CN109218317A - A kind of network social intercourse system based on cloud storage - Google Patents
A kind of network social intercourse system based on cloud storage Download PDFInfo
- Publication number
- CN109218317A CN109218317A CN201811110929.4A CN201811110929A CN109218317A CN 109218317 A CN109218317 A CN 109218317A CN 201811110929 A CN201811110929 A CN 201811110929A CN 109218317 A CN109218317 A CN 109218317A
- Authority
- CN
- China
- Prior art keywords
- node
- network
- risk assessment
- module
- bigger
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Abstract
The present invention provides a kind of network social intercourse systems based on cloud storage, including social subsystem and evaluation subsystem, the social activity subsystem is for providing a user network social intercourse service, the evaluation subsystem is for assessing network security, the social activity subsystem includes user registration module, user information sending module, cloud storage and user information receiving module, and authentication module, the user registration module is used for the registration of new user, the user information sending module and user information receiving module are connect by network with cloud storage, registration user is respectively used to send information to cloud storage and receive the information from cloud storage.The invention has the benefit that providing a kind of network social intercourse system based on cloud storage, the data storage capacities and safety of social intercourse system are improved.
Description
Technical field
The present invention relates to social technical fields, and in particular to a kind of network social intercourse system based on cloud storage.
Background technique
Universal and social network sites the fast development of internet, has become people by the social network sites of representative of microblogging
Pastime, interaction and the major way for obtaining information, the development of social network sites, other than having pushed social industry, also to each
Enterprise is with channels more abundant.
Summary of the invention
In view of the above-mentioned problems, the present invention is intended to provide a kind of network social intercourse system based on cloud storage.
The purpose of the present invention is realized using following technical scheme:
Provide a kind of network social intercourse system based on cloud storage, including social subsystem and evaluation subsystem, the society
For jiao zi system for providing a user network social intercourse service, the evaluation subsystem is described for assessing network security
Social subsystem includes that user registration module, user information sending module, cloud storage and user information receiving module and identity are tested
Module is demonstrate,proved, the user registration module is used for the registration of new user, and the user information sending module and user information receive mould
Block is connect by network with cloud storage, is respectively used to registration user and is sent information to cloud storage and receive the letter from cloud storage
Breath.
The invention has the benefit that providing a kind of network social intercourse system based on cloud storage, social intercourse system is improved
Data storage capacities and safety.
Detailed description of the invention
The present invention will be further described with reference to the accompanying drawings, but the embodiment in attached drawing is not constituted to any limit of the invention
System, for those of ordinary skill in the art, without creative efforts, can also obtain according to the following drawings
Other attached drawings.
Fig. 1 is structural schematic diagram of the invention;
Appended drawing reference:
Social subsystem 1, evaluation subsystem 2.
Specific embodiment
The invention will be further described with the following Examples.
Referring to Fig. 1, a kind of network social intercourse system based on cloud storage of the present embodiment, including social subsystem 1 and assessment
Subsystem 2, the social activity subsystem 1 are used to pacify network for providing a user network social intercourse service, the evaluation subsystem 2
It is assessed entirely, the social activity subsystem 1 includes user registration module, user information sending module, cloud storage and user information
Receiving module and authentication module, the user registration module are used for the registration of new user, the user information sending module
It is connect by network with cloud storage with user information receiving module, is respectively used to registration user to cloud storage and sends information and reception
Information from cloud storage.
A kind of network social intercourse system based on cloud storage is present embodiments provided, the data storage energy of social intercourse system is improved
Power and safety.
Preferably, the evaluation subsystem 2 includes node risk evaluation module, node importance evaluation module and network wind
Dangerous evaluation module, the node risk evaluation module is for assessing the security risk of each network node, the node weight
For assessing the significance level of network node, the Network Risk Assessment module is used for according to each net the property wanted evaluation module
The security risk assessment result of network node assesses the security risk of network.
This preferred embodiment assesses the security risk and significance level of node, realizes net according to node difference
Network security risk assessment.
Preferably, the node risk evaluation module includes the first evaluation module, the second evaluation module and comprehensive assessment mould
Block, first evaluation module are used to obtain the first risk assessment value of node, and second evaluation module is for obtaining node
The second risk assessment value, the comprehensive assessment module be used for according to the first risk assessment value and the second risk assessment value to node
Risk is assessed;
First evaluation module is used to obtain the first risk assessment value of node, specifically:
Using the first risk assessment value of following formula calculate node:
In formula, C1Indicate the first risk assessment value of node, precondition needed for p expression attacking network node and node leak
Matching degree between the information of hole, p ∈ [0,1], p is bigger, precondition needed for indicating attacking network node and node vulnerability information
Between matching it is better, a indicates to take security protection measure intensity by attacking network node, and b indicates sensitivity coefficient, b ∈ [0.5,
1.5], b is bigger, indicates a to C1It influences bigger;
The a is determined in the following ways: working as a=0, security protection measure is not taken in expression, works as a=0.4, and expression, which takes, attacks
A=1 is worked as in the security protection measure for hitting detection, indicates the safety measure for taking attack detecting and attack protection;
The first risk assessment value is bigger, indicates that network node is bigger by attack cost;
Assessment of this preferred embodiment by the risk assessment value of calculate node to node risk, improves node risk and comments
The accuracy estimated, specifically, reflecting the probability of success of attack by the first risk assessment of calculate node value.
Preferably, second evaluation module is used to obtain the second risk assessment value of node, specifically:
Using the second risk assessment value of following formula calculate node:
In formula, C2Second risk assessment value of expression node, warning information intensity when y indicates under attack, y ∈ 1,2,
3 }, y is bigger, indicates that early warning intensity is bigger, and s indicates that stage position where attack, n indicate to attack total number of stages;
The second risk assessment value is bigger, indicates that attack is bigger to the threat of network node;
This preferred embodiment is realized node and is on the hazard the assessment of degree by the second risk assessment of calculate node value.
Preferably, the comprehensive assessment module is used for the first risk assessment value and the second risk assessment value pair according to node
Node risk is assessed, specifically:
The risk assessment value of node is determined according to the first risk assessment value and the second risk assessment value:
In formula, F indicates the risk assessment value of node;The risk assessment value of the node is bigger, indicates the safety wind of node
Danger is higher.
Risk assessment value of this preferred embodiment according to the first risk assessment value and the second risk assessment value calculate node, reality
The comprehensive assessment of node security risk is showed, has laid a good foundation for subsequent network security evaluation.
Preferably, the node importance evaluation module is used to assess the significance level of network node, specifically:
Using the significance level assessed value of following formula calculate node:
In formula, Q indicates the significance level assessed value of node, q1Indicate the confidentiality metric of node, q2Indicate the complete of node
Metric, q are spent well3Indicate the Measurement for availability value of node;q1∈ (0,1], q1It is bigger, indicate that the confidentiality requirement of node is higher,
Bring security risk is bigger when being attacked, q2∈ (0,1], q2It is bigger, it is higher to indicate that the integrity of node requires, when being tampered
Bring security risk is bigger, q3∈ (0,1], q3It is bigger, indicate higher to the dependence of node, bring safety when being attacked
Risk is bigger;
The significance level assessed value of the node is bigger, indicates that a possibility that network node is more important, under attack is bigger;
This preferred embodiment passes through the significance level assessed value of calculate node, the significance level of node according to node difference
The assessed value concentrated expression confidentiality requirement of node, integrity requires and availability, establishes for subsequent network security evaluation
Basis.
Preferably, the Network Risk Assessment module is used for the security risk assessment result according to each network node to network
Security risk assessed, specifically:
Calculate the risk assessment value F of each network nodei, i=1,2 ..., n, the number of n expression network node;
Calculate the significance level assessed value Q of each network nodei, i=1,2 ..., n, the number of n expression network node;
The risk assessment value of network is determined according to the risk assessment of each network node:
In formula, W indicates the risk assessment value of network;The risk assessment value of the network is bigger, indicates the safety wind of network
Danger is higher.
This preferred embodiment realizes network security by the risk assessment value and significance level assessed value of each node of calculating
The accurate evaluation of risk.
Through the above description of the embodiments, those skilled in the art can be understood that it should be appreciated that can
To realize the embodiments described herein with hardware, software, firmware, middleware, code or its any appropriate combination.For hardware
It realizes, processor can be realized in one or more the following units: specific integrated circuit (ASIC), digital signal processor
(DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processing
Device, controller, microcontroller, microprocessor, other electronic units designed for realizing functions described herein or combinations thereof.
For software implementations, some or all of embodiment process can instruct relevant hardware to complete by computer program.
When realization, above procedure can be stored in computer-readable medium or as the one or more on computer-readable medium
Instruction or code are transmitted.Computer-readable medium includes computer storage media and communication media, wherein communication media packet
It includes convenient for from a place to any medium of another place transmission computer program.Storage medium can be computer can
Any usable medium of access.Computer-readable medium can include but is not limited to RAM, ROM, EEPROM, CD-ROM or other
Optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or store have instruction or data
The desired program code of structure type simultaneously can be by any other medium of computer access.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected
The limitation of range is protected, although explaining in detail referring to preferred embodiment to the present invention, those skilled in the art are answered
Work as understanding, it can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the reality of technical solution of the present invention
Matter and range.
Claims (8)
1. a kind of network social intercourse system based on cloud storage, which is characterized in that described including social subsystem and evaluation subsystem
Social subsystem is for providing a user network social intercourse service, and the evaluation subsystem is for assessing network security, institute
Stating social subsystem includes user registration module, user information sending module, cloud storage and user information receiving module and identity
Authentication module, the user registration module are used for the registration of new user, and the user information sending module and user information receive
Module is connect by network with cloud storage, is respectively used to registration user and is sent information to cloud storage and receive the letter from cloud storage
Breath.
2. the network social intercourse system according to claim 1 based on cloud storage, which is characterized in that the evaluation subsystem packet
Include node risk evaluation module, node importance evaluation module and Network Risk Assessment module, the node risk evaluation module
It is assessed for the security risk to each network node, the node importance evaluation module is used for the important of network node
Degree is assessed, and the Network Risk Assessment module is used for the security risk assessment result according to each network node to network
Security risk is assessed.
3. the network social intercourse system according to claim 2 based on cloud storage, which is characterized in that the node risk assessment
Module includes the first evaluation module, the second evaluation module and comprehensive assessment module, and first evaluation module is for obtaining node
The first risk assessment value, second evaluation module is used to obtain the second risk assessment value of node, the comprehensive assessment mould
Block is for assessing node risk according to the first risk assessment value and the second risk assessment value;
First evaluation module is used to obtain the first risk assessment value of node, specifically:
Using the first risk assessment value of following formula calculate node:
In formula, C1Indicate the first risk assessment value of node, precondition needed for p expression attacking network node and node loophole are believed
Matching degree between breath, p ∈ [0,1], p is bigger, indicates needed for attacking network node between precondition and node vulnerability information
Matching it is better, a indicates to take security protection measure intensity by attacking network node, and b indicates sensitivity coefficient, b ∈ [0.5,1.5], b
It is bigger, indicate a to C1It influences bigger.
4. the network social intercourse system according to claim 3 based on cloud storage, which is characterized in that a is used with lower section
Formula determines: working as a=0, security protection measure is not taken in expression, works as a=0.4, indicates the security protection measure for taking attack detecting, works as a=
1, indicate the safety measure for taking attack detecting and attack protection;
The first risk assessment value is bigger, indicates that network node is bigger by attack cost.
5. the network social intercourse system according to claim 4 based on cloud storage, which is characterized in that second evaluation module
For obtaining the second risk assessment value of node, specifically:
Using the second risk assessment value of following formula calculate node:
In formula, C2Indicate the second risk assessment value of node, warning information intensity when y indicates under attack, y ∈ { 1,2,3 }, y is got over
Greatly, indicate that early warning intensity is bigger, s indicates that stage position where attack, n indicate to attack total number of stages;
The second risk assessment value is bigger, indicates that attack is bigger to the threat of network node.
6. the network social intercourse system according to claim 5 based on cloud storage, which is characterized in that the comprehensive assessment module
For being assessed according to the first risk assessment value and the second risk assessment value of node node risk, specifically:
The risk assessment value of node is determined according to the first risk assessment value and the second risk assessment value:
In formula, F indicates the risk assessment value of node;The risk assessment value of the node is bigger, indicates that the security risk of node is got over
It is high.
7. the network social intercourse system according to claim 6 based on cloud storage, which is characterized in that the node importance is commented
Estimate module to be used to assess the significance level of network node, specifically:
Using the significance level assessed value of following formula calculate node:
In formula, Q indicates the significance level assessed value of node, q1Indicate the confidentiality metric of node, q2Indicate the intact degree of node
Metric, q3Indicate the Measurement for availability value of node;q1∈ (0,1], q1It is bigger, it indicates that the confidentiality requirement of node is higher, is attacked
Bring security risk is bigger when hitting, q2∈ (0,1], q2It is bigger, it is higher to indicate that the integrity of node requires, is brought when being tampered
Security risk it is bigger, q3∈ (0,1], q3It is bigger, indicate, when being attacked bring security risk higher to the dependence of node
It is bigger;
The significance level assessed value of the node is bigger, indicates that a possibility that network node is more important, under attack is bigger.
8. the network social intercourse system according to claim 7 based on cloud storage, which is characterized in that the Network Risk Assessment
Module is used to assess the security risk of network according to the security risk assessment result of each network node, specifically:
Calculate the risk assessment value F of each network nodei, i=1,2 ..., n, the number of n expression network node;
Calculate the significance level assessed value Q of each network nodei, i=1,2 ..., n, the number of n expression network node;
The risk assessment value of network is determined according to the risk assessment of each network node:
In formula, W indicates the risk assessment value of network;The risk assessment value of the network is bigger, indicates that the security risk of network is got over
It is high.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811110929.4A CN109218317A (en) | 2018-09-22 | 2018-09-22 | A kind of network social intercourse system based on cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811110929.4A CN109218317A (en) | 2018-09-22 | 2018-09-22 | A kind of network social intercourse system based on cloud storage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109218317A true CN109218317A (en) | 2019-01-15 |
Family
ID=64985169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811110929.4A Withdrawn CN109218317A (en) | 2018-09-22 | 2018-09-22 | A kind of network social intercourse system based on cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109218317A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103442057A (en) * | 2013-08-27 | 2013-12-11 | 玉林师范学院 | Cloud storage system based on user collaboration cloud |
US20140136830A1 (en) * | 2012-10-02 | 2014-05-15 | Nextbit Systems Inc. | Customizing operating system based on detected carrier |
US20160277374A1 (en) * | 2011-10-31 | 2016-09-22 | Reid Consulting Group | System and method for securely storing and sharing information |
CN108418870A (en) * | 2018-02-10 | 2018-08-17 | 深圳汇创联合自动化控制有限公司 | A kind of network social intercourse system based on cloud storage |
-
2018
- 2018-09-22 CN CN201811110929.4A patent/CN109218317A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160277374A1 (en) * | 2011-10-31 | 2016-09-22 | Reid Consulting Group | System and method for securely storing and sharing information |
US20140136830A1 (en) * | 2012-10-02 | 2014-05-15 | Nextbit Systems Inc. | Customizing operating system based on detected carrier |
CN103442057A (en) * | 2013-08-27 | 2013-12-11 | 玉林师范学院 | Cloud storage system based on user collaboration cloud |
CN108418870A (en) * | 2018-02-10 | 2018-08-17 | 深圳汇创联合自动化控制有限公司 | A kind of network social intercourse system based on cloud storage |
Non-Patent Citations (1)
Title |
---|
葛海慧等: ""基于动态关联分析的网络安全风险评估方法"", 《电子与信息学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11212299B2 (en) | System and method for monitoring security attack chains | |
CN101540676B (en) | Platform identifying method suitable to identify credible network connecting construction in ternary equal way | |
Shin et al. | Conficker and beyond: a large-scale empirical study | |
CN105653951B (en) | The system and method for checking file based on the reliability rating of digital certificate come anti-virus | |
CN106295349A (en) | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen | |
CN113326514B (en) | Risk assessment method and device for network assets, switch, equipment and server | |
CN103117897B (en) | A kind of detection comprises method and the relevant apparatus of the message of cookie information | |
CN115277490B (en) | Network target range evaluation method, system, equipment and storage medium | |
CN103428189A (en) | Method, apparatus and system for identifying malicious network equipment | |
CN110084011A (en) | A kind of method and device of the verifying of user's operation | |
CN109951345A (en) | A kind of alert processing method and device | |
CN101795281B (en) | Platform identification implementation method and system suitable for trusted connection frameworks | |
US10650382B2 (en) | Systems and methods for detecting fraudulent use of a serial code for accessing an associated value stored on a network | |
CN103096321B (en) | A kind of method and apparatus for detection of malicious server | |
CN109246114A (en) | A kind of Intelligent network monitoring system | |
CN109218317A (en) | A kind of network social intercourse system based on cloud storage | |
CN103369555A (en) | Method and device for detecting mobile-phone virus | |
JP4095076B2 (en) | Security management device, security management method, and security management program based on evaluation index calculation by security information exchange | |
Stone | Natural-language processing for intrusion detection | |
CN109167832A (en) | A kind of e-commerce system based on cloud computing | |
CN108282786A (en) | A kind of method and apparatus for detecting DNS spoofing attacks in WLAN | |
CN101572705A (en) | System and method for realizing bi-directional platform authentication | |
CN108965277B (en) | DNS (Domain name System) -based infected host distribution monitoring method and system | |
US20180041526A1 (en) | Method and apparatus for mutual-aid collusive attack detection in online voting systems | |
CN108881325A (en) | A kind of network security risk evaluation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190115 |