CN111818083A - Information security collection and interaction system based on cloud server - Google Patents

Information security collection and interaction system based on cloud server Download PDF

Info

Publication number
CN111818083A
CN111818083A CN202010714230.XA CN202010714230A CN111818083A CN 111818083 A CN111818083 A CN 111818083A CN 202010714230 A CN202010714230 A CN 202010714230A CN 111818083 A CN111818083 A CN 111818083A
Authority
CN
China
Prior art keywords
cloud server
information
sensing information
cluster head
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010714230.XA
Other languages
Chinese (zh)
Inventor
张祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Luchang Technology Co ltd
Original Assignee
Guangzhou Luchang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Luchang Technology Co ltd filed Critical Guangzhou Luchang Technology Co ltd
Priority to CN202010714230.XA priority Critical patent/CN111818083A/en
Publication of CN111818083A publication Critical patent/CN111818083A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • H04W40/10Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/32Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an information security collection and interaction system based on a cloud server, which comprises an information collection module and the cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a plurality of databases of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information. According to the invention, the sensing information is collected through the Internet of things technology, and the sensing information of different cluster heads is assigned with corresponding access authority levels through the cloud server, so that the sensing information is only transmitted to users with access authority or is provided for users with authority to check, and the safety is high.

Description

Information security collection and interaction system based on cloud server
Technical Field
The invention relates to the technical field of information security, in particular to an information security collection and interaction system based on a cloud server.
Background
In the related art, sensing information is usually manually collected and directly sent to a cloud server by a user terminal for storage, the cloud server is not intelligent and convenient, the sensing information is easily tampered and peeped by a third party in the information interaction process of the user terminal and the cloud server, and information safety cannot be guaranteed.
Disclosure of Invention
In order to solve the problems, the invention provides an information security collection and interaction system based on a cloud server.
The purpose of the invention is realized by adopting the following technical scheme:
the invention provides an information security collection and interaction system based on a cloud server, which comprises an information collection module and the cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a database of a plurality of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information.
In an implementation manner, the cloud server stores an access permission level list corresponding to an identifier of each cluster head, and the cloud server allocates a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
In an implementation manner, the cloud server receives access application information sent by a user terminal, verifies the access application information, and receives a data query request sent by the user terminal after the verification is passed.
In an implementation manner, the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
In an implementation manner, the identification information of the user terminal includes an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored by the cloud server, the cloud server determines that the authentication is passed.
In an implementation manner, the cloud server encrypts the perception information in the database partition according to the access permission level by using a corresponding preset encryption algorithm.
The invention has the beneficial effects that: the sensing information is collected through the Internet of things technology, the cloud server distributes corresponding access authority levels to the sensing information of different cluster heads, the sensing information is guaranteed to be only transmitted to users with access authority or users with authority to check, the sensing information is effectively prevented from being tampered and peeped by a third party in the transmission process, the safety of the collected sensing information is guaranteed, and the information is safely interacted between the cloud server and a user terminal.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
Fig. 1 is a block diagram illustrating a structure of a cloud server-based information security collection and interaction system according to an exemplary embodiment of the present invention.
Reference numerals:
the system comprises an information acquisition module 1 and a cloud server 2.
Detailed Description
The invention is further described with reference to the following examples.
Referring to fig. 1, an embodiment of the present invention provides an information security collection and interaction system based on a cloud server, where the system includes an information collection module 1 and a cloud server 2, the information collection module 1 includes a sink node, a cluster head, and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to a corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server 2; the cloud server 2 is provided with a database with a plurality of database partitions, the cloud server 2 allocates corresponding access authority levels to the sensing information collected by the cluster heads according to the identification of the cluster heads, and the sensing information collected by the cluster heads is stored in the database partitions corresponding to the access authority levels of the sensing information.
In an implementation manner, the cloud server 2 stores an access permission level list corresponding to the identifier of each cluster head, and the cloud server 2 allocates a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
In an implementation manner, the cloud server 2 receives access application information sent by a user terminal, verifies the access application information, and receives a data query request sent by the user terminal after the verification is passed.
In an implementation manner, the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server 2 sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
In an implementation manner, the identification information of the user terminal includes an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored in the cloud server 2, the cloud server 2 determines that the authentication is passed. In another implementation manner, the identification information of the user terminal may further include a face image, and when the face image is successfully matched and identified with a face image pre-stored in the cloud server 2, the cloud server 2 determines that the authentication is passed.
In an implementation manner, the cloud server 2 encrypts the sensing information in the database partition according to the access permission level by using a corresponding preset encryption algorithm.
According to the embodiment of the invention, the sensing information is collected through the Internet of things technology, the sensing information of different cluster heads is distributed with corresponding access authority levels through the cloud server 2, the sensing information is only transmitted to users with access authority or is provided for users with authority to check, the sensing information is effectively prevented from being tampered and peeped by a third party in the transmission process, the safety of the collected sensing information is ensured, and the information is safely interacted between the cloud server 2 and a user terminal.
In one implementation mode, if the distance between each sensor node in the cluster and the cluster head does not exceed the set communication distance threshold dσDirectly communicating with the cluster head; if the distance between the cluster head and the cluster head exceeds the set communication distance threshold value dσThe sensor node selects a neighbor node closer to the cluster head relative to the sensor node for communication, and specifically comprises the following steps:
(1) the sensor node selects the neighbor nodes meeting the following path conditions as the candidate next hop nodes in the neighbor nodes closer to the cluster head relative to the sensor node, and the neighbor nodes are classified into the candidate next hop node set:
Figure BDA0002597632100000031
in the formula, OiCorresponding cluster head, d (j, O), representing sensor node ii) Represents the jth neighbor node to O in the neighbor nodes of the sensor node i closer to the cluster head relative to the neighbor nodesiD (k, O)i) Represents the k-th neighbor node to O in the neighbor nodes of the sensor node i closer to the cluster head relative to the sensor node iiDistance of (m)iThe number of neighbor nodes of the sensor node i which are closer to the cluster head relative to the sensor node i;
(2) and the sensor node selects the neighbor node with the maximum current residual energy from the candidate next hop node set for communication.
Wherein, other sensor nodes in the communication range of the sensor node i are called as neighbor nodes of the sensor node i.
In the communication routing mechanism, whether the sensor node is in direct communication with the cluster head or not is determined through the distance, so that the sensing information collected by the sensor node can be reliably and stably sent to the cluster head. The path conditions are innovatively set, so that when the sensor node with the distance to the cluster head exceeding the set communication distance threshold selects the next hop, the sensor node can avoid selecting the next hop far away from the cluster head, the transmission delay of the sensing information can be effectively reduced, and the occurrence rate of the phenomenon of sensing information packet loss caused by data stream interference during multi-hop transmission is reduced.
In one implementation, the distance between the cluster head and the sink node does not exceed the preset lower distance limit dWhen the cluster head is in communication with the sink node, the cluster head directly communicates with the sink node; the distance between the cluster head and the sink node exceeds a preset lower distance limit dThe cluster head sends the sensing information to the sink node in a multi-hop routing mode, wherein the cluster head selects the neighbor cluster head with the largest weight value as the next hop from the neighbor cluster heads closer to the sink node;
the calculation formula of the set weight is as follows:
Figure BDA0002597632100000041
in the formula, QabThe cluster head weight is the weight of a neighbor cluster head which is closer to a sink node from the b th cluster head of the cluster head a, d (b, sink) is the distance from the neighbor cluster head which is closer to the sink node from the b th cluster head to the sink node, d (a, sink) is the distance from the cluster head a to the sink node, sink represents the sink node, d (a, b) is the distance from the cluster head a to the neighbor cluster head which is closer to the sink node from the b th cluster head; lambda [ alpha ]1、λ2Is the set weight coefficient.
In the routing mechanism, when the distance between the cluster head and the sink node exceeds a preset distance lower limit, the cluster head selects a neighbor cluster head with the largest weight as a next hop, so that the reliability of sensing information transmission is improved, the total length of a sensing information transmission path can be shortened as much as possible, and the cost of sensing information transmission is saved.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the system is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the system and the terminal described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an application specific integrated circuit, a digital signal processor, a digital signal processing system, a programmable logic device, a field programmable gate array, a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. The computer-readable medium can include, but is not limited to, random access memory, read only memory images, electrically erasable programmable read only memory or other optical disk storage, magnetic disk storage media or other magnetic storage systems, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (6)

1. A cloud server-based information security collection and interaction system is characterized by comprising an information collection module and a cloud server, wherein the information collection module comprises a sink node, a cluster head and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the sink node transmits the sensing information collected by the cluster head to the cloud server; the cloud server is provided with a database of a plurality of database partitions, allocates corresponding access authority levels for the sensing information collected by the cluster heads according to the identification of the cluster heads, and stores the sensing information collected by the cluster heads in the database partitions corresponding to the access authority levels of the sensing information.
2. The system as claimed in claim 1, wherein the cloud server stores an access permission level list corresponding to the identifier of each cluster head, and the cloud server assigns a corresponding access permission level to the sensing information collected by the cluster head according to the access permission level list.
3. The system as claimed in claim 1, wherein the cloud server receives access application information from the user terminal, verifies the access application information, and receives a data query request from the user terminal after the verification is passed.
4. The information security collection and interaction system based on the cloud server as claimed in claim 3, wherein the access application information includes identification information of the user terminal and an access permission level corresponding to the identification information, the data query request includes a database partition identifier requesting access, and the cloud server sends the sensing information in the database partition corresponding to the database partition identifier to the user terminal when the access permission level corresponding to the user terminal is consistent with the access permission level corresponding to the database partition identifier.
5. The system of claim 4, wherein the identification information of the user terminal comprises an account and a password, and when the account and the password are consistent with a standard account and a corresponding password pre-stored by the cloud server, the cloud server determines that the authentication is passed.
6. The information security collection and interaction system based on cloud server as claimed in any one of claims 1-5,
and the cloud server encrypts the perception information in the database partition by adopting a corresponding preset encryption algorithm according to the access authority level.
CN202010714230.XA 2020-07-22 2020-07-22 Information security collection and interaction system based on cloud server Withdrawn CN111818083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010714230.XA CN111818083A (en) 2020-07-22 2020-07-22 Information security collection and interaction system based on cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010714230.XA CN111818083A (en) 2020-07-22 2020-07-22 Information security collection and interaction system based on cloud server

Publications (1)

Publication Number Publication Date
CN111818083A true CN111818083A (en) 2020-10-23

Family

ID=72862258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010714230.XA Withdrawn CN111818083A (en) 2020-07-22 2020-07-22 Information security collection and interaction system based on cloud server

Country Status (1)

Country Link
CN (1) CN111818083A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069477A (en) * 2020-11-16 2020-12-11 南京孜博汇信息科技有限公司 Method for processing writing information of multiple users
CN116319088A (en) * 2023-05-17 2023-06-23 深圳前海翼联科技有限公司 Method for monitoring route node state and collecting information of Internet of things
WO2024138580A1 (en) * 2022-12-29 2024-07-04 北京小米移动软件有限公司 Wireless sensing communication method, apparatus, device and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069477A (en) * 2020-11-16 2020-12-11 南京孜博汇信息科技有限公司 Method for processing writing information of multiple users
WO2024138580A1 (en) * 2022-12-29 2024-07-04 北京小米移动软件有限公司 Wireless sensing communication method, apparatus, device and storage medium
CN116319088A (en) * 2023-05-17 2023-06-23 深圳前海翼联科技有限公司 Method for monitoring route node state and collecting information of Internet of things
CN116319088B (en) * 2023-05-17 2023-08-29 深圳前海翼联科技有限公司 Method for monitoring route node state and collecting information of Internet of things

Similar Documents

Publication Publication Date Title
US10452824B2 (en) Method and apparatus for optimized access of security credentials via mobile edge-computing systems
CN108306887B (en) Block chain-based Internet of things security and data privacy protection system
CN111818083A (en) Information security collection and interaction system based on cloud server
US10070311B2 (en) Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus
US9882912B2 (en) System and method for providing authentication service for internet of things security
KR102242766B1 (en) Identity registration method and device
US7302252B2 (en) Authentication systems, wireless communication terminals, and wireless base stations
JP7421771B2 (en) Methods, application servers, IOT devices and media for implementing IOT services
US20080271150A1 (en) Security based on network environment
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
US20190141048A1 (en) Blockchain identification system
US10785205B2 (en) Computer readable storage media for legacy integration and methods and systems for utilizing same
CN109218981A (en) Wi-Fi access authentication method based on position signal feature common recognition
US20070028117A1 (en) Method and apparatus for facilitating multi-level computer system authentication
CN113242230A (en) Multi-level authentication and access control system and method based on intelligent contracts
CN106506491B (en) Network safety system
CN113051605A (en) Individual privacy information use management system and method based on block chain
CN114363091B (en) Method and system for realizing unified login of platform application based on APISIX
JP5035521B2 (en) Authentication system
CN111193754B (en) Data access method, system and equipment applied to Internet of things
CN116170806B (en) Smart power grid LWM2M protocol security access control method and system
KR20190091511A (en) Random message based data message authentication
KR100931213B1 (en) Low cost RFID authentication protocol method suitable for distributed environment
CN113518124B (en) Internet of things equipment authentication method based on cellular block chain network
CN109905461B (en) Information exchange method and system based on cloud service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201023

WW01 Invention patent application withdrawn after publication