CN112732193B - Information security storage system based on big data - Google Patents

Information security storage system based on big data Download PDF

Info

Publication number
CN112732193B
CN112732193B CN202110036439.XA CN202110036439A CN112732193B CN 112732193 B CN112732193 B CN 112732193B CN 202110036439 A CN202110036439 A CN 202110036439A CN 112732193 B CN112732193 B CN 112732193B
Authority
CN
China
Prior art keywords
server
data
screening
servers
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110036439.XA
Other languages
Chinese (zh)
Other versions
CN112732193A (en
Inventor
梁有君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG AOFEI DATA TECHNOLOGY Co.,Ltd.
Original Assignee
Guangdong Aofei Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Aofei Data Technology Co ltd filed Critical Guangdong Aofei Data Technology Co ltd
Priority to CN202110036439.XA priority Critical patent/CN112732193B/en
Publication of CN112732193A publication Critical patent/CN112732193A/en
Application granted granted Critical
Publication of CN112732193B publication Critical patent/CN112732193B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0635Configuration or reconfiguration of storage systems by changing the path, e.g. traffic rerouting, path reconfiguration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an information security storage system based on big data, which is used for solving the problem that security information is safely transferred after being attacked under the condition of big data; when a central server in the big data platform is attacked, the information migration module generates simulation data, sends the simulation data to a second screening server, a preferred second screening server and a preferred third screening server, and transfers the first data to an escape server through a transfer server; the first data are sent to the escape servers through a sequential progressive method, so that the transmission delay caused by long transmission distance is reduced and the safety of the information in the transmission process is ensured in the information transfer process due to the fact that the adjacent servers are selected for transmission, and meanwhile, the escape servers are selected to be random finally due to the fact that the track of the data for migration changes in real time according to a large data platform, so that the safety of information storage is greatly improved, and the data are prevented from being stolen again after being transferred and tracked.

Description

Information security storage system based on big data
Technical Field
The invention belongs to the field of big data, relates to an information security storage technology, and particularly relates to an information security storage system based on big data.
Background
The information security mainly comprises physical security and logic security; physical security refers to tangible security protection of related facilities such as various communication devices and circuit elements in a network system, and logical security refers to intangible security protection of integrity, confidentiality and availability of various information in the network system; in the case that any one of the aspects is less than the safety supervision, the information safety is severely affected. Most of the existing information security storage systems perform identification, recording and analysis on login operation of users, and only achieve the effect of monitoring malicious attack of stored information by external intrusion software in the information input process, but are difficult to combine the internal working environment condition and the external operating equipment condition in the information input process with the overall carrying condition in the information storage process to make a hierarchical cascading supervision scheme so as to achieve the effects of area-scope monitoring and point-to-point feedback of information security; however, in the prior art, security reinforcement and protection are performed on the storage server, and the advantages of interconnection and intercommunication of a plurality of servers under a large data server are ignored.
Disclosure of Invention
The invention aims to provide an information security storage system based on big data, which is used for solving the problem that security information is safely transferred after being attacked under the condition of big data.
The purpose of the invention can be realized by the following technical scheme:
an information security storage system based on big data comprises a big data platform, a danger sensing module, a route exploring module, a line planning module, an information migration module and an identity verification module;
when a central server in the big data platform is attacked, the information migration module generates simulation data, sends the simulation data to a second screening server, a preferred second screening server and a preferred third screening server, and transfers the first data to an escape server through a transfer server.
Furthermore, a plurality of servers with a storage function are arranged in the big data platform, and the servers are connected through cables;
the identity authentication module is used for authenticating the information storage user; the danger sensing module is used for verifying the safety index of a server connected with the central server; the path exploring module is used for conducting danger exploration on all servers in the big data platform; the circuit planning module is used for planning a first data transfer path; the identity authentication module is used for authenticating a medium for reading and storing the first data;
the medium is authenticated by the authentication module and stores first data to the plurality of servers, specifically,
a1: the big data platform classifies first data and calculates the size of a first data byte;
a2: the big data platform generates simulation data which is equal to the number of the servers in the big data platform, the type of the simulation data is the same as that of the first data, and the size of the simulation data is the same as that of the first data;
a3: sending simulation data to all servers in the big data platform;
a4: performing compression operation on the simulation data in all the servers at the same time, correspondingly generating compressed data in the servers, and recording the compression time;
a5: when all the servers generate compressed data, decompressing the compressed data in all the servers at the same time, correspondingly generating decompressed data in the servers, and recording the decompressing time;
a6: after the compressed data in all the servers are decompressed, obtaining storage values corresponding to all the servers, and selecting the server with the highest storage value as a central storage;
a7: the big data platform stores the first data in a central memory.
Furthermore, after the big data platform generates the central server, the danger sensing module monitors data stored in the central server in real time;
wherein, the central server is monitored through 360, velveteen and Jinshan poison tyrant.
Further, the path exploring module conducts feasibility screening on all servers in the big data platform in real time through a feasibility model.
Further, the feasibility model comprises a storage calculation unit, an attack statistic unit, a storage comparison unit and a transmission rate unit;
the storage computing unit is used for reading the remaining storage space of the server in the big data platform and marking the server with the remaining storage space larger than a storage threshold value as a first screening server;
the attack statistical unit is used for reading the total operation time length, the total downtime time length, the total attacked times and the total defense times of the first screening server, obtaining a corresponding operation safety value of the server through a second screening formula, and marking the first screening server with the operation safety value larger than a safety threshold value as a second screening server;
the storage comparison unit is used for storing the corresponding storage value of the server and marking the second screening server with the storage value larger than the storage threshold value as the preferred second screening server;
the transmission rate unit is used for acquiring the transmission rate between adjacent servers and marking the second screening server with the transmission rate greater than the transmission threshold value as a preferred third screening server.
Further, the route planning module selects a server which is the optimal third screening server and the optimal second screening server at the same time as the escape server, and plans an escape route;
the escape server meets the condition that at least 3 adjacent servers are connected with the escape server, and the number of the second screening servers or the preferred third screening servers passing through the escape server and the central server is the least.
Further, the planned escape route may, in particular,
b1, marking the central server as a starting point, and marking a second screening server or a preferred third screening server connected with the central server as a first transfer area;
b2, acquiring the second screening server or the preferred third screening server connected with the first transfer area and marking the second screening server or the preferred third screening server as a second transfer area;
b3, acquiring the second screening server or the preferred third screening server connected with the second transfer area and marking the second screening server or the preferred third screening server as a third transfer area;
b4, repeating the step B3 until an escape server appears in the Nth transfer area;
b5, marking the second screening server or the preferred third screening server from the first transfer area to the Nth transfer area as a transfer server;
when the first transfer area is transferred to the second transfer area, preferentially selecting a preferred second screening server or a preferred third screening server as a next transfer area;
when there is no preferred second screening server or preferred third screening server around the transfer area, the second screening server can be used as the next transfer area.
Further, the attack statistical unit is configured to read the total operation duration, the total downtime duration, the total attacked times and the total defense times of the first screening server, obtain a corresponding operation safety value of the server according to a second screening formula, and mark the first screening server, of which the operation safety value is greater than the safety threshold value, as a second screening server;
the second screening formula is specifically that the total operation time length is divided by the total downtime time length and then multiplied by a safety proportionality coefficient; the safety proportion coefficient is obtained by dividing the total defense times by the total attacked times;
and the total operation time, the total downtime time, the total attacked times and the total defense times are all acquired from the operation data of the big data platform.
Further, the transmission rate between the adjacent servers is obtained through a transmission formula;
the transmission formula is obtained by dividing the sum of the no-load transmission number rate and the full-load transmission number rate by two;
the no-load transmission rate is specifically the transmission rate of the simulation data between the adjacent servers in the no-load transmission state;
the full-load transmission rate is specifically the transmission rate of the simulation data between the adjacent servers in the full-load transmission state.
Further, the storage threshold, the safety threshold and the transmission threshold are all set through the first data storage medium.
Compared with the prior art, the invention has the beneficial effects that: when a central server in the big data platform is attacked, the information migration module generates simulation data, sends the simulation data to a second screening server, a preferred second screening server and a preferred third screening server, and transfers the first data to an escape server through a transfer server; the first data are sent to the escape servers through a sequential progressive method, so that the transmission delay caused by long transmission distance is reduced and the safety of the information in the transmission process is ensured in the information transfer process due to the fact that the adjacent servers are selected for transmission, and meanwhile, the escape servers are selected to be random finally due to the fact that the track of the data for migration changes in real time according to a large data platform, so that the safety of information storage is greatly improved, and the data are prevented from being stolen again after being transferred and tracked.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic block diagram of the present invention;
FIG. 2 is a schematic view of the transfer zone of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Thus, the detailed description of the embodiments of the present invention provided in the following drawings is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention.
As shown in fig. 1, a big data-based information security storage system includes a big data platform, a danger sensing module, a route exploring module, a route planning module, an information migration module, and an identity verification module;
the large data platform is internally provided with a plurality of servers, and the servers are connected through cables;
in the specific implementation of the invention, when a central server in a big data platform is attacked, an information migration module generates simulation data, sends the simulation data to a second screening server, a preferred second screening server and a preferred third screening server, and transfers first data in an escape server through a transfer server; the first data are sent to the escape server through a sequential progressive method, so that the transmission time is prolonged due to long transmission distance in the information transfer process, and the risk that the first data are stolen is further increased;
in order to realize the system, the invention is provided with a big data platform in the concrete implementation, a plurality of servers with storage functions are arranged in the big data platform, and the servers are connected through cables;
preferably, the identity authentication module is used for authenticating the information storage user; preferably, the danger sensing module is used for verifying the safety index of a server connected with the central server; preferably, the path exploring module is used for conducting danger exploration on all servers in the big data platform; preferably, the route planning module is used for planning a first data transfer path; preferably, the identity authentication module is used for authenticating a medium for reading and storing the first data;
it should be noted that the medium may be another storage system or a user, and the present invention is not limited thereto; meanwhile, the identity authentication can be verification code authentication, equipment code authentication and biological characteristic authentication, and the invention is not particularly limited;
after the medium is authenticated by the authentication module, first data is stored in a plurality of servers, specifically,
a1: the big data platform classifies the first data and calculates the size of a first data byte;
specifically, the classification type is a source file type of the first data, such as JPG, MP3, MP4, TXT, etc.;
a2: the big data platform generates simulation data which is equal to the number of the servers in the big data platform, the type of the simulation data is the same as that of the first data, and the size of the simulation data is the same as that of the first data;
a3: sending the simulation data to all servers in the big data platform;
a4: performing compression operation on the simulation data in all the servers at the same time, correspondingly generating compressed data in the servers, and recording the compression time;
a5: when all the servers generate compressed data, decompressing the compressed data in all the servers at the same time, correspondingly generating decompressed data in the servers, and recording the decompressing time;
when the compression operation and the decompression operation are performed, the operation options and algorithms of the compression and the decompression of all the servers are the same;
a6: after the compressed data in all the servers are decompressed, obtaining storage values corresponding to all the servers, and selecting the server with the highest storage value as a central storage;
a7: the big data platform stores the first data in the central memory.
After the big data platform generates the central server, the danger sensing module monitors data stored in the central server in real time;
wherein, the central server is monitored by 360, velveteen and Jinshan poison tyrant, and no specific requirement is made in the invention;
after the big data platform generates the central server, the route exploring module conducts feasibility screening on all servers in the big data platform in real time through the feasibility model.
Specifically, the feasibility model comprises a storage calculation unit, an attack statistical unit, a storage comparison unit and a transmission rate unit;
the storage computing unit is used for reading the remaining storage space of the server in the big data platform and marking the server with the remaining storage space larger than the storage threshold value as a first screening server;
the attack statistical unit is used for reading the total operation time length, the total downtime time length, the total attacked times and the total defense times of the first screening server, obtaining a corresponding operation safety value of the server through a second screening formula, and marking the first screening server with the operation safety value larger than a safety threshold value as a second screening server;
the storage comparison unit is used for storing the corresponding storage value of the server and marking the second screening server with the storage value larger than the storage threshold value as the preferred second screening server;
the transmission rate unit is used for acquiring the transmission rate between the adjacent servers and marking the second screening server with the transmission rate larger than the transmission threshold value as a preferred third screening server.
Specifically, the attack statistical unit is used for reading the total operation time, the total downtime time, the total attacked times and the total defense times of the first screening server, obtaining a corresponding operation safety value of the server through a second screening formula, and marking the first screening server with the operation safety value larger than a safety threshold value as a second screening server;
a second screening formula, specifically, multiplying the total operation time length divided by the total downtime time length by a safety proportionality coefficient; the safety proportion coefficient is obtained by dividing the total defense times by the total attacked times;
the total operation time, the total downtime time, the total attacked times and the total defense times are all obtained from the operation data of the big data platform.
The transmission rate between adjacent servers is obtained through a transmission formula;
the transmission formula is specifically that the sum of the no-load transmission rate and the full-load transmission rate is obtained by dividing by two;
the idle load transmission rate is specifically the transmission rate of the simulation data between the adjacent servers in the idle load transmission state;
the full-load transmission rate is specifically the transmission rate of the simulation data between adjacent servers in the full-load transmission state.
Preferably, the route planning module selects a server which is the preferred third screening server and the preferred second screening server at the same time as the escape server, and plans the escape route;
the escape servers meet the condition that at least 3 adjacent servers are connected with the escape servers, and the number of the second screening servers or the optimized third screening servers passing through the escape servers and the central server is the minimum.
As shown in fig. 2, it is preferable to plan an escape route, specifically,
b1, marking the central server as a starting point, and marking a second screening server or a preferred third screening server connected with the central server as a first transfer area;
b2, acquiring the second screening server or the preferred third screening server connected with the first transfer area and marking the second screening server or the preferred third screening server as a second transfer area;
b3, acquiring the second screening server or the preferred third screening server connected with the second transfer area and marking the second screening server or the preferred third screening server as a third transfer area;
b4, repeating the step B3 until an escape server appears in the Nth transfer area;
b5, marking the second screening server or the preferred third screening server from the first transfer area to the Nth transfer area as a transfer server;
when the first transfer area is transferred to the second transfer area, preferentially selecting the second screening server or the third screening server as the next transfer area;
when there is no preferred second screening server or preferred third screening server around the transfer area, the second screening server can be used as the next transfer area.
In the implementation process of the invention, the storage threshold, the safety threshold and the transmission threshold are all set through the first data storage medium, and the proper threshold can be selected according to the user requirement or the first data safety requirement level.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula which obtains the latest real situation by acquiring a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and there may be other divisions when the actual implementation is performed; the modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the method of the embodiment.
It will also be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above examples are only intended to illustrate the technical process of the present invention and not to limit the same, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical process of the present invention without departing from the spirit and scope of the technical process of the present invention.

Claims (9)

1. An information security storage system based on big data is characterized by comprising a big data platform, a danger sensing module, a path exploring module, a circuit planning module, an information migration module and an identity verification module;
when a central server in the big data platform is attacked, the information migration module generates simulation data, sends the simulation data to a second screening server, a preferred second screening server and a preferred third screening server, and transfers the first data to an escape server through a transfer server;
a plurality of servers with a storage function are arranged in the big data platform, and the servers are connected through cables;
the identity authentication module is used for authenticating the information storage user; the danger sensing module is used for verifying the safety index of a server connected with the central server; the path exploring module is used for conducting danger exploration on all servers in the big data platform; the circuit planning module is used for planning a first data transfer path; the identity authentication module is used for authenticating a medium for reading and storing the first data;
the medium is authenticated by the authentication module and stores first data to the plurality of servers, specifically,
a1: the big data platform classifies first data and calculates the size of a first data byte;
a2: the big data platform generates simulation data which is equal to the number of the servers in the big data platform, the type of the simulation data is the same as that of the first data, and the size of the simulation data is the same as that of the first data;
a3: sending simulation data to all servers in the big data platform;
a4: performing compression operation on the simulation data in all the servers at the same time, correspondingly generating compressed data in the servers, and recording the compression time;
a5: when all the servers generate compressed data, decompressing the compressed data in all the servers at the same time, correspondingly generating decompressed data in the servers, and recording the decompressing time;
a6: after the compressed data in all the servers are decompressed, obtaining storage values corresponding to all the servers, and selecting the server with the highest storage value as a central storage;
a7: the big data platform stores the first data in a central memory.
2. The big data-based information security storage system according to claim 1, wherein after the big data platform generates the central server, the danger sensing module monitors data stored in the central server in real time;
wherein, the central server is monitored through 360, velveteen and Jinshan poison tyrant.
3. The big data-based information security storage system according to claim 2, wherein the path exploration module performs feasibility screening on all servers in the big data platform in real time through a feasibility model.
4. The big data-based information security storage system according to claim 3, wherein the feasibility model comprises a storage calculation unit, an attack statistics unit, a storage comparison unit and a transmission rate unit;
the storage computing unit is used for reading the remaining storage space of the server in the big data platform and marking the server with the remaining storage space larger than a storage threshold value as a first screening server;
the attack statistical unit is used for reading the total operation time length, the total downtime time length, the total attacked times and the total defense times of the first screening server, obtaining a corresponding operation safety value of the server through a second screening formula, and marking the first screening server with the operation safety value larger than a safety threshold value as a second screening server;
the storage comparison unit is used for storing the corresponding storage value of the server and marking the second screening server with the storage value larger than the storage threshold value as the preferred second screening server;
the transmission rate unit is used for acquiring the transmission rate between adjacent servers and marking the second screening server with the transmission rate greater than the transmission threshold value as a preferred third screening server.
5. The big data-based information security storage system according to claim 4, wherein the route planning module selects a server which is a preferred third screening server and a preferred second screening server at the same time as the preferred third screening server as an escape server, and plans an escape route;
the escape server meets the condition that at least 3 adjacent servers are connected with the escape server, and the number of the second screening servers or the preferred third screening servers passing through the escape server and the central server is the least.
6. The big data-based information security storage system according to claim 5, wherein the planned escape route is, in particular,
b1, marking the central server as a starting point, and marking a second screening server or a preferred third screening server connected with the central server as a first transfer area;
b2, acquiring the second screening server or the preferred third screening server connected with the first transfer area and marking the second screening server or the preferred third screening server as a second transfer area;
b3, acquiring the second screening server or the preferred third screening server connected with the second transfer area and marking the second screening server or the preferred third screening server as a third transfer area;
b4, repeating the step B3 until an escape server appears in the Nth transfer area;
b5, marking the second screening server or the preferred third screening server from the first transfer area to the Nth transfer area as a transfer server;
when the first transfer area is transferred to the second transfer area, selecting the preferred second screening server or the preferred third screening server as the next transfer area;
when there is no preferred second screening server or preferred third screening server around the transfer area, the second screening server can be used as the next transfer area.
7. The big-data-based information security storage system according to claim 6, wherein the second filtering formula is obtained by multiplying a total running duration divided by a total downtime duration by a security scaling factor; the safety proportion coefficient is obtained by dividing the total defense times by the total attacked times;
and the total operation time, the total downtime time, the total attacked times and the total defense times are all acquired from the operation data of the big data platform.
8. The big data-based information security storage system according to claim 7, wherein the transmission rate between the adjacent servers is obtained by a transmission formula;
the transmission formula is obtained by dividing the sum of the no-load transmission number rate and the full-load transmission number rate by two;
the no-load transmission rate is specifically the transmission rate of the simulation data between the adjacent servers in the no-load transmission state;
the full-load transmission rate is specifically the transmission rate of the simulation data between the adjacent servers in the full-load transmission state.
9. The big data-based information security storage system according to claim 8, wherein the storage threshold, the security threshold, and the transmission threshold are all set by the first data storage medium.
CN202110036439.XA 2021-01-12 2021-01-12 Information security storage system based on big data Active CN112732193B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110036439.XA CN112732193B (en) 2021-01-12 2021-01-12 Information security storage system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110036439.XA CN112732193B (en) 2021-01-12 2021-01-12 Information security storage system based on big data

Publications (2)

Publication Number Publication Date
CN112732193A CN112732193A (en) 2021-04-30
CN112732193B true CN112732193B (en) 2021-09-21

Family

ID=75590606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110036439.XA Active CN112732193B (en) 2021-01-12 2021-01-12 Information security storage system based on big data

Country Status (1)

Country Link
CN (1) CN112732193B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114611164B (en) * 2022-03-18 2022-10-11 昆山华东信息科技有限公司 Information security management system based on big data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818261A (en) * 2017-09-12 2018-03-20 王振铎 A kind of computer information safe stocking system
CN109167797B (en) * 2018-10-12 2022-03-01 北京百度网讯科技有限公司 Network attack analysis method and device
CN109271772A (en) * 2018-11-22 2019-01-25 宋协栋 A kind of multi-action computer network guard system
CN110138731B (en) * 2019-04-03 2020-02-14 特斯联(北京)科技有限公司 Network anti-attack method based on big data

Also Published As

Publication number Publication date
CN112732193A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN109274717B (en) Block chain based shared storage method, device, medium and electronic equipment
CN111786950B (en) Network security monitoring method, device, equipment and medium based on situation awareness
CN113726784B (en) Network data security monitoring method, device, equipment and storage medium
CN112131317A (en) Data storage safety system based on block chain technology
CN110933040B (en) Block chain based data uplink method, device, equipment and medium
CN109711627A (en) A kind of data processing method and device
CN112487042B (en) Electric energy metering data processing method, device, computer equipment and storage medium
CN112732193B (en) Information security storage system based on big data
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN115174148A (en) Cloud computing and information security oriented cloud service management method and artificial intelligence platform
CN113904811B (en) Abnormality detection method, abnormality detection device, computer device, and storage medium
CN111063407B (en) Medical resource data processing method and system based on block chain
CN112713996A (en) Fault verification method based on block chain, server and terminal
CN116015922B (en) Network security situation analysis method, device and equipment of electric power Internet of things
CN115208604B (en) AMI network intrusion detection method, device and medium
CN112988678B (en) Wisdom cloud data safety protection system based on block chain
CN115714710A (en) Alarm data processing method and device, computer equipment and storage medium
CN113946464A (en) Alarm noise reduction method combining model and experience pre-training and parallel deduction
CN112597490A (en) Security threat arrangement response method and device, electronic equipment and readable storage medium
CN108768747B (en) Platform server for maintaining block chain network
CN111092857A (en) Information security early warning method and device, computer equipment and storage medium
CN117408395B (en) Method and device for optimizing running stability of wind control platform based on digital supply chain
CN112672301B (en) Network data aggregation method for wireless sensor
CN116418580B (en) Data integrity protection detection method and device for local area network and electronic equipment
CN115865428B (en) Edge data storage and integrity verification method based on trust value and erasure code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210901

Address after: 510000 room 1508, No. 8, Jingang Avenue, Nansha street, Nansha District, Guangzhou City, Guangdong Province

Applicant after: GUANGDONG AOFEI DATA TECHNOLOGY Co.,Ltd.

Address before: No. 1312b-b19, 13th floor, Tianhe shopping center, No. 6 and 8 Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong, 510631

Applicant before: Guangzhou Weichuang Information Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant