CN111711674B - Cloud computing method based on Internet of things - Google Patents

Cloud computing method based on Internet of things Download PDF

Info

Publication number
CN111711674B
CN111711674B CN202010506557.8A CN202010506557A CN111711674B CN 111711674 B CN111711674 B CN 111711674B CN 202010506557 A CN202010506557 A CN 202010506557A CN 111711674 B CN111711674 B CN 111711674B
Authority
CN
China
Prior art keywords
data
metadata
pure
mapping
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010506557.8A
Other languages
Chinese (zh)
Other versions
CN111711674A (en
Inventor
李双印
赵淦森
罗浩宇
王欣明
邓大权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Normal University
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN202010506557.8A priority Critical patent/CN111711674B/en
Publication of CN111711674A publication Critical patent/CN111711674A/en
Application granted granted Critical
Publication of CN111711674B publication Critical patent/CN111711674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a cloud computing method based on the Internet of things, which divides a task into a plurality of subtasks through Map Reduce, each subtask acquires required metadata, the method firstly establishes mapping for the acquired metadata, deletes the mapped metadata, only reserves a pure data part, then encapsulates the pure data part, and carries out next processing for the encapsulated data. The method can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data, and can realize the safe and reliable application of the data.

Description

Cloud computing method based on Internet of things
Technical Field
The invention relates to a preparation process of an Internet of things, in particular to a method for realizing safe data intercommunication of the Internet of things through cloud computing.
Background
The Internet of Things (The Internet of Things, IOT for short) is used for collecting any object or process needing monitoring, connection and interaction in real time through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors and laser scanners, collecting various required information such as sound, light, heat, electricity, mechanics, chemistry, biology and position of The object or process, realizing wide connection of The object and The person through network access, and realizing intelligent sensing, identification and management of The object and The process. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed form an interconnected network. At present, the internet of things is widely applied to a plurality of fields such as existing video monitoring, home safety monitoring and intelligent transportation.
Cloud computing (cloud computing) is one type of distributed computing, and refers to decomposing a huge data computing processing program into countless small programs through a network "cloud", and then processing and analyzing the small programs through a system consisting of a plurality of servers to obtain results and returning the results to a user. By the technology, tens of thousands of data can be processed in a short time (several seconds), so that strong network service is achieved.
Therefore, the internet of things is actually a system for acquiring and managing basic data, the cloud computing is a system for processing data, the cloud computing stores data and information in a distributed manner, and the distributed manner stores data in a redundant manner. Cloud computing service providers often have extremely large entrance bandwidth and a large number of edge access nodes, sensor data distributed in various places can be uploaded to the edge nodes of the cloud service providers conveniently and quickly, and then the sensor data are transmitted to a computing center through a high-speed network by the edge nodes, so that the delay of data transmission is greatly reduced, and the timeliness of data processing is improved, so that the cloud computing service providers and the edge nodes are naturally combined together.
However, privacy is stolen in cloud computing security, data in cloud computing is often open and is easily attacked by hackers, so that the operation of cloud computing is unknown, and meanwhile, loss is large, and loss caused by loss of data cannot be predicted. In cloud computing, a large number of users store data in the cloud computing, and even a person with no particular significance illegally obtains information through the cloud computing, viruses are implanted into the data in the cloud computing, and the viruses can not only cause that a computer taking the cloud computing as a carrier cannot work normally, but also can be copied and spread through some ways, so that great harm is brought to the internet, and therefore, improvement is brought to security of the cloud computing urgently.
Disclosure of Invention
Therefore, in view of the problems in the prior art, the main object of the present invention is to provide a cloud computing method based on the internet of things, which directly eliminates data with errors and possibly hidden viruses through the acquisition and analysis of cloud computing data, thereby achieving the safety and reliability utilization of data.
The invention further aims to provide the cloud computing method based on the internet of things, and the method further achieves the aim of safe acquisition by closing all data transmission contents such as external links in the data without judging the authenticity and reliability of the data.
Based on this, the invention is realized as follows:
a cloud computing method based on the Internet of things divides a task into a plurality of subtasks through Map Reduce, each subtask acquires required metadata, mapping is firstly established on the acquired metadata, the mapped metadata is deleted, only a pure data part is reserved, then the pure data part is packaged, and the packaged data is processed in the next step. Here, mapping refers to copying metadata and creating corresponding mapping metadata, so that the metadata is processed to avoid influence on original data. The method can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data, and can realize the safe and reliable application of the data.
Furthermore, the mapping is performed through Map functions, one Map function corresponds to a part of original data, and the mapping operation is performed on the part of original data. The maps are independent, so that the maps can be fully parallelized, and the efficiency is improved.
Further, after mapping, a merging operation is performed on a part of the intermediate results generated by each Map through the Reduce function. Because Reduce is independent of each other, the simple concatenation of the final results produced form the complete result set.
Further, the method removes descriptive contents such as identification (e.g. identification code, key, etc.), type, authority, address, attribute, date, etc. when deleting the data format, and only retains the pure data portion.
Furthermore, for the pure data part, all link addresses and fields for sending data in the pure data part are deleted before being sealed and stored, so that the reliability and the non-transferability of data contents are ensured, and the invasion or diffusion of viruses or hackers is avoided.
Alternatively, the link in the pure data section, the field to send the data, is set to disable access.
Furthermore, for the structured data, namely the data with fixed format and limited length, the head and tail contents of the mapped metadata are deleted in a targeted manner.
Furthermore, for unstructured data, due to the fact that unstructured data is not of a fixed length and is not of a fixed format, the unstructured data content needs to be identified, and data portions and descriptive contents such as identification, type, authority, address, attribute, date and the like need to be distinguished.
Further, for the encapsulation of the pure data part, a C + + virtual function is adopted under the general condition, so that the utilization rate and convenience of data can be improved.
The invention has the following technical effects:
the invention can effectively acquire the required content in the metadata by independently copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, eliminates the influence of viruses or hackers, is favorable for the safe use of the data and can realize the safe and reliable application of the data.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention.
Detailed Description
In order to more clearly describe the present invention, a specific implementation of the present invention is further described below with reference to the accompanying drawings.
The applicant finds that an important channel for hacker or virus propagation is realized by copying and external linking, that is, for a certain program or data, the hacker or virus can only complete intrusion or virus diffusion by controlling the program to generate data read-write operation, and if the read-write mode of the data is isolated, the hacker intrusion or virus diffusion can be avoided. As shown in fig. 1, in order to implement the cloud computing method based on the internet of things, the method first obtains metadata, and for the obtained metadata, the method first establishes mapping, where mapping refers to copying the metadata and establishing corresponding mapping metadata, so that the metadata is processed to avoid influence on original data; and then deleting the mapped metadata, only reserving a pure data part, packaging the pure data part, and carrying out next processing on the packaged data.
The method comprises the following specific steps:
101. acquiring metadata, dividing a task into a plurality of subtasks through Map Reduce, and acquiring the required metadata by each subtask;
102. mapping, namely, mapping the acquired metadata, wherein the mapping is established firstly, and the mapping refers to copying the metadata and establishing corresponding mapping metadata, so that the metadata is processed, and the influence on original data is avoided;
the mapping is carried out through Map functions, one Map function corresponds to a part of original data, and the mapping operation is carried out on the part of original data. The maps are independent, so that the maps can be fully parallelized, and the efficiency is improved.
After mapping, merging operation is carried out on a part of intermediate results generated by each Map through Reduce functions, and because Reduce is mutually independent, the generated final results are simply connected to form a finished result set.
103. Deleting metadata, for mapped data, removing descriptive contents such as identification (such as identification code, key and the like), type, authority, address, attribute, date and the like, and only keeping a pure data part.
Meanwhile, all the link addresses and the fields for sending data in the pure data part are deleted, or the link addresses and the fields for sending data in the pure data part are set to be access-forbidden. Therefore, the read-write operation of other external linked software on the data can be effectively avoided, the reliability and the non-transferability of the data content are ensured, and the invasion or the diffusion of viruses or hackers is avoided.
And for the structured data, namely the data with a fixed format and a limited length, the head and tail contents of the mapped metadata are deleted in a targeted manner.
For unstructured data, due to the fact that unstructured data is not of a fixed length and is not of a fixed format, unstructured data content needs to be identified, and data portions and descriptive contents such as identification, type, authority, address, attribute and date need to be distinguished.
104. Packaging data, namely packaging the pure data part according to the language required by a user in a normal condition; based on the universality and universality of C + + language application, a C + + virtual function is generally adopted, so that the utilization rate and convenience of data can be improved.
105. And (6) ending.
The encapsulated data can be directly used for subsequent other operations or processing.
In a word, the invention acquires the metadata independently, can effectively acquire the required content in the metadata by copying and deleting the metadata, avoids the interference of invalid links, address pointers and the like, purifies the data content, eliminates the influence of viruses or hackers, is beneficial to the safe use of the data, and can realize the safe and reliable application of the data.
The foregoing is illustrative of the embodiments of the present invention and the technical principles employed, and it is within the scope of the present invention that the resulting functional effects may vary without departing from the spirit of the present invention as embodied in the specification and drawings.

Claims (1)

1. A cloud computing method based on the Internet of things is characterized in that mapping is established for the acquired metadata, the mapped metadata are deleted, only a pure data part is reserved, then the pure data part is packaged, and the packaged data is processed in the next step;
the mapping is carried out through Map functions, one Map function corresponds to a part of original data, and the mapping operation is carried out on the part of original data;
after mapping, merging a part of intermediate results generated by each Map through a Reduce function;
when the data format is deleted, the method removes the explanatory content and only keeps the pure data part;
for the pure data part, deleting all link addresses and fields for sending data in the pure data part before packaging;
setting the link in the pure data part and the field for sending data as access prohibition;
for structured data, namely data with a fixed format and a limited length, deleting the head and tail contents of the mapped metadata in a targeted manner;
for unstructured data, as the unstructured data are data with indefinite length and unfixed format, the unstructured data content needs to be identified to distinguish the data part from the explanatory content;
and the pure data part is encapsulated by adopting a C + + virtual function, so that the utilization rate and convenience of data can be improved.
CN202010506557.8A 2020-06-05 2020-06-05 Cloud computing method based on Internet of things Active CN111711674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010506557.8A CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010506557.8A CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Publications (2)

Publication Number Publication Date
CN111711674A CN111711674A (en) 2020-09-25
CN111711674B true CN111711674B (en) 2023-03-14

Family

ID=72538740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010506557.8A Active CN111711674B (en) 2020-06-05 2020-06-05 Cloud computing method based on Internet of things

Country Status (1)

Country Link
CN (1) CN111711674B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436408A (en) * 2011-10-10 2012-05-02 上海交通大学 Data storage cloud and cloud backup method based on Map/Dedup
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN107391761A (en) * 2017-08-28 2017-11-24 郑州云海信息技术有限公司 A kind of data managing method and device based on data de-duplication technology
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN110324319A (en) * 2019-06-11 2019-10-11 福建亿安智能技术有限公司 A kind of network data security management-control method based on one-way transmission

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436408A (en) * 2011-10-10 2012-05-02 上海交通大学 Data storage cloud and cloud backup method based on Map/Dedup
CN102970317A (en) * 2012-03-27 2013-03-13 广州市国迈科技有限公司 Safety design scheme of private cloud storage system
CN107391761A (en) * 2017-08-28 2017-11-24 郑州云海信息技术有限公司 A kind of data managing method and device based on data de-duplication technology
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN110324319A (en) * 2019-06-11 2019-10-11 福建亿安智能技术有限公司 A kind of network data security management-control method based on one-way transmission

Also Published As

Publication number Publication date
CN111711674A (en) 2020-09-25

Similar Documents

Publication Publication Date Title
JP6983194B2 (en) Middleware security layer for cloud computing services
Cheung et al. The design of GrIDS: A graph-based intrusion detection system
US9806974B2 (en) Efficient acquisition of sensor data in an automated manner
JP4668567B2 (en) System and method for client-based web crawling
KR20080026178A (en) Immunizimg html browsers and extensions from known vulnerabilities
WO2015164358A1 (en) Policy-based payload delivery for transport protocols
JP2002533792A (en) Method and system for protecting the operation of a trusted internal network
CN108600377B (en) Method, device, terminal and storage medium for suspending file downloading
US11552868B1 (en) Collect and forward
CN113158195B (en) Distributed vulnerability scanning method and system based on POC script
CN111711674B (en) Cloud computing method based on Internet of things
Liedtke Clans & chiefs
US20240106730A1 (en) Network Forensic System and Method
KR100734864B1 (en) Method for storing of pattern matching policy and method for controlling alert
Liu et al. Working mechanism of eternalblue and its application in ransomworm
CN114826790B (en) Block chain monitoring method, device, equipment and storage medium
EP3502925B1 (en) Computer system and method for extracting dynamic content from websites
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
US10904215B2 (en) Database firewall for use by an application using a database connection pool
Buchholz Pervasive binding of labels to system processes
US10044728B1 (en) Endpoint segregation to prevent scripting attacks
KR20210103128A (en) Data analysis service method and data analysis service system using the method
JP4412489B2 (en) Defense policy creation system and method for unauthorized access and program thereof
CN114491356B (en) Data acquisition method and device, computer storage medium and electronic equipment
CN116506216B (en) Lightweight malicious flow detection and evidence-storage method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant