CN111818083A - Information security collection and interaction system based on cloud server - Google Patents
Information security collection and interaction system based on cloud server Download PDFInfo
- Publication number
- CN111818083A CN111818083A CN202010714230.XA CN202010714230A CN111818083A CN 111818083 A CN111818083 A CN 111818083A CN 202010714230 A CN202010714230 A CN 202010714230A CN 111818083 A CN111818083 A CN 111818083A
- Authority
- CN
- China
- Prior art keywords
- cloud server
- information
- sensing information
- cluster head
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
- H04W40/10—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/32—Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an information security collection and interaction system based on a cloud server, which comprises an information collection module and the cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a plurality of databases of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information. According to the invention, the sensing information is collected through the Internet of things technology, and the sensing information of different cluster heads is assigned with corresponding access authority levels through the cloud server, so that the sensing information is only transmitted to users with access authority or is provided for users with authority to check, and the safety is high.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an information security collection and interaction system based on a cloud server.
Background
In the related art, sensing information is usually manually collected and directly sent to a cloud server by a user terminal for storage, the cloud server is not intelligent and convenient, the sensing information is easily tampered and peeped by a third party in the information interaction process of the user terminal and the cloud server, and information safety cannot be guaranteed.
Disclosure of Invention
In order to solve the problems, the invention provides an information security collection and interaction system based on a cloud server.
The purpose of the invention is realized by adopting the following technical scheme:
the invention provides an information security collection and interaction system based on a cloud server, which comprises an information collection module and the cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a database of a plurality of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information.
In an implementation manner, the cloud server stores an access permission level list corresponding to an identifier of each cluster head, and the cloud server allocates a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
In an implementation manner, the cloud server receives access application information sent by a user terminal, verifies the access application information, and receives a data query request sent by the user terminal after the verification is passed.
In an implementation manner, the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
In an implementation manner, the identification information of the user terminal includes an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored by the cloud server, the cloud server determines that the authentication is passed.
In an implementation manner, the cloud server encrypts the perception information in the database partition according to the access permission level by using a corresponding preset encryption algorithm.
The invention has the beneficial effects that: the sensing information is collected through the Internet of things technology, the cloud server distributes corresponding access authority levels to the sensing information of different cluster heads, the sensing information is guaranteed to be only transmitted to users with access authority or users with authority to check, the sensing information is effectively prevented from being tampered and peeped by a third party in the transmission process, the safety of the collected sensing information is guaranteed, and the information is safely interacted between the cloud server and a user terminal.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
Fig. 1 is a block diagram illustrating a structure of a cloud server-based information security collection and interaction system according to an exemplary embodiment of the present invention.
Reference numerals:
the system comprises an information acquisition module 1 and a cloud server 2.
Detailed Description
The invention is further described with reference to the following examples.
Referring to fig. 1, an embodiment of the present invention provides an information security collection and interaction system based on a cloud server, where the system includes an information collection module 1 and a cloud server 2, the information collection module 1 includes a sink node, a cluster head, and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to a corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server 2; the cloud server 2 is provided with a database with a plurality of database partitions, the cloud server 2 allocates corresponding access authority levels to the sensing information collected by the cluster heads according to the identification of the cluster heads, and the sensing information collected by the cluster heads is stored in the database partitions corresponding to the access authority levels of the sensing information.
In an implementation manner, the cloud server 2 stores an access permission level list corresponding to the identifier of each cluster head, and the cloud server 2 allocates a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
In an implementation manner, the cloud server 2 receives access application information sent by a user terminal, verifies the access application information, and receives a data query request sent by the user terminal after the verification is passed.
In an implementation manner, the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server 2 sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
In an implementation manner, the identification information of the user terminal includes an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored in the cloud server 2, the cloud server 2 determines that the authentication is passed. In another implementation manner, the identification information of the user terminal may further include a face image, and when the face image is successfully matched and identified with a face image pre-stored in the cloud server 2, the cloud server 2 determines that the authentication is passed.
In an implementation manner, the cloud server 2 encrypts the sensing information in the database partition according to the access permission level by using a corresponding preset encryption algorithm.
According to the embodiment of the invention, the sensing information is collected through the Internet of things technology, the sensing information of different cluster heads is distributed with corresponding access authority levels through the cloud server 2, the sensing information is only transmitted to users with access authority or is provided for users with authority to check, the sensing information is effectively prevented from being tampered and peeped by a third party in the transmission process, the safety of the collected sensing information is ensured, and the information is safely interacted between the cloud server 2 and a user terminal.
In one implementation mode, if the distance between each sensor node in the cluster and the cluster head does not exceed the set communication distance threshold dσDirectly communicating with the cluster head; if the distance between the cluster head and the cluster head exceeds the set communication distance threshold value dσThe sensor node selects a neighbor node closer to the cluster head relative to the sensor node for communication, and specifically comprises the following steps:
(1) the sensor node selects the neighbor nodes meeting the following path conditions as the candidate next hop nodes in the neighbor nodes closer to the cluster head relative to the sensor node, and the neighbor nodes are classified into the candidate next hop node set:
in the formula, OiCorresponding cluster head, d (j, O), representing sensor node ii) Represents the jth neighbor node to O in the neighbor nodes of the sensor node i closer to the cluster head relative to the neighbor nodesiD (k, O)i) Represents the k-th neighbor node to O in the neighbor nodes of the sensor node i closer to the cluster head relative to the sensor node iiDistance of (m)iThe number of neighbor nodes of the sensor node i which are closer to the cluster head relative to the sensor node i;
(2) and the sensor node selects the neighbor node with the maximum current residual energy from the candidate next hop node set for communication.
Wherein, other sensor nodes in the communication range of the sensor node i are called as neighbor nodes of the sensor node i.
In the communication routing mechanism, whether the sensor node is in direct communication with the cluster head or not is determined through the distance, so that the sensing information collected by the sensor node can be reliably and stably sent to the cluster head. The path conditions are innovatively set, so that when the sensor node with the distance to the cluster head exceeding the set communication distance threshold selects the next hop, the sensor node can avoid selecting the next hop far away from the cluster head, the transmission delay of the sensing information can be effectively reduced, and the occurrence rate of the phenomenon of sensing information packet loss caused by data stream interference during multi-hop transmission is reduced.
In one implementation, the distance between the cluster head and the sink node does not exceed the preset lower distance limit dWhen the cluster head is in communication with the sink node, the cluster head directly communicates with the sink node; the distance between the cluster head and the sink node exceeds a preset lower distance limit dThe cluster head sends the sensing information to the sink node in a multi-hop routing mode, wherein the cluster head selects the neighbor cluster head with the largest weight value as the next hop from the neighbor cluster heads closer to the sink node;
the calculation formula of the set weight is as follows:
in the formula, QabThe cluster head weight is the weight of a neighbor cluster head which is closer to a sink node from the b th cluster head of the cluster head a, d (b, sink) is the distance from the neighbor cluster head which is closer to the sink node from the b th cluster head to the sink node, d (a, sink) is the distance from the cluster head a to the sink node, sink represents the sink node, d (a, b) is the distance from the cluster head a to the neighbor cluster head which is closer to the sink node from the b th cluster head; lambda [ alpha ]1、λ2Is the set weight coefficient.
In the routing mechanism, when the distance between the cluster head and the sink node exceeds a preset distance lower limit, the cluster head selects a neighbor cluster head with the largest weight as a next hop, so that the reliability of sensing information transmission is improved, the total length of a sensing information transmission path can be shortened as much as possible, and the cost of sensing information transmission is saved.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the system is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the system and the terminal described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an application specific integrated circuit, a digital signal processor, a digital signal processing system, a programmable logic device, a field programmable gate array, a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. The computer-readable medium can include, but is not limited to, random access memory, read only memory images, electrically erasable programmable read only memory or other optical disk storage, magnetic disk storage media or other magnetic storage systems, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.
Claims (6)
1. A cloud server-based information security collection and interaction system is characterized by comprising an information collection module and a cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a database of a plurality of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information.
2. The system as claimed in claim 1, wherein the cloud server stores an access permission level list corresponding to the identifier of each cluster head, and the cloud server assigns a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
3. The system as claimed in claim 1, wherein the cloud server receives access application information from the user terminal, verifies the access application information, and receives a data query request from the user terminal after the verification is passed.
4. The information security collection and interaction system based on the cloud server as claimed in claim 3, wherein the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
5. The system of claim 4, wherein the identification information of the user terminal comprises an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored by the cloud server, the cloud server determines that the authentication is passed.
6. The information security collection and interaction system based on cloud server as claimed in any one of claims 1-5,
and the cloud server encrypts the perception information in the database partition by adopting a corresponding preset encryption algorithm according to the access authority level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714230.XA CN111818083A (en) | 2020-07-22 | 2020-07-22 | Information security collection and interaction system based on cloud server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010714230.XA CN111818083A (en) | 2020-07-22 | 2020-07-22 | Information security collection and interaction system based on cloud server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111818083A true CN111818083A (en) | 2020-10-23 |
Family
ID=72862258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010714230.XA Withdrawn CN111818083A (en) | 2020-07-22 | 2020-07-22 | Information security collection and interaction system based on cloud server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111818083A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112069477A (en) * | 2020-11-16 | 2020-12-11 | 南京孜博汇信息科技有限公司 | Method for processing writing information of multiple users |
CN116319088A (en) * | 2023-05-17 | 2023-06-23 | 深圳前海翼联科技有限公司 | Method for monitoring route node state and collecting information of Internet of things |
WO2024138580A1 (en) * | 2022-12-29 | 2024-07-04 | 北京小米移动软件有限公司 | Wireless sensing communication method, apparatus, device and storage medium |
-
2020
- 2020-07-22 CN CN202010714230.XA patent/CN111818083A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112069477A (en) * | 2020-11-16 | 2020-12-11 | 南京孜博汇信息科技有限公司 | Method for processing writing information of multiple users |
WO2024138580A1 (en) * | 2022-12-29 | 2024-07-04 | 北京小米移动软件有限公司 | Wireless sensing communication method, apparatus, device and storage medium |
CN116319088A (en) * | 2023-05-17 | 2023-06-23 | 深圳前海翼联科技有限公司 | Method for monitoring route node state and collecting information of Internet of things |
CN116319088B (en) * | 2023-05-17 | 2023-08-29 | 深圳前海翼联科技有限公司 | Method for monitoring route node state and collecting information of Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10452824B2 (en) | Method and apparatus for optimized access of security credentials via mobile edge-computing systems | |
CN108306887B (en) | Block chain-based Internet of things security and data privacy protection system | |
CN111818083A (en) | Information security collection and interaction system based on cloud server | |
US10070311B2 (en) | Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus | |
US9882912B2 (en) | System and method for providing authentication service for internet of things security | |
KR102242766B1 (en) | Identity registration method and device | |
US7302252B2 (en) | Authentication systems, wireless communication terminals, and wireless base stations | |
JP7421771B2 (en) | Methods, application servers, IOT devices and media for implementing IOT services | |
US20080271150A1 (en) | Security based on network environment | |
CN104320389B (en) | A kind of fusion identity protection system and method based on cloud computing | |
US20190141048A1 (en) | Blockchain identification system | |
US10785205B2 (en) | Computer readable storage media for legacy integration and methods and systems for utilizing same | |
CN109218981A (en) | Wi-Fi access authentication method based on position signal feature common recognition | |
US20070028117A1 (en) | Method and apparatus for facilitating multi-level computer system authentication | |
CN113242230A (en) | Multi-level authentication and access control system and method based on intelligent contracts | |
CN106506491B (en) | Network safety system | |
CN113051605A (en) | Individual privacy information use management system and method based on block chain | |
CN114363091B (en) | Method and system for realizing unified login of platform application based on APISIX | |
JP5035521B2 (en) | Authentication system | |
CN111193754B (en) | Data access method, system and equipment applied to Internet of things | |
CN116170806B (en) | Smart power grid LWM2M protocol security access control method and system | |
KR20190091511A (en) | Random message based data message authentication | |
KR100931213B1 (en) | Low cost RFID authentication protocol method suitable for distributed environment | |
CN113518124B (en) | Internet of things equipment authentication method based on cellular block chain network | |
CN109905461B (en) | Information exchange method and system based on cloud service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20201023 |
|
WW01 | Invention patent application withdrawn after publication |