CN111711674A - Cloud computing method based on Internet of things - Google Patents

Cloud computing method based on Internet of things Download PDF

Info

Publication number
CN111711674A
CN111711674A CN202010506557.8A CN202010506557A CN111711674A CN 111711674 A CN111711674 A CN 111711674A CN 202010506557 A CN202010506557 A CN 202010506557A CN 111711674 A CN111711674 A CN 111711674A
Authority
CN
China
Prior art keywords
data
cloud computing
internet
things
computing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010506557.8A
Other languages
Chinese (zh)
Other versions
CN111711674B (en
Inventor
李双印
赵淦森
罗浩宇
王欣明
邓大权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Normal University
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN202010506557.8A priority Critical patent/CN111711674B/en
Publication of CN111711674A publication Critical patent/CN111711674A/en
Application granted granted Critical
Publication of CN111711674B publication Critical patent/CN111711674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a cloud computing method based on the Internet of things, which divides a task into a plurality of subtasks through Map Reduce, each subtask acquires required metadata, the method firstly establishes mapping for the acquired metadata, deletes the mapped metadata, only reserves a pure data part, then encapsulates the pure data part, and carries out next processing for the encapsulated data. The method can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data, and can realize the safe and reliable application of the data.

Description

Cloud computing method based on Internet of things
Technical Field
The invention relates to a preparation process of an Internet of things, in particular to a method for realizing safe data intercommunication of the Internet of things through cloud computing.
Background
The Internet of Things (The Internet of Things, IOT for short) is to collect any object or process needing monitoring, connection and interaction in real time and collect various information needed by sound, light, heat, electricity, mechanics, chemistry, biology, location and The like through various devices and technologies such as various information sensors, radio frequency identification technology, global positioning system, infrared sensor, laser scanner and The like, and to realize The wide connection of objects and people through network access, thereby realizing The intelligent sensing, identification and management of The objects and processes. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed form an interconnected network. At present, the internet of things is widely applied to a plurality of fields such as existing video monitoring, home safety monitoring and intelligent transportation.
Cloud computing (cloud computing) is one type of distributed computing, and refers to decomposing a huge data computing processing program into countless small programs through a network "cloud", and then processing and analyzing the small programs through a system consisting of a plurality of servers to obtain results and returning the results to a user. By the technology, tens of thousands of data can be processed in a short time (several seconds), so that strong network service is achieved.
Therefore, the internet of things is actually a system for acquiring and managing basic data, the cloud computing is a system for processing data, the cloud computing stores data and information in a distributed manner, and the distributed manner stores data in a redundant manner. Cloud computing service providers often have extremely large entrance bandwidth and a large number of edge access nodes, sensor data distributed in various places can be uploaded to the edge nodes of the cloud service providers conveniently and quickly, and then the sensor data are transmitted to a computing center through a high-speed network by the edge nodes, so that the delay of data transmission is greatly reduced, and the timeliness of data processing is improved, so that the cloud computing service providers and the edge nodes are naturally combined together.
However, privacy is stolen in cloud computing security, data in cloud computing is often open and is easily attacked by hackers, unknown operation of cloud computing is caused, loss caused by the operation of the cloud computing is large, and loss caused by loss of the data cannot be predicted. In cloud computing, a large number of users store data in the cloud computing, and even a person with no particular significance illegally obtains information through the cloud computing, viruses are implanted into the data in the cloud computing, and the viruses can not only cause that a computer taking the cloud computing as a carrier cannot work normally, but also can be copied and spread through some ways, so that great harm is brought to the internet, and therefore, improvement is brought to security of the cloud computing urgently.
Disclosure of Invention
Therefore, in view of the problems in the prior art, the main object of the present invention is to provide a cloud computing method based on the internet of things, which directly eliminates data with errors and possibly hidden viruses through the acquisition and analysis of cloud computing data, thereby achieving the safety and reliability utilization of data.
The invention further aims to provide the cloud computing method based on the internet of things, and the method further achieves the aim of safe acquisition by closing all data transmission contents such as external links in the data without judging the authenticity and reliability of the data.
Based on this, the invention is realized as follows:
a cloud computing method based on the Internet of things divides a task into a plurality of subtasks through Map Reduce, each subtask acquires required metadata, mapping is firstly established on the acquired metadata, the mapped metadata is deleted, only a pure data part is reserved, then the pure data part is packaged, and the packaged data is processed in the next step. Here, mapping refers to copying metadata and creating corresponding mapping metadata, so that the metadata is processed to avoid influence on original data. The method can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data, and can realize the safe and reliable application of the data.
Furthermore, the mapping is performed through Map functions, one Map function corresponds to a part of original data, and the mapping operation is performed on the part of original data. The maps are independent, so that the maps can be fully parallelized, and the efficiency is improved.
Further, after mapping, a merging operation is performed on a part of the intermediate results generated by each Map through the Reduce function. Because Reduce is independent of each other, the simple concatenation of the final results produced form the complete result set.
Further, when the data format is deleted, the method removes the descriptive contents such as identification codes, keys and the like, types, rights, addresses, attributes, dates and the like, and only keeps the pure data part.
Furthermore, for the pure data part, all link addresses and fields for sending data in the pure data part are deleted before being sealed and stored, so that the reliability and the non-transferability of data contents are ensured, and the invasion or diffusion of viruses or hackers is avoided.
Alternatively, the link in the pure data section, the field to send the data, is set to disable access.
Furthermore, for the structured data, namely the data with fixed format and limited length, the head and tail two sections of contents of the mapped metadata are deleted in a targeted manner.
Furthermore, for unstructured data, due to the fact that unstructured data is not of a fixed length and is not of a fixed format, the unstructured data content needs to be identified, and data portions and descriptive contents such as identification, type, authority, address, attribute, date and the like need to be distinguished.
Further, for the encapsulation of the pure data part, a C + + virtual function is adopted under the general condition, so that the utilization rate and convenience of data can be improved.
The invention has the following technical effects:
the invention can effectively acquire the required content in the metadata by independently copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data and can realize the safe and reliable application of the data.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention.
Detailed Description
In order to more clearly describe the present invention, a specific implementation of the present invention is further described below with reference to the accompanying drawings.
The applicant finds that an important channel for hacker or virus propagation is realized by copying and external linking, that is, for a certain program or data, the hacker or virus can only complete intrusion or virus diffusion by controlling the program to generate data read-write operation, and if the read-write mode of the data is isolated, the hacker intrusion or virus diffusion can be avoided. As shown in fig. 1, in order to implement the cloud computing method based on the internet of things, the method first obtains metadata, and for the obtained metadata, the method first establishes mapping, where mapping refers to copying the metadata and establishing corresponding mapping metadata, so that the metadata is processed to avoid influence on original data; and then deleting the mapped metadata, only reserving a pure data part, packaging the pure data part, and carrying out next processing on the packaged data.
The method comprises the following specific steps:
101. acquiring metadata, dividing a task into a plurality of subtasks through Map Reduce, and acquiring the required metadata by each subtask;
102. mapping, namely, mapping the acquired metadata, wherein the mapping is established firstly, and the mapping refers to copying the metadata and establishing corresponding mapping metadata, so that the metadata is processed, and the influence on original data is avoided;
the mapping is carried out through Map functions, one Map function corresponds to a part of original data, and the mapping operation is carried out on the part of original data. The maps are independent, so that the maps can be fully parallelized, and the efficiency is improved.
After mapping, merging operation is carried out on a part of intermediate results generated by each Map through Reduce functions, and because Reduce is mutually independent, the generated final results are simply connected to form a finished result set.
103. Deleting metadata, for mapped data, removing descriptive contents such as identification (such as identification code, key and the like), type, authority, address, attribute, date and the like, and only keeping a pure data part.
Meanwhile, all the link addresses and the fields for sending data in the pure data part are deleted, or the link addresses and the fields for sending data in the pure data part are set to be access-forbidden. Therefore, the read-write operation of other external linked software on the data can be effectively avoided, the reliability and the non-transferability of the data content are ensured, and the invasion or the diffusion of viruses or hackers is avoided.
And for the structured data, namely the data with a fixed format and a limited length, the head and tail contents of the mapped metadata are deleted in a targeted manner.
For unstructured data, due to the fact that unstructured data is not of a fixed length and is not of a fixed format, unstructured data content needs to be identified, and data portions and descriptive contents such as identification, type, authority, address, attribute and date need to be distinguished.
104. Packaging data, namely packaging the pure data part according to the language required by a user in a normal condition; based on the universality and universality of C + + language application, a C + + virtual function is generally adopted, so that the utilization rate and convenience of data can be improved.
105. And (6) ending.
The encapsulated data can be directly used for subsequent other operations or processing.
In a word, the invention acquires the metadata independently, can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, purifies the data content, eliminates the influence of viruses or hackers, is beneficial to the safe use of the data, and can realize the safe and reliable application of the data.
The foregoing is illustrative of the embodiments of the present invention and the technical principles employed, and it is within the scope of the present invention that the resulting functional effects may vary without departing from the spirit of the present invention as embodied in the specification and drawings.

Claims (9)

1. A cloud computing method based on the Internet of things is characterized in that mapping is firstly established on the acquired metadata, the mapped metadata is deleted, only a pure data part is reserved, then the pure data part is packaged, and the packaged data is processed in the next step.
2. The internet-of-things-based cloud computing method of claim 1, wherein the mapping is performed through Map functions, one Map function corresponds to a part of raw data, and the mapping operation is performed on the part of raw data.
3. The internet of things-based cloud computing method of claim 2, wherein after mapping, merging the partial intermediate results generated by each Map through a Reduce function.
4. The internet of things-based cloud computing method of claim 1, wherein the method removes explanatory content and retains only a pure data portion when deleting a data format.
5. The Internet of things-based cloud computing method of claim 4, wherein for the pure data part, all link addresses and data sending fields in the pure data part are deleted before encapsulation.
6. The internet of things-based cloud computing method of claim 4, wherein the link in the pure data part and the field for sending data are set to be access-prohibited.
7. The internet of things-based cloud computing method of claim 5, wherein for structured data, namely data with a fixed format and a limited length, the head and tail contents of the mapped metadata are deleted specifically.
8. The Internet of things-based cloud computing method of claim 5, wherein for unstructured data, due to the fact that unstructured data is not in a fixed length and a fixed format, unstructured data content needs to be identified, and data portions and explanatory content are distinguished.
9. The internet of things-based cloud computing method of claim 1, wherein a pure data part is packaged by adopting a virtual function of C + +, so that the utilization rate and convenience of data can be improved.
CN202010506557.8A 2020-06-05 2020-06-05 Cloud computing method based on Internet of things Active CN111711674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010506557.8A CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010506557.8A CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Publications (2)

Publication Number Publication Date
CN111711674A true CN111711674A (en) 2020-09-25
CN111711674B CN111711674B (en) 2023-03-14

Family

ID=72538740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010506557.8A Active CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Country Status (1)

Country Link
CN (1) CN111711674B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436408A (en) * 2011-10-10 2012-05-02 上海交通大学 Data storage cloud and cloud backup method based on Map/Dedup
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN107391761A (en) * 2017-08-28 2017-11-24 郑州云海信息技术有限公司 A kind of data managing method and device based on data de-duplication technology
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN110324319A (en) * 2019-06-11 2019-10-11 福建亿安智能技术有限公司 A kind of network data security management-control method based on one-way transmission

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436408A (en) * 2011-10-10 2012-05-02 上海交通大学 Data storage cloud and cloud backup method based on Map/Dedup
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN107391761A (en) * 2017-08-28 2017-11-24 郑州云海信息技术有限公司 A kind of data managing method and device based on data de-duplication technology
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN110324319A (en) * 2019-06-11 2019-10-11 福建亿安智能技术有限公司 A kind of network data security management-control method based on one-way transmission

Also Published As

Publication number Publication date
CN111711674B (en) 2023-03-14

Similar Documents

Publication Publication Date Title
JP6983194B2 (en) Middleware security layer for cloud computing services
KR100884714B1 (en) Application layer security method and system
US9806974B2 (en) Efficient acquisition of sensor data in an automated manner
CN109923847B (en) Discovery method, device, equipment and storage medium for call link
CN101473628A (en) Systems and methods for accelerating delivery of a computing environment to remote user
WO2008151016A2 (en) Transporting table valued parameter over tabular data stream protocol
CN109948334B (en) Vulnerability detection method and system, electronic equipment and storage medium
CN112417511B (en) Method for analyzing data authority control based on Handle identification
JP2002533792A (en) Method and system for protecting the operation of a trusted internal network
CN103957174A (en) Method for semantic switch loose coupling system to process information
CN113158195B (en) Distributed vulnerability scanning method and system based on POC script
CN111711674B (en) Cloud computing method based on Internet of things
Liedtke Clans & chiefs
KR100734864B1 (en) Method for storing of pattern matching policy and method for controlling alert
CN107979595A (en) Private data guard method and gateway system
CN103957173A (en) Semantic switch
CN114826790B (en) Block chain monitoring method, device, equipment and storage medium
EP3502925B1 (en) Computer system and method for extracting dynamic content from websites
Liu et al. Working mechanism of eternalblue and its application in ransomworm
US20150286808A1 (en) Marked image file security system and process
KR102385702B1 (en) Data analysis service method and data analysis service system using the method
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
CN107508739B (en) Authentication method for transmitting data through VPN tunnel
Buchholz Pervasive binding of labels to system processes
US20150286651A1 (en) Marked image file security system and process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant