CN109151051B - Data security enhancement method in cloud computing environment - Google Patents

Data security enhancement method in cloud computing environment Download PDF

Info

Publication number
CN109151051B
CN109151051B CN201811062368.5A CN201811062368A CN109151051B CN 109151051 B CN109151051 B CN 109151051B CN 201811062368 A CN201811062368 A CN 201811062368A CN 109151051 B CN109151051 B CN 109151051B
Authority
CN
China
Prior art keywords
detection
node
access
cloud computing
computing environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201811062368.5A
Other languages
Chinese (zh)
Other versions
CN109151051A (en
Inventor
胡硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Hangkong University
Original Assignee
Nanchang Hangkong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Hangkong University filed Critical Nanchang Hangkong University
Priority to CN201811062368.5A priority Critical patent/CN109151051B/en
Publication of CN109151051A publication Critical patent/CN109151051A/en
Application granted granted Critical
Publication of CN109151051B publication Critical patent/CN109151051B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for enhancing data security in a cloud computing environment, belonging to the technical field of electronic information security, which comprises the following steps: s1: detecting each node in the cloud computing environment; s2: removing and repairing a single unsafe node; s3: detecting the node combination on the basis of repaired nodes; s4: the combined unsafe node groups are removed and repaired, and the detection of the hardware and the software can be simultaneously carried out by detecting the hardware and transmitting data; by detecting a single node and detecting a detection node group, the range of a detection object can be enlarged, and the safety maintenance is enhanced; the same potential safety hazard can be avoided by storing the detection log; the single nodes are arranged in a permutation and combination mode, and the combination mode of each node can be detected.

Description

Data security enhancement method in cloud computing environment
Technical Field
The invention relates to the technical field of electronic information security, in particular to a data security enhancement method in a cloud computing environment.
Background
Cloud computing security or cloud security refers to a collection of policies, techniques and controls for protecting cloud computing data, applications and related structures, and belongs to the sub-fields of computer security, network security, or more generally, information security.
The cloud computing safety can promote the innovative development of cloud computing, and is beneficial to solving the problems of scattered investment, repeated construction, excess capacity, uneven resource integration, lack of cooperation in construction and the like.
For example, chinese patent publication No. CN108197496A provides a method for enhancing data security in a cloud computing environment, which includes: the method comprises the steps of verifying data nodes in a public cloud computing environment, judging the credibility of the data nodes, establishing a trust relationship of collected information, uploading medical data at all positions of a network through a distributed system, carrying out uniform format conversion on the data collected from all the nodes, providing a basis for the construction of an integral trust environment, and constructing a medical data platform. The invention provides a data security enhancement method in a cloud computing environment, which effectively prevents a malicious destroyer from acquiring effective information of a medical data storage system, and greatly enhances the reliability of the medical data storage system; the fault tolerance rate and the computing intensity of the system are reduced in the data recovery process. The data security enhancement method is used for detecting single nodes, but generally, data transmission is carried out on transmission between the nodes, so that security problems between the nodes are easily missed.
Disclosure of Invention
The invention aims to provide a data security enhancement method in a cloud computing environment, so as to solve the problem that the security problem between nodes is easily missed because the transmission between common nodes also has data transmission, which is proposed in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a data security enhancement method in a cloud computing environment comprises the following specific steps:
s1: detecting each node in the cloud computing environment: verifying the hardware security of a single node in a cloud computing environment, transmitting a data stream by sampling the access of the single node, and detecting the security of the sampled access transmission data stream;
if the potential safety hazard exists in the hardware of a single node or the access transmission data stream, limiting the data access and transmission of the node, and performing corresponding repair through the step S2;
if the hardware of the single node and the access transmission data stream are detected to have no potential safety hazard, carrying out safety detection in the step S3;
s2: and (3) excluding a single unsafe node and repairing: according to the detection result of the step S1, the hardware of the node with the potential safety hazard is maintained or the potential safety hazard is solved by a replacement mode, and the data transmission is limited by setting a limit level for the access transmission data stream with the potential safety hazard;
s3: and combining and detecting the nodes on the basis of repaired: combining the nodes repaired in the step S2 and the nodes detected in the step S1 without potential safety hazards freely in a combination mode to form X detection node groups, and detecting the safety of the X detection node groups one by one;
if the potential safety hazard exists in the access transmission data stream of the detection node group, limiting the data access and transmission of the detection node group, and performing corresponding repair through the step S4;
if the detection node group does not have potential safety hazard with the hardware of the detection node group and the access transmission data stream, the detection is finished;
s4: and (3) excluding the combined unsafe node group and repairing: and prohibiting the detection node group from continuing data transmission access according to the detection of potential safety hazard in accessing the transmission data stream of the detection node group in the step S3, setting the detection node group as a target detection object, setting a data access restriction level for the detection node group, and prohibiting the access mode.
Preferably, the restriction level set in steps S2 and S4 is saved in the detection log.
Preferably, the combination of the node groups detected in step S3 is a permutation and combination.
Preferably, the security risk of accessing the transmission data stream includes leakage, modification, addition and loss of the data stream.
Preferably, the detection node group comprises a serial transmission node group consisting of at least two single nodes.
Preferably, the set data access restriction level includes a hardware data access level and a software data access level.
Compared with the prior art, the invention has the beneficial effects that: the data security enhancement method in the cloud computing environment has the following advantages:
1) the hardware and the software can be detected simultaneously by detecting the hardware and transmitting data;
2) by detecting a single node and detecting a detection node group, the range of a detection object can be enlarged, and the safety maintenance is enhanced;
3) the same potential safety hazard can be avoided by storing the detection log;
4) the single nodes are arranged in a permutation and combination mode, and the combination mode of each node can be detected.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The security detection of the node comprises the following six aspects:
firstly, user privacy:
checking whether the user password is stored locally, whether encrypted or not;
checking whether sensitive privacy information such as chat records, relationship chains, bank accounts and the like are encrypted;
checking whether system files and configuration files are stored in the external equipment in a plaintext mode;
part of the information needs to be stored in the external device, and whether the information is tampered before each use needs to be judged.
II, file authority:
the directory where the program is located is checked, and the authority of the program must be that other group members are not allowed to read and write.
Thirdly, network communication:
and checking whether sensitive information is encrypted in network transmission, wherein TLS or SSL is adopted for important data.
Fourthly, explaining and protecting in runtime:
for software embedded with an interpreter, checking whether XSS and SQL injection vulnerabilities exist;
and checking whether the URL spoofing vulnerability exists or not by using a program of webiew.
Fifthly, protecting component authority:
prohibiting the internal components of the program from being called by any third-party program;
if a component for external invocation is required, it should be checked whether the caller is signed with a restriction
Sixthly, upgrading:
checking whether the integrity and the legality of the upgrade package are verified or not, and avoiding hijacking of the upgrade package.
And when the access transmission data stream of the node is detected not to conform to any one or more of the six items, the data is considered unsafe.
Referring to fig. 1, the present invention provides a technical solution: a data security enhancement method in a cloud computing environment comprises the following specific steps:
s1: detecting each node in the cloud computing environment: verifying the hardware security of a single node in a cloud computing environment, sampling the access transmission data stream of the single node, and detecting the security of the sampled access transmission data stream (many security detection methods are used in the prior art, the technology is mature, and details are not described here);
if the potential safety hazard exists in the hardware of a single node or the access transmission data stream, limiting the data access and transmission of the node, and performing corresponding repair through the step S2;
if the hardware of the single node and the access transmission data stream are detected to have no potential safety hazard, carrying out safety detection in the step S3;
s2: and (3) excluding a single unsafe node and repairing: according to the detection result of the step S1, the hardware of the node with the potential safety hazard is maintained or the potential safety hazard is solved by a replacement mode, and the data transmission is limited by setting a limit level for the access transmission data stream with the potential safety hazard;
s3: and combining and detecting the nodes on the basis of repaired: combining the nodes repaired in the step S2 and the nodes detected in the step S1 without potential safety hazards freely in a manner of combining into X detection node groups, and detecting the safety of the X detection node groups one by one (the detection method here is the same as the detection method in the step S1), where the X detection node groups are regarded as X detected cells and detect the insides thereof;
setting a total of N single nodes, and taking M single nodes out of the N single nodes, wherein the number X of the detection node groups is N (N-1) (N-2.) the.
If the potential safety hazard exists in the access transmission data stream of the detection node group, limiting the data access and transmission of the detection node group, and performing corresponding repair through the step S4;
if the detection node group does not have potential safety hazard with the hardware of the detection node group and the access transmission data stream, the detection is finished;
s4: and (3) excluding the combined unsafe node group and repairing: and prohibiting the detection node group from continuing data transmission access according to the detection of potential safety hazard in accessing the transmission data stream of the detection node group in the step S3, setting the detection node group as a target detection object, setting a data access restriction level for the detection node group, and prohibiting the access mode.
The restriction level set in steps S2 and S4 is stored in a detection log, and when security detection is performed each time, a new security detection and maintenance is performed by using a previous detection log as a detection basis, a combination manner of detection node groups in step S3 is a permutation and combination manner, a security risk of accessing a transmission data stream includes leakage, modification, increase and loss of the data stream, the detection node group includes a serial transmission node group composed of at least two single nodes (usually, a serial transmission node group composed of two single nodes is used as a main detection node group), and the set data access restriction level includes a hardware data access level and a software data access level.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A data security enhancement method in a cloud computing environment is characterized by comprising the following steps: the method for enhancing the data security in the cloud computing environment comprises the following specific steps:
s1: detecting each node in the cloud computing environment: verifying the hardware security of a single node in a cloud computing environment, transmitting a data stream by sampling the access of the single node, and detecting the security of the sampled access transmission data stream;
if the potential safety hazard exists in the hardware of a single node or the access transmission data stream, limiting the data access and transmission of the node, and performing corresponding repair through the step S2;
if the hardware of the single node and the access transmission data stream are detected to have no potential safety hazard, carrying out safety detection in the step S3;
s2: and (3) excluding a single unsafe node and repairing: according to the detection result of the step S1, the hardware of the node with the potential safety hazard is maintained or the potential safety hazard is solved by a replacement mode, and the data transmission is limited by setting a limit level for the access transmission data stream with the potential safety hazard;
s3: and combining and detecting the nodes on the basis of repaired: arranging and combining the nodes repaired in the step S2 and the nodes detected to have no potential safety hazard in the step S1 into X detection node groups, and respectively detecting the safety of the X detection node groups one by one;
if the potential safety hazard exists in the access transmission data stream of the detection node group, limiting the data access and transmission of the detection node group, and performing corresponding repair through the step S4;
if the detection node group does not have potential safety hazard with the hardware of the detection node group and the access transmission data stream, the detection is finished;
s4: and (3) excluding the combined unsafe node group and repairing: and prohibiting the detection node group from continuing data transmission access according to the detection of potential safety hazard in accessing the transmission data stream of the detection node group in the step S3, setting the detection node group as a target detection object, setting a data access restriction level for the detection node group, and prohibiting the access mode.
2. The method for enhancing data security in the cloud computing environment according to claim 1, wherein: the restriction level set in steps S2 and S4 is saved in the detection log.
3. The method for enhancing data security in the cloud computing environment according to claim 1, wherein: in step S3, the combination mode of the node groups is detected as a permutation and combination mode.
4. The method for enhancing data security in the cloud computing environment according to claim 1, wherein: the security risks of accessing the transmission data stream include leakage, modification, addition and loss of the data stream.
5. The method for enhancing data security in the cloud computing environment according to claim 1, wherein: the detection node group comprises a serial transmission node group consisting of at least two single nodes.
6. The method for enhancing data security in the cloud computing environment according to claim 1, wherein: the set data access restriction level comprises a hardware data access level and a software data access level.
CN201811062368.5A 2018-09-12 2018-09-12 Data security enhancement method in cloud computing environment Expired - Fee Related CN109151051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811062368.5A CN109151051B (en) 2018-09-12 2018-09-12 Data security enhancement method in cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811062368.5A CN109151051B (en) 2018-09-12 2018-09-12 Data security enhancement method in cloud computing environment

Publications (2)

Publication Number Publication Date
CN109151051A CN109151051A (en) 2019-01-04
CN109151051B true CN109151051B (en) 2020-12-08

Family

ID=64825018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811062368.5A Expired - Fee Related CN109151051B (en) 2018-09-12 2018-09-12 Data security enhancement method in cloud computing environment

Country Status (1)

Country Link
CN (1) CN109151051B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110855793A (en) * 2019-11-19 2020-02-28 南昌航空大学 Distributed system consensus method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431416A (en) * 2008-12-10 2009-05-13 南京邮电大学 Synergistic learning invasion detection method used for data gridding
CN101674300A (en) * 2009-09-23 2010-03-17 南京邮电大学 Trust evaluation method in computing environment without central network
CN103152436A (en) * 2013-04-01 2013-06-12 无锡南理工科技发展有限公司 P2P (peer-to-peer) internet trust cloud model computing method based on interest group
CN103901319A (en) * 2014-03-03 2014-07-02 广州供电局有限公司 Method for detecting transient voltage stability of power grid
CN106230982A (en) * 2016-09-08 2016-12-14 哈尔滨工程大学 A kind of dynamic self-adapting secure cloud storage method considering node reliability
CN106302533A (en) * 2016-09-30 2017-01-04 广州特道信息科技有限公司 Big data safety management system and method
CN106529342A (en) * 2016-11-02 2017-03-22 深圳前海生生科技有限公司 Virtual machine monitor dynamic integrity detection method based on security chip
CN107342975A (en) * 2016-12-21 2017-11-10 安徽师范大学 Trust computational methods based on domain division under insincere cloud environment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431416A (en) * 2008-12-10 2009-05-13 南京邮电大学 Synergistic learning invasion detection method used for data gridding
CN101674300A (en) * 2009-09-23 2010-03-17 南京邮电大学 Trust evaluation method in computing environment without central network
CN103152436A (en) * 2013-04-01 2013-06-12 无锡南理工科技发展有限公司 P2P (peer-to-peer) internet trust cloud model computing method based on interest group
CN103901319A (en) * 2014-03-03 2014-07-02 广州供电局有限公司 Method for detecting transient voltage stability of power grid
CN106230982A (en) * 2016-09-08 2016-12-14 哈尔滨工程大学 A kind of dynamic self-adapting secure cloud storage method considering node reliability
CN106302533A (en) * 2016-09-30 2017-01-04 广州特道信息科技有限公司 Big data safety management system and method
CN106529342A (en) * 2016-11-02 2017-03-22 深圳前海生生科技有限公司 Virtual machine monitor dynamic integrity detection method based on security chip
CN107342975A (en) * 2016-12-21 2017-11-10 安徽师范大学 Trust computational methods based on domain division under insincere cloud environment

Also Published As

Publication number Publication date
CN109151051A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN103051707A (en) Dynamic user behavior-based cloud forensics method and dynamic user behavior-based cloud forensics system
CN109462599B (en) Honeypot management system
CN105553940A (en) Safety protection method based on big data processing platform
CN102801717B (en) Login validation method and system
US20210234877A1 (en) Proactively protecting service endpoints based on deep learning of user location and access patterns
CN105430000A (en) Cloud computing security management system
CN113114647A (en) Network security risk detection method and device, electronic equipment and storage medium
CN107276986B (en) Method, device and system for protecting website through machine learning
CN114365128A (en) Method and system for data self-protection
RU2762528C1 (en) Method for processing information security events prior to transmission for analysis
CN202652255U (en) SQL injection safety protection system
CN110049028A (en) Monitor method, apparatus, computer equipment and the storage medium of domain control administrator
CN109151051B (en) Data security enhancement method in cloud computing environment
Alfarisi et al. Risk assessment in fleet management system using OCTAVE allegro
CN110099041A (en) A kind of Internet of Things means of defence and equipment, system
CN117640154A (en) Defensive strategy generation method and device, storage medium and terminal
CN116760572A (en) Cloud security simulation detection method and system
CN110611659A (en) Method, device and system for protecting service essence of power monitoring system
CN113489738B (en) Method, device, equipment and medium for processing violations of broadband account
Li et al. Research on attack mechanism of network intrusion in industrial control system
Yasmeen et al. The critical analysis of E-Commerce web application vulnerabilities
CN113076542A (en) Test management system for trusted computing in artificial intelligence
CN111859362A (en) Multi-stage identity authentication method in mobile environment and electronic device
CN111314307A (en) Security defense method of internet of things system, internet of things system and storage medium
Sun A Security Reinforcement Method for Intranet Computer Terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201208

Termination date: 20210912

CF01 Termination of patent right due to non-payment of annual fee