Automation for Big Data [J].Electronic Science and Technology,2018,30(4):112-116. [19]ZHANG Q,SUN W.Performance optimization Method in Database operation and Maintenance [J].Computer Engineering,2016,42(9):23-29. [20]LIU J H,CHENG Y Q.Exploration of automatic mode of database operation and maintenance based on AI technology [J].Electronic Technology and Software Engineering,2020,38(8):7-12. |
|