CN109218317A - A kind of network social intercourse system based on cloud storage - Google Patents

A kind of network social intercourse system based on cloud storage Download PDF

Info

Publication number
CN109218317A
CN109218317A CN201811110929.4A CN201811110929A CN109218317A CN 109218317 A CN109218317 A CN 109218317A CN 201811110929 A CN201811110929 A CN 201811110929A CN 109218317 A CN109218317 A CN 109218317A
Authority
CN
China
Prior art keywords
node
network
risk assessment
module
bigger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811110929.4A
Other languages
Chinese (zh)
Inventor
肖金保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811110929.4A priority Critical patent/CN109218317A/en
Publication of CN109218317A publication Critical patent/CN109218317A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Abstract

The present invention provides a kind of network social intercourse systems based on cloud storage, including social subsystem and evaluation subsystem, the social activity subsystem is for providing a user network social intercourse service, the evaluation subsystem is for assessing network security, the social activity subsystem includes user registration module, user information sending module, cloud storage and user information receiving module, and authentication module, the user registration module is used for the registration of new user, the user information sending module and user information receiving module are connect by network with cloud storage, registration user is respectively used to send information to cloud storage and receive the information from cloud storage.The invention has the benefit that providing a kind of network social intercourse system based on cloud storage, the data storage capacities and safety of social intercourse system are improved.

Description

A kind of network social intercourse system based on cloud storage
Technical field
The present invention relates to social technical fields, and in particular to a kind of network social intercourse system based on cloud storage.
Background technique
Universal and social network sites the fast development of internet, has become people by the social network sites of representative of microblogging Pastime, interaction and the major way for obtaining information, the development of social network sites, other than having pushed social industry, also to each Enterprise is with channels more abundant.
Summary of the invention
In view of the above-mentioned problems, the present invention is intended to provide a kind of network social intercourse system based on cloud storage.
The purpose of the present invention is realized using following technical scheme:
Provide a kind of network social intercourse system based on cloud storage, including social subsystem and evaluation subsystem, the society For jiao zi system for providing a user network social intercourse service, the evaluation subsystem is described for assessing network security Social subsystem includes that user registration module, user information sending module, cloud storage and user information receiving module and identity are tested Module is demonstrate,proved, the user registration module is used for the registration of new user, and the user information sending module and user information receive mould Block is connect by network with cloud storage, is respectively used to registration user and is sent information to cloud storage and receive the letter from cloud storage Breath.
The invention has the benefit that providing a kind of network social intercourse system based on cloud storage, social intercourse system is improved Data storage capacities and safety.
Detailed description of the invention
The present invention will be further described with reference to the accompanying drawings, but the embodiment in attached drawing is not constituted to any limit of the invention System, for those of ordinary skill in the art, without creative efforts, can also obtain according to the following drawings Other attached drawings.
Fig. 1 is structural schematic diagram of the invention;
Appended drawing reference:
Social subsystem 1, evaluation subsystem 2.
Specific embodiment
The invention will be further described with the following Examples.
Referring to Fig. 1, a kind of network social intercourse system based on cloud storage of the present embodiment, including social subsystem 1 and assessment Subsystem 2, the social activity subsystem 1 are used to pacify network for providing a user network social intercourse service, the evaluation subsystem 2 It is assessed entirely, the social activity subsystem 1 includes user registration module, user information sending module, cloud storage and user information Receiving module and authentication module, the user registration module are used for the registration of new user, the user information sending module It is connect by network with cloud storage with user information receiving module, is respectively used to registration user to cloud storage and sends information and reception Information from cloud storage.
A kind of network social intercourse system based on cloud storage is present embodiments provided, the data storage energy of social intercourse system is improved Power and safety.
Preferably, the evaluation subsystem 2 includes node risk evaluation module, node importance evaluation module and network wind Dangerous evaluation module, the node risk evaluation module is for assessing the security risk of each network node, the node weight For assessing the significance level of network node, the Network Risk Assessment module is used for according to each net the property wanted evaluation module The security risk assessment result of network node assesses the security risk of network.
This preferred embodiment assesses the security risk and significance level of node, realizes net according to node difference Network security risk assessment.
Preferably, the node risk evaluation module includes the first evaluation module, the second evaluation module and comprehensive assessment mould Block, first evaluation module are used to obtain the first risk assessment value of node, and second evaluation module is for obtaining node The second risk assessment value, the comprehensive assessment module be used for according to the first risk assessment value and the second risk assessment value to node Risk is assessed;
First evaluation module is used to obtain the first risk assessment value of node, specifically:
Using the first risk assessment value of following formula calculate node:
In formula, C1Indicate the first risk assessment value of node, precondition needed for p expression attacking network node and node leak Matching degree between the information of hole, p ∈ [0,1], p is bigger, precondition needed for indicating attacking network node and node vulnerability information Between matching it is better, a indicates to take security protection measure intensity by attacking network node, and b indicates sensitivity coefficient, b ∈ [0.5, 1.5], b is bigger, indicates a to C1It influences bigger;
The a is determined in the following ways: working as a=0, security protection measure is not taken in expression, works as a=0.4, and expression, which takes, attacks A=1 is worked as in the security protection measure for hitting detection, indicates the safety measure for taking attack detecting and attack protection;
The first risk assessment value is bigger, indicates that network node is bigger by attack cost;
Assessment of this preferred embodiment by the risk assessment value of calculate node to node risk, improves node risk and comments The accuracy estimated, specifically, reflecting the probability of success of attack by the first risk assessment of calculate node value.
Preferably, second evaluation module is used to obtain the second risk assessment value of node, specifically:
Using the second risk assessment value of following formula calculate node:
In formula, C2Second risk assessment value of expression node, warning information intensity when y indicates under attack, y ∈ 1,2, 3 }, y is bigger, indicates that early warning intensity is bigger, and s indicates that stage position where attack, n indicate to attack total number of stages;
The second risk assessment value is bigger, indicates that attack is bigger to the threat of network node;
This preferred embodiment is realized node and is on the hazard the assessment of degree by the second risk assessment of calculate node value.
Preferably, the comprehensive assessment module is used for the first risk assessment value and the second risk assessment value pair according to node Node risk is assessed, specifically:
The risk assessment value of node is determined according to the first risk assessment value and the second risk assessment value:
In formula, F indicates the risk assessment value of node;The risk assessment value of the node is bigger, indicates the safety wind of node Danger is higher.
Risk assessment value of this preferred embodiment according to the first risk assessment value and the second risk assessment value calculate node, reality The comprehensive assessment of node security risk is showed, has laid a good foundation for subsequent network security evaluation.
Preferably, the node importance evaluation module is used to assess the significance level of network node, specifically:
Using the significance level assessed value of following formula calculate node:
In formula, Q indicates the significance level assessed value of node, q1Indicate the confidentiality metric of node, q2Indicate the complete of node Metric, q are spent well3Indicate the Measurement for availability value of node;q1∈ (0,1], q1It is bigger, indicate that the confidentiality requirement of node is higher, Bring security risk is bigger when being attacked, q2∈ (0,1], q2It is bigger, it is higher to indicate that the integrity of node requires, when being tampered Bring security risk is bigger, q3∈ (0,1], q3It is bigger, indicate higher to the dependence of node, bring safety when being attacked Risk is bigger;
The significance level assessed value of the node is bigger, indicates that a possibility that network node is more important, under attack is bigger;
This preferred embodiment passes through the significance level assessed value of calculate node, the significance level of node according to node difference The assessed value concentrated expression confidentiality requirement of node, integrity requires and availability, establishes for subsequent network security evaluation Basis.
Preferably, the Network Risk Assessment module is used for the security risk assessment result according to each network node to network Security risk assessed, specifically:
Calculate the risk assessment value F of each network nodei, i=1,2 ..., n, the number of n expression network node;
Calculate the significance level assessed value Q of each network nodei, i=1,2 ..., n, the number of n expression network node;
The risk assessment value of network is determined according to the risk assessment of each network node:
In formula, W indicates the risk assessment value of network;The risk assessment value of the network is bigger, indicates the safety wind of network Danger is higher.
This preferred embodiment realizes network security by the risk assessment value and significance level assessed value of each node of calculating The accurate evaluation of risk.
Through the above description of the embodiments, those skilled in the art can be understood that it should be appreciated that can To realize the embodiments described herein with hardware, software, firmware, middleware, code or its any appropriate combination.For hardware It realizes, processor can be realized in one or more the following units: specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processing Device, controller, microcontroller, microprocessor, other electronic units designed for realizing functions described herein or combinations thereof. For software implementations, some or all of embodiment process can instruct relevant hardware to complete by computer program. When realization, above procedure can be stored in computer-readable medium or as the one or more on computer-readable medium Instruction or code are transmitted.Computer-readable medium includes computer storage media and communication media, wherein communication media packet It includes convenient for from a place to any medium of another place transmission computer program.Storage medium can be computer can Any usable medium of access.Computer-readable medium can include but is not limited to RAM, ROM, EEPROM, CD-ROM or other Optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or store have instruction or data The desired program code of structure type simultaneously can be by any other medium of computer access.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected The limitation of range is protected, although explaining in detail referring to preferred embodiment to the present invention, those skilled in the art are answered Work as understanding, it can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the reality of technical solution of the present invention Matter and range.

Claims (8)

1. a kind of network social intercourse system based on cloud storage, which is characterized in that described including social subsystem and evaluation subsystem Social subsystem is for providing a user network social intercourse service, and the evaluation subsystem is for assessing network security, institute Stating social subsystem includes user registration module, user information sending module, cloud storage and user information receiving module and identity Authentication module, the user registration module are used for the registration of new user, and the user information sending module and user information receive Module is connect by network with cloud storage, is respectively used to registration user and is sent information to cloud storage and receive the letter from cloud storage Breath.
2. the network social intercourse system according to claim 1 based on cloud storage, which is characterized in that the evaluation subsystem packet Include node risk evaluation module, node importance evaluation module and Network Risk Assessment module, the node risk evaluation module It is assessed for the security risk to each network node, the node importance evaluation module is used for the important of network node Degree is assessed, and the Network Risk Assessment module is used for the security risk assessment result according to each network node to network Security risk is assessed.
3. the network social intercourse system according to claim 2 based on cloud storage, which is characterized in that the node risk assessment Module includes the first evaluation module, the second evaluation module and comprehensive assessment module, and first evaluation module is for obtaining node The first risk assessment value, second evaluation module is used to obtain the second risk assessment value of node, the comprehensive assessment mould Block is for assessing node risk according to the first risk assessment value and the second risk assessment value;
First evaluation module is used to obtain the first risk assessment value of node, specifically:
Using the first risk assessment value of following formula calculate node:
In formula, C1Indicate the first risk assessment value of node, precondition needed for p expression attacking network node and node loophole are believed Matching degree between breath, p ∈ [0,1], p is bigger, indicates needed for attacking network node between precondition and node vulnerability information Matching it is better, a indicates to take security protection measure intensity by attacking network node, and b indicates sensitivity coefficient, b ∈ [0.5,1.5], b It is bigger, indicate a to C1It influences bigger.
4. the network social intercourse system according to claim 3 based on cloud storage, which is characterized in that a is used with lower section Formula determines: working as a=0, security protection measure is not taken in expression, works as a=0.4, indicates the security protection measure for taking attack detecting, works as a= 1, indicate the safety measure for taking attack detecting and attack protection;
The first risk assessment value is bigger, indicates that network node is bigger by attack cost.
5. the network social intercourse system according to claim 4 based on cloud storage, which is characterized in that second evaluation module For obtaining the second risk assessment value of node, specifically:
Using the second risk assessment value of following formula calculate node:
In formula, C2Indicate the second risk assessment value of node, warning information intensity when y indicates under attack, y ∈ { 1,2,3 }, y is got over Greatly, indicate that early warning intensity is bigger, s indicates that stage position where attack, n indicate to attack total number of stages;
The second risk assessment value is bigger, indicates that attack is bigger to the threat of network node.
6. the network social intercourse system according to claim 5 based on cloud storage, which is characterized in that the comprehensive assessment module For being assessed according to the first risk assessment value and the second risk assessment value of node node risk, specifically:
The risk assessment value of node is determined according to the first risk assessment value and the second risk assessment value:
In formula, F indicates the risk assessment value of node;The risk assessment value of the node is bigger, indicates that the security risk of node is got over It is high.
7. the network social intercourse system according to claim 6 based on cloud storage, which is characterized in that the node importance is commented Estimate module to be used to assess the significance level of network node, specifically:
Using the significance level assessed value of following formula calculate node:
In formula, Q indicates the significance level assessed value of node, q1Indicate the confidentiality metric of node, q2Indicate the intact degree of node Metric, q3Indicate the Measurement for availability value of node;q1∈ (0,1], q1It is bigger, it indicates that the confidentiality requirement of node is higher, is attacked Bring security risk is bigger when hitting, q2∈ (0,1], q2It is bigger, it is higher to indicate that the integrity of node requires, is brought when being tampered Security risk it is bigger, q3∈ (0,1], q3It is bigger, indicate, when being attacked bring security risk higher to the dependence of node It is bigger;
The significance level assessed value of the node is bigger, indicates that a possibility that network node is more important, under attack is bigger.
8. the network social intercourse system according to claim 7 based on cloud storage, which is characterized in that the Network Risk Assessment Module is used to assess the security risk of network according to the security risk assessment result of each network node, specifically:
Calculate the risk assessment value F of each network nodei, i=1,2 ..., n, the number of n expression network node;
Calculate the significance level assessed value Q of each network nodei, i=1,2 ..., n, the number of n expression network node;
The risk assessment value of network is determined according to the risk assessment of each network node:
In formula, W indicates the risk assessment value of network;The risk assessment value of the network is bigger, indicates that the security risk of network is got over It is high.
CN201811110929.4A 2018-09-22 2018-09-22 A kind of network social intercourse system based on cloud storage Withdrawn CN109218317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811110929.4A CN109218317A (en) 2018-09-22 2018-09-22 A kind of network social intercourse system based on cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811110929.4A CN109218317A (en) 2018-09-22 2018-09-22 A kind of network social intercourse system based on cloud storage

Publications (1)

Publication Number Publication Date
CN109218317A true CN109218317A (en) 2019-01-15

Family

ID=64985169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811110929.4A Withdrawn CN109218317A (en) 2018-09-22 2018-09-22 A kind of network social intercourse system based on cloud storage

Country Status (1)

Country Link
CN (1) CN109218317A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442057A (en) * 2013-08-27 2013-12-11 玉林师范学院 Cloud storage system based on user collaboration cloud
US20140136830A1 (en) * 2012-10-02 2014-05-15 Nextbit Systems Inc. Customizing operating system based on detected carrier
US20160277374A1 (en) * 2011-10-31 2016-09-22 Reid Consulting Group System and method for securely storing and sharing information
CN108418870A (en) * 2018-02-10 2018-08-17 深圳汇创联合自动化控制有限公司 A kind of network social intercourse system based on cloud storage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277374A1 (en) * 2011-10-31 2016-09-22 Reid Consulting Group System and method for securely storing and sharing information
US20140136830A1 (en) * 2012-10-02 2014-05-15 Nextbit Systems Inc. Customizing operating system based on detected carrier
CN103442057A (en) * 2013-08-27 2013-12-11 玉林师范学院 Cloud storage system based on user collaboration cloud
CN108418870A (en) * 2018-02-10 2018-08-17 深圳汇创联合自动化控制有限公司 A kind of network social intercourse system based on cloud storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
葛海慧等: ""基于动态关联分析的网络安全风险评估方法"", 《电子与信息学报》 *

Similar Documents

Publication Publication Date Title
US11212299B2 (en) System and method for monitoring security attack chains
CN101540676B (en) Platform identifying method suitable to identify credible network connecting construction in ternary equal way
Shin et al. Conficker and beyond: a large-scale empirical study
CN105653951B (en) The system and method for checking file based on the reliability rating of digital certificate come anti-virus
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN113326514B (en) Risk assessment method and device for network assets, switch, equipment and server
CN103117897B (en) A kind of detection comprises method and the relevant apparatus of the message of cookie information
CN115277490B (en) Network target range evaluation method, system, equipment and storage medium
CN103428189A (en) Method, apparatus and system for identifying malicious network equipment
CN110084011A (en) A kind of method and device of the verifying of user's operation
CN109951345A (en) A kind of alert processing method and device
CN101795281B (en) Platform identification implementation method and system suitable for trusted connection frameworks
US10650382B2 (en) Systems and methods for detecting fraudulent use of a serial code for accessing an associated value stored on a network
CN103096321B (en) A kind of method and apparatus for detection of malicious server
CN109246114A (en) A kind of Intelligent network monitoring system
CN109218317A (en) A kind of network social intercourse system based on cloud storage
CN103369555A (en) Method and device for detecting mobile-phone virus
JP4095076B2 (en) Security management device, security management method, and security management program based on evaluation index calculation by security information exchange
Stone Natural-language processing for intrusion detection
CN109167832A (en) A kind of e-commerce system based on cloud computing
CN108282786A (en) A kind of method and apparatus for detecting DNS spoofing attacks in WLAN
CN101572705A (en) System and method for realizing bi-directional platform authentication
CN108965277B (en) DNS (Domain name System) -based infected host distribution monitoring method and system
US20180041526A1 (en) Method and apparatus for mutual-aid collusive attack detection in online voting systems
CN108881325A (en) A kind of network security risk evaluation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190115