CN112115493B - Data leakage protection system based on data acquisition - Google Patents

Data leakage protection system based on data acquisition Download PDF

Info

Publication number
CN112115493B
CN112115493B CN202010972286.5A CN202010972286A CN112115493B CN 112115493 B CN112115493 B CN 112115493B CN 202010972286 A CN202010972286 A CN 202010972286A CN 112115493 B CN112115493 B CN 112115493B
Authority
CN
China
Prior art keywords
module
file
data
port
sensitive data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010972286.5A
Other languages
Chinese (zh)
Other versions
CN112115493A (en
Inventor
廉明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Changtai Technology Co ltd
Original Assignee
Anhui Changtai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Changtai Technology Co ltd filed Critical Anhui Changtai Technology Co ltd
Priority to CN202010972286.5A priority Critical patent/CN112115493B/en
Publication of CN112115493A publication Critical patent/CN112115493A/en
Application granted granted Critical
Publication of CN112115493B publication Critical patent/CN112115493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Virology (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data acquisition-based data leakage protection system, which belongs to the technical field of big data management and comprises a sensitive data scanning unit, an intelligent encryption unit, a leakage prevention detection unit and a port management unit; the sensitive data scanning unit is used for scanning files containing sensitive data in a database; the intelligent encryption unit is used for encrypting files containing sensitive data; the anti-leakage detection unit is used for detecting a file containing sensitive data and preventing the file from leaking; the port management unit comprises a port control module for managing ports for accessing the database. Sensitive data scanning is carried out on the database, files with sensitive data are marked and encrypted, the encrypted files can effectively prevent data leakage, the marked files can be traced back to the operation port, and the port can be effectively prevented from being attacked by viruses through the management port, so that the data protection effect is improved.

Description

Data leakage protection system based on data acquisition
Technical Field
The invention relates to the technical field of big data management, in particular to a data leakage protection system based on data acquisition.
Background
Currently, the global big data industry is in active development period, technology evolution and application innovation are advanced in parallel and rapidly, novel data storage, calculation and analysis key technologies such as a non-relational database, distributed parallel calculation, machine learning and deep mining are developed and rapidly developed, big data mining and analysis begin to conduct and penetrate to the traditional first industry and the traditional second industry while creating business values and application values in the industries such as telecommunication, internet, finance, traffic and medical treatment, and big data gradually become national basic strategic resources and social basic production elements.
At the same time, big data security issues are gradually exposed. The big data becomes a key target of network attack due to the huge value of the big data and a centralized storage management mode, the problems of lasso attack and data leakage of the big data become serious day by day, and global big data security events are in a frequent situation. Correspondingly, the security requirement of big data has already urged the research and development and production of relevant security technology, solution and product, but compare with industry development, there is hysteresis, because the big data gives the characteristics of being by a large amount of data, and it is convenient to visit, therefore the data of keeping in the database reveals very easily, traditional data leak-proof mode generally adopts the mode to data encryption, but encrypted data will cause huge loss once cracked, and when the user visits the database through each port, the port also receives the attack easily, lead to revealing away from the data that the port visited, therefore traditional data leak-proof system protective effect is relatively poor.
Disclosure of Invention
The invention aims to solve the problems that the encrypted data of the data leakage prevention system is easy to crack, and the port is attacked to cause data leakage and loss, and provides a data leakage prevention system based on data acquisition.
The invention achieves the above purpose through the following technical scheme, a data leakage protection system based on data acquisition comprises a sensitive data scanning unit, an intelligent encryption unit, a leakage prevention detection unit and a port management unit;
the sensitive data scanning unit is used for scanning files containing sensitive data in a database;
the intelligent encryption unit is used for encrypting files containing sensitive data;
the leakage-proof detection unit is used for detecting a file containing sensitive data and preventing the file from leaking;
the port management unit comprises a port control module for managing ports for accessing the database.
Preferably, the intelligent encryption unit comprises a file encryption module and a file decryption module, the file encryption module is used for encrypting the file containing the sensitive data, and the file decryption module is used for decrypting the encrypted file.
Preferably, the intelligent encryption unit further comprises a user authentication module and a file destruction module, wherein the user authentication module is used for verifying user information for accessing the database, the file decryption module is started after the authentication is completed, the file destruction module is used for destroying files containing sensitive data, the file destruction module is started when the situation that the files in the database leave the database is detected.
Preferably, the anti-leakage detection unit includes a label deployment module and a monitoring and tracking module, the label deployment module is used for labeling the file containing the sensitive data, and the monitoring and tracking module is used for monitoring and operating the user port of the file containing the sensitive data.
Preferably, the port control module comprises a plug-in installation module, a network acquisition module, a virus killing module and an operation uploading module.
Preferably, the port control module is remotely installed on a port server connected with the database, the plug-in installation module is used for installing a control plug-in on the port server, the control plug-in comprises a login verification plug-in and a network card scanning plug-in, the network acquisition module and the virus searching and killing module are used for acquiring network flow data on the network card and searching and killing viruses on a network with bugs or viruses, and the operation uploading module is used for uploading an operation log on the port back to a background.
Compared with the prior art, the invention has the beneficial effects that: sensitive data scanning is carried out on a database, files with sensitive data are marked and encrypted, the encrypted files can effectively prevent data leakage, the marked files can be traced back to an operation port, and then the files are managed through a management port, so that the ports can be effectively prevented from being attacked by viruses, and the data protection effect is improved; the file encryption adopts an intelligent encryption mode, so that files containing sensitive data can be checked on line, once the files are downloaded or forwarded, the destruction function is automatically started, the files are prevented from being leaked in a large range, and the file storage safety is better.
Drawings
FIG. 1 is a schematic diagram of the overall system of the present invention.
Fig. 2 is a flowchart of an encryption method of an intelligent encryption unit according to the present invention.
FIG. 3 is a schematic diagram of the port control module of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, a data acquisition-based data leakage protection system includes a sensitive data scanning unit, an intelligent encryption unit, a leakage prevention detection unit, and a port management unit; the sensitive data scanning unit is used for scanning files containing sensitive data in the database, carrying out full or incremental scanning on data stored on a disk of the database at regular time, and identifying whether the scanned files contain the sensitive data or not by combining a content identification technology; the intelligent encryption unit is used for encrypting the file containing the sensitive data and not processing the file not containing the sensitive data; the anti-leakage detection unit is used for detecting the file containing the sensitive data to prevent the file from leaking and not processing the file not containing the sensitive data, so that the file containing the sensitive data in the database is encrypted and marked, the file can be effectively prevented from leaking out through encryption, and the subsequent tracking operation can be facilitated through marking; the port management unit comprises a port control module, the port control module is used for managing ports for accessing the database, the port management unit is used for managing port nodes for accessing the database, each port can be traced to the position of the port when looking at marked files containing sensitive data, and the port can be prevented from being attacked to cause data leakage by managing the port.
The intelligent encryption unit comprises a file encryption module and a file decryption module, the file encryption module is used for encrypting a file containing sensitive data, the encrypted file is decrypted by the file decryption module, the intelligent encryption unit further comprises a user authentication module and a file destroying module, the user authentication module is used for verifying user information of an access database, the file decryption module is started after authentication is completed, the file destroying module is used for destroying the file containing the sensitive data, the file destroying module is started after detecting that the file of the database leaves the database, as shown in figure 2, the file containing the sensitive data is encrypted, when the user accesses the encrypted file in the database, the user authentication module verifies the identity of the user, the user authentication module can also set an authentication authority level, the user accessing common files and accessing the encrypted file is divided, the situation that the user logging in the database is too much to manage the file is prevented, only the authenticated user can use the file decryption module to decrypt the encrypted file to check the sensitive data of the file, and the file module is used for detecting whether the user is online checking the file or downloading and forwarding the file, once the file is detected, the file is transferred and opened, the file is automatically destroyed to protect the file if the file, and the encrypted file can be deleted, and the file can be automatically deleted. Similarly, when a user edits a plaintext file normally, if corresponding sensitive information is added, the file can be automatically encrypted into a ciphertext file when being stored, so that the security of terminal data can be ensured, and the user experience is enhanced.
The anti-leakage detection unit comprises a mark deployment module and a monitoring and tracking module, the mark deployment module is used for marking files containing sensitive data, the monitoring and tracking module is used for monitoring and operating user ports of the files containing the sensitive data, the mark deployment module generates a database internal sensitive data distribution diagram through marks, and an automatic periodic incremental scanning strategy is configured, so that a user can be helped to master the distribution conditions of sensitive information inside an enterprise in real time, including file names, file types, storage paths, quantity and the like.
As shown in fig. 3, the port control module includes a plug-in installation module, a network acquisition module, a virus searching and killing module, and an operation uploading module, the port control module is remotely installed on a port server connected to the database, wherein the plug-in installation module is used to install the control plug-in on the port server, the control plug-in includes a login verification plug-in and a network card scanning plug-in, the network acquisition module and the virus searching and killing module are used to acquire network flow data on the network card and perform virus searching and killing on a network with bugs or viruses, the operation uploading module is used to upload operation logs on the port back to the background, when each port is connected to the database, the login verification plug-in and the network card scanning plug-in are installed in the port, when the tracking and monitoring module inside the leak-proof detection unit is positioned to an encrypted file that the port is accessing the database, the network acquisition module and the virus searching and killing module work together to scan and search and kill viruses on the network, thereby preventing the port from being attacked by viruses and causing leakage of the data file.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (3)

1. The utility model provides a protection system that data was revealed based on data acquisition which characterized in that: the system comprises a sensitive data scanning unit, an intelligent encryption unit, an anti-leakage detection unit and a port management unit;
the sensitive data scanning unit is used for scanning files containing sensitive data in a database;
the intelligent encryption unit is used for encrypting files containing sensitive data;
the leakage-proof detection unit is used for detecting a file containing sensitive data and preventing the file from leaking;
the port management unit comprises a port control module, and the port control module is used for managing ports for accessing the database;
the port control module comprises a plug-in mounting module, a network acquisition module, a virus searching and killing module and an operation uploading module;
the port control module is remotely installed on a port server which is connected with the database, wherein the plug-in installation module is used for installing a control plug-in on the port server, the control plug-in comprises a login verification plug-in and a network card scanning plug-in, the network acquisition module and the virus searching and killing module are used for acquiring network flow data on the network card and searching and killing viruses of networks with bugs or viruses, and the operation uploading module is used for uploading an operation log on the port back to a background;
the leakage-proof detection unit comprises a mark deployment module and a monitoring tracking module, wherein the mark deployment module is used for marking a file containing sensitive data, and the monitoring tracking module is used for monitoring and operating a user port of the file containing the sensitive data.
2. The system for protecting data leakage based on data acquisition according to claim 1, wherein: the intelligent encryption unit comprises a file encryption module and a file decryption module, the file encryption module is used for encrypting the file containing the sensitive data, and the file decryption module is used for decrypting the encrypted file.
3. The system for protecting data leakage based on data acquisition according to claim 2, wherein: the intelligent encryption unit further comprises a user authentication module and a file destroying module, wherein the user authentication module is used for verifying user information for accessing the database, the file decryption module is started after the authentication is completed, the file destroying module is used for destroying files containing sensitive data, and the file destroying module is started when the situation that the files in the database leave the database is detected.
CN202010972286.5A 2020-09-16 2020-09-16 Data leakage protection system based on data acquisition Active CN112115493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010972286.5A CN112115493B (en) 2020-09-16 2020-09-16 Data leakage protection system based on data acquisition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010972286.5A CN112115493B (en) 2020-09-16 2020-09-16 Data leakage protection system based on data acquisition

Publications (2)

Publication Number Publication Date
CN112115493A CN112115493A (en) 2020-12-22
CN112115493B true CN112115493B (en) 2022-11-18

Family

ID=73803204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010972286.5A Active CN112115493B (en) 2020-09-16 2020-09-16 Data leakage protection system based on data acquisition

Country Status (1)

Country Link
CN (1) CN112115493B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733188B (en) * 2021-01-13 2023-09-22 航天晨光股份有限公司 Sensitive file management method

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098224B (en) * 2006-06-28 2010-08-25 中色科技股份有限公司 Method for encrypting/deciphering dynamically data file
JP5601840B2 (en) * 2010-01-08 2014-10-08 株式会社日立ソリューションズ Information leak prevention device to network
CN102004883B (en) * 2010-12-03 2012-06-13 中国软件与技术服务股份有限公司 Trace tracking method for electronic files
CN108521431A (en) * 2018-04-25 2018-09-11 信阳师范学院 A kind of information security of computer network system
CN109525558B (en) * 2018-10-22 2022-02-22 深信服科技股份有限公司 Data leakage detection method, system, device and storage medium
CN109492397A (en) * 2018-11-15 2019-03-19 平顶山工业职业技术学院(平顶山煤矿技工学校) A kind of computer information safe system
CN110049021A (en) * 2019-03-27 2019-07-23 中国电力科学研究院有限公司 Data of information system safety protecting method and system
CN111062055B (en) * 2019-12-13 2021-12-24 江苏智谋科技有限公司 Electronic file sensitive data leakage prevention system and method based on information security
CN111324900A (en) * 2020-02-18 2020-06-23 上海迅软信息科技有限公司 Anti-disclosure system for enterprise data security

Also Published As

Publication number Publication date
CN112115493A (en) 2020-12-22

Similar Documents

Publication Publication Date Title
Li et al. Research on the architecture of trusted security system based on the internet of things
CN102999732B (en) Multi-stage domain protection method and system based on information security level identifiers
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN103530570A (en) Electronic document safety management system and method
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
CN102111267A (en) Website safety protection method based on digital signature and system adopting same
CN109976239A (en) Industrial control system terminal security guard system
CN103413088A (en) Computer document operational safety audit system
CN112115199A (en) Data management system based on block chain technology
CN107463839A (en) A kind of system and method for managing application program
CN111914300A (en) Document encryption device and method for preventing file leakage
CN114157457A (en) Authority application and monitoring method for network data information security
CN112115493B (en) Data leakage protection system based on data acquisition
CN113132318A (en) Active defense method and system for information safety of power distribution automation system master station
CN112837194A (en) Intelligent system
CN114218194A (en) Data bank safety system
Zheng The application of information security encryption technology in military data system management
CN103001937A (en) System and method for defending against mobile storage medium virus in island-like Ethernet
CN105608344A (en) Application program safety management system and method
CN101408919A (en) Method and system for monitoring computer espionage behavior
CN103488949B (en) A kind of electronic document security system
CN115941743A (en) Method and system for identity authentication and data backup
CN107315963A (en) A kind of financial management method with remote access function
CN106650492A (en) Multi-device file protection method and device based on security catalog
CN112565279A (en) Sensor signal processing system based on safety network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 230000 floors 4-5, building A1, Zhongguancun collaborative innovation Zhihui Park, the intersection of Nanfeihe road and Lanzhou Road, Baohe Economic Development Zone, Hefei, Anhui Province

Applicant after: Anhui Changtai Technology Co.,Ltd.

Address before: 230000 floor 13, building 2-C, China sound Valley International Intelligent Voice Industrial Park, 3333 Xiyou Road, high tech Zone, Hefei City, Anhui Province

Applicant before: ANHUI CHANGTAI INFORMATION SECURITY SERVICE Co.,Ltd.

GR01 Patent grant
GR01 Patent grant