Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240500045-8.doi: 10.11896/jsjkx.240500045

• Big Data & Data Science • Previous Articles     Next Articles

Automation and Security Strategies and Empirical Research on Operation and Maintenance of Digital Government Database

WANG Yun1,2, ZHAO Jianming2, GUO Yifeng2, ZHOU Huanhuan2, ZHOU Wuai2, ZHANG Wanzhe2, FENG Jianhua1   

  1. 1 Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China
    2 China Mobile Information System Integration Co.,Ltd.,Beijing 100032,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:WANG Yun,born in 1979,master,se-nior engineer.His main research interest is digital government.
    ZHOU Huanhuan,born in 1994,bachelor,engineer.His main research interests include database performance optimization and architecture optimization.

Abstract: As the continuous deepening of government digital transformation,the construction of digital government has ushered in a new wave of high tide.However,it also brings a lot of challenges and problems.Especially in terms of database maintenance,it brings many challenges and problems,such as large number of databases,variety of types,insufficient construction of data security standards,frequent network attacks,high operation and maintenance cost,and difficulty in performance optimization.This paper proposes a new strategy framework based on automation technology and security optimization to cope with this situation,and carries out empirical research on related theories.This framework integrates technologies such as automation,cloud computing,and artificial intelligence,providing a comprehensive solution that includes automatic inspection and monitoring,automatic tuning,data backup and recovery,high availability management,automatic error repair,security optimization management,performance capacity management,SQL audit management,etc.In addition,empirical research conducted in digital government projects in Gansu and Heilongjiang provinces proves that this kind of framework can effectively improve operation and maintenance efficiency,accumulating valuable experience in the operation and maintenance of digital government databases.

Key words: Digital government, Database operation and maintenance, Automation, Security strategy, Artificial intelligence

CLC Number: 

  • G250
[1]WANG Q,SHENG Y.Establishment of enterprise IT service management system based on ITIL practice [J].Scientific Research,2016(6):283.
[2]GU J,WANG Z.Evaluation and practice of provincial digitalgovernment construction index in China [J].Shanghai Economy,2023,37(3):14-15
[3]CUI X F,FAN H Q.Outlook on the development trend of China’s digital government construction in the new era [J].Digital Economy,2023,4(1):28-100.
[4]MA J,ZHOU J,LI Z W,et al.Research on operation and maintenance mode of information system in cloud computing environment [J] Power Information and Communication Technology,2015,13(8):140-144.
[5]FENG D G,ZHANG M,LI H.Big Data security and privacyprotection [J].Chinese Journal of Computer,2014,37(1):12-246.
[6]LI Z S.Security threat analysis of cloud computing [J].Communications Technology,2012,29(4):132-280.
[7]LI H,SUN W H,LI F H,et al.Review on data security and privacy protection technology of public Cloud Storage services [J].Journal of Computer Research and Development,2014,7(4):3-68.
[8]WEST D.Digital Government:Technology and Public DomainPerformance[M].Science Press,2011.
[9]XU Y J,HU Y,SHANGGUAN X L.Overview of data security standardization in China [J].China Information Security,2019,9(3):1-25.
[10]WEI S Y.The responsibility of network operators for the security management of third-party applications from the Facebook data breach [J].Cyberspace Security,2018,4(3):1-12.
[11]GUO ZN,MENG F R.Research on performance optimization of relational Database [J].Computer Engineering and Design,2006,27(23):4-32.
[12]WU Z Q,GUO J,WEI C Q,et al.A database operation and maintenance method and its device:CN2021112 54912.8[P].CN211 1254912.8[2023-08-26].
[13]AN J P.Solution of Oracle Database Optimization Design and automated operation and maintenance [J].Electronic World,2018,2(17):17-112.
[14]WANG F,ZHANG X J.Design of database security policy based on Virtual User Management [J].Network Security Technology and Application,2012,5(7):235-438.
[15]HUANG L S,ZHANG F,ZHANG X F,et al.Heterogeneousdatabase security synchronization system based on network gate [J].Journal of Dali University,2022,7(12):25-30.
[16]WANG Z L.How to optimize SQL statements to improve database efficiency [J].Consumer Electronics,2014(24):196-196.
[17]LI M,TIAN H.Management and operation strategy of database in cloud computing environment [J].Information Technology,2017,21(5):56-60.
[18]ZHAO G H,YANG X L.Research on Database operation and Maintenance Automation for Big Data [J].Electronic Science and Technology,2018,30(4):112-116.
[19]ZHANG Q,SUN W.Performance optimization Method in Database operation and Maintenance [J].Computer Engineering,2016,42(9):23-29.
[20]LIU J H,CHENG Y Q.Exploration of automatic mode of database operation and maintenance based on AI technology [J].Electronic Technology and Software Engineering,2020,38(8):7-12.
[1] LIANG Binghao, ZHANG Chuangang, YUAN Mingming. Large Model Driven AI Application Service Platform [J]. Computer Science, 2025, 52(6A): 240900022-4.
[2] LIU Qingyun, YOU Xiong, ZHANG Xin, ZUO Jiwei, LI Jia. Review of Path Planning Algorithms for Mobile Robots [J]. Computer Science, 2025, 52(6A): 240900074-10.
[3] SU Zhiyuan, ZHAO Lixu, HAO Zhiheng, BAI Rufeng. Suvery of Artificial Intelligence Ensuring eVTOL Flight Safety in the Context of Low-altitudeEconomy [J]. Computer Science, 2025, 52(6A): 250200050-13.
[4] YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8.
[5] TU Ji, XIAO Wendong, TU Wenji, LI Lijian. Application of Large Language Models in Medical Education:Current Situation,Challenges and Future [J]. Computer Science, 2025, 52(6A): 240400121-6.
[6] TAN Zhengyuan, ZHONG Jiaqing, CHEN Juan. AI+HPC:An Overview of Supercomputing System Software and Application Technology Development Driven by “AI+” [J]. Computer Science, 2025, 52(5): 1-10.
[7] WANG Yifei, ZHANG Shengjie, XUE Dizhan, QIAN Shengsheng. Self-supervised Backdoor Attack Defence Method Based on Poisoned Classifier [J]. Computer Science, 2025, 52(4): 336-342.
[8] WANG Yuan, HUO Peng, HAN Yi, CHEN Tun, WANG Xiang, WEN Hui. Survey on Deep Learning-based Meteorological Forecasting Models [J]. Computer Science, 2025, 52(3): 112-126.
[9] ZHANG Tao. Coherent Legal Governance of Synthetic Data in AI Training [J]. Computer Science, 2025, 52(2): 20-32.
[10] JIANG Rui, YANG Kaihui, WANG Xiaoming, LI Dapeng, XU Youyun. Attentional Interaction-based Deep Learning Model for Chinese Question Answering [J]. Computer Science, 2024, 51(6): 325-330.
[11] GUO Shangzhi, LIAO Xiaofeng, XIAN Kaiyi. Logical Regression Click Prediction Algorithm Based on Combination Structure [J]. Computer Science, 2024, 51(2): 73-78.
[12] WANG Wentong, ZHANG Zhijun, ZHANG Mingyang. Review of Key Technologies,Research Progress and Applications of Metaverse [J]. Computer Science, 2024, 51(12): 2-11.
[13] RAO Yi, YUAN Bochuan, YUAN Yubo. Recognition Method of Online Classroom Interaction Based on Learner State [J]. Computer Science, 2024, 51(11A): 231200133-9.
[14] JIN Xinhao, CHI Kaikai. Lightweight and Efficient Recognition Method for Chinese Character Click-based CAPTCHA [J]. Computer Science, 2024, 51(11A): 240100031-9.
[15] XU Jun, ZHOU Peijin, ZHANG Haijing, ZHANG Hao, XU Yuzhong. Analysis of User Evaluation Indicator for AIGC Digital Illustration Design Principles [J]. Computer Science, 2024, 51(11): 47-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!