CN112804222A - Data transmission method, device, equipment and storage medium based on cloud deployment - Google Patents
Data transmission method, device, equipment and storage medium based on cloud deployment Download PDFInfo
- Publication number
- CN112804222A CN112804222A CN202011644229.0A CN202011644229A CN112804222A CN 112804222 A CN112804222 A CN 112804222A CN 202011644229 A CN202011644229 A CN 202011644229A CN 112804222 A CN112804222 A CN 112804222A
- Authority
- CN
- China
- Prior art keywords
- information
- signature information
- acquisition request
- data acquisition
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data transmission method, a data transmission device, data transmission equipment and a data transmission storage medium based on cloud deployment, and relates to the technical field of data transmission. The method comprises the following steps: when a data acquisition request sent by a client is received, extracting signature information in the data acquisition request; judging whether the signature information is repeated signature information according to the local cache record information; when the signature information is not the repeated signature information, forwarding the data acquisition request to a target server; and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client. The invention isolates the communication between the client and the target server, authenticates and forwards the request through the intermediate device, can effectively prevent malicious attack, improves the safety of the server, has strong universality and low cost, and is beneficial to deployment.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a data transmission method, a data transmission device, data transmission equipment and a storage medium based on cloud deployment.
Background
In a network environment, a server is often subjected to various attacks, which cause the server to operate abnormally and even crash. In order to protect the security of the server, security control software is usually installed on the server, but the setting of the security control software is complicated, and the computing resources of the server are consumed. Therefore, how to simply implement security protection of the server is an urgent technical problem to be solved.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a data transmission method, a data transmission device, data transmission equipment and a storage medium based on cloud deployment, and aims to solve the technical problem that in the prior art, a security protection measure architecture of a server is complex.
In order to achieve the above object, the present invention provides a data transmission method based on cloud deployment, which comprises the following steps:
when a data acquisition request sent by a client is received, extracting signature information in the data acquisition request;
judging whether the signature information is repeated signature information according to the local cache record information;
when the signature information is not the repeated signature information, forwarding the data acquisition request to a target server;
and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client.
Optionally, when the signature information is not repeated signature information, forwarding the data acquisition request to the target server, including:
when the signature information is not repeated signature information, acquiring node load information of a target cluster server;
determining a target server from the target cluster server according to the node load information, and acquiring address information of the target server;
extracting request text information in the data acquisition request, and generating a forwarding request according to the request text information and the address information;
and sending the forwarding request to the target server.
Optionally, when the signature information is not repeated signature information, obtaining node load information of the target cluster server includes:
extracting timestamp information from the signature information when the signature information is not repeated signature information;
judging whether the data acquisition request meets a preset condition or not according to the current time information and the timestamp information;
and when the data acquisition request meets a preset condition, acquiring node load information of the target cluster server.
Optionally, when the signature information is not repeated signature information, obtaining node load information of the target cluster server includes:
when the signature information is not repeated signature information, extracting token information from the signature information;
judging whether the data acquisition request is legal or not according to the preset token information and the token information;
and when the data acquisition request is legal, acquiring the node load information of the target cluster server.
Optionally, when a data acquisition request sent by a client is received, extracting signature information in the data acquisition request includes:
when a data acquisition request sent by a client is received, acquiring node load information of a current cluster server;
determining a current processing server from the current cluster server according to the node load information of the current cluster server;
and sending the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request.
Optionally, the determining whether the signature information is the repeated signature information according to the local cache record information includes:
acquiring historical signature information according to the local cache record information;
comparing the signature information with historical signature information to obtain a comparison result;
and judging whether the signature information is repeated signature information according to the comparison result.
Optionally, receiving response data fed back by the target server based on the data obtaining request, and forwarding the response data to the client, where the receiving response data includes:
when response information fed back by a target server based on a data acquisition request is received, determining IP information corresponding to the response information;
judging whether the IP information meets a preset condition or not according to a preset legal IP table;
and when the IP information meets the preset condition, extracting response data from the response information, and forwarding the response data to the client.
In addition, in order to achieve the above object, the present invention further provides a data transmission device based on cloud deployment, including:
the receiving module is used for extracting signature information in a data acquisition request when the data acquisition request sent by a client is received;
the judging module is used for judging whether the signature information is repeated signature information according to the local cache record information;
the request forwarding module is used for forwarding the data acquisition request to a target server when the signature information is not repeated signature information;
and the data forwarding module is used for receiving response data fed back by the target server based on the data acquisition request and forwarding the response data to the client.
In addition, in order to achieve the above object, the present invention further provides a data transmission device based on cloud deployment, where the data transmission device based on cloud deployment includes: the computer program product may include a memory, a processor, and a cloud deployment-based data transfer program stored on the memory and executable on the processor, the cloud deployment-based data transfer program when executed by the processor implementing the steps of the cloud deployment-based data transfer method as described above.
In addition, in order to achieve the above object, the present invention further provides a storage medium, in which a data transmission program based on cloud deployment is stored, and when being executed by a processor, the data transmission program based on cloud deployment implements the steps of the data transmission method based on cloud deployment as above.
When a data acquisition request sent by a client is received, extracting signature information in the data acquisition request; judging whether the signature information is repeated signature information according to the local cache record information; when the signature information is not the repeated signature information, forwarding the data acquisition request to a target server; and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client. The invention isolates the communication between the client and the target server, authenticates and forwards the request through the intermediate device, can effectively prevent malicious attack, improves the safety of the server, has strong universality and low cost, and is beneficial to deployment.
Drawings
Fig. 1 is a schematic structural diagram of a data transmission device based on cloud deployment in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a data transmission method based on cloud deployment according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a data transmission method based on cloud deployment according to a second embodiment of the present invention;
fig. 4 is a schematic flow chart of a data transmission method based on cloud deployment according to a third embodiment of the present invention;
fig. 5 is a block diagram of a first embodiment of a data transmission device based on cloud deployment according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a data transmission device based on cloud deployment in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the data transmission device based on cloud deployment may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), and the optional user interface 1003 may further include a standard wired interface and a wireless interface, and the wired interface for the user interface 1003 may be a USB interface in the present invention. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory or a Non-volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the architecture shown in fig. 1 does not constitute a limitation of a cloud-based deployment of data transfer devices, and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
As shown in fig. 1, a memory 1005, identified as one type of computer storage medium, may include an operating system, a network communication module, a user interface module, and a data transfer program based on a cloud deployment.
In the data transmission device based on cloud deployment shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting user equipment; the data transmission device based on cloud deployment calls a data transmission program based on cloud deployment stored in the memory 1005 through the processor 1001, and executes the data transmission method based on cloud deployment provided by the embodiment of the present invention.
Based on the hardware structure, the embodiment of the data transmission method based on cloud deployment is provided.
Referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the data transmission method based on cloud deployment, and provides the first embodiment of the data transmission method based on cloud deployment.
In a first embodiment, a data transmission method based on cloud deployment includes the steps of:
step S10: when a data acquisition request sent by a client is received, extracting signature information in the data acquisition request.
It should be understood that the executing subject of this embodiment may be the data transmission device based on cloud deployment, where the data transmission device based on cloud deployment has functions of data processing, data communication, program running, and the like, and the data transmission device based on cloud deployment may be a computer device such as a computer or a server, and of course, other devices having similar functions may also be used, and this embodiment is not limited thereto.
It should be understood that the client may be a device such as a mobile phone, a tablet, or a computer, and the user may initiate a data acquisition request to the server through the client, where the data acquisition request may be an HTTP request. In this embodiment, the data obtaining request may include an application call instruction, and the client may call the data obtaining application in the cloud-based deployed data transmission device through the application call instruction to call the required data.
It should be noted that the signature information may be a special identifier for identification in the data acquisition request. In specific implementation, when a client initiates a data acquisition request, each parameter in the data acquisition request is encrypted to obtain signature information. For example, request body data in the data acquisition request is encrypted by the SHA-256 algorithm, and the obtained hash value is used as signature information. Of course, the signature information may also be in other manners, and this embodiment is not limited to this.
Step S20: and judging whether the signature information is the repeated signature information according to the local cache record information.
It should be noted that the local cache record is a processing record of the cloud-deployed data transmission device on the historical data acquisition request, and the local cache record includes signature information in the historical data acquisition request. When the data transmission device deployed by the cloud processes one data acquisition request, the signature information contained in the request is stored in the original cache record.
In a specific implementation, the determining process may be: acquiring historical signature information according to the local cache record information; comparing the signature information with historical signature information to obtain a comparison result; and judging whether the signature information is repeated signature information according to the comparison result. The comparison result has two types, the first type is that the historical signature information has the same information with the signature information, and the second type is that the historical signature information does not have the same information with the signature information. Obviously, if the comparison result is the first type, the signature information is the repeated signature information; if the second type is used, the signature information is not duplicated.
It should be understood that, if there is an attacker hijacking the data acquisition request and using the request to perform DOS attack, the cloud-deployed data transmission device processes the request for the first time, and then the local cache record stores corresponding signature information. Therefore, for the subsequently received request, the signature information is repeated, so that the service is refused, the DOS attack is identified, and the security of the database is improved.
Step S30: and when the signature information is not the repeated signature information, forwarding the data acquisition request to the target server.
It should be noted that the target server can be used to provide the user with the required data, and has functions of data communication, data transmission, data search, and the like. In this embodiment, the target server may be an Elasticsearch server, which is a Lucene-based search server that provides a distributed multi-user capable full-text search engine. The user can initiate a data acquisition request through the client to control the Elasticsearch server to execute a search function and feed back a search result, wherein the data acquisition request can comprise a keyword for searching and the like.
In order to further ensure the security of the target server, the firewall of the target server in this embodiment is set to be open only to the data transmission device deployed based on the cloud. The method is used for accessing the target server only through the data transmission equipment based on cloud deployment, and cannot directly access the target server.
In addition, in order to improve the performance of the Elasticsearch server in the embodiment, a NAS (Network Attached Storage) device is externally connected to the Elasticsearch server, and the NAS device is used for storing related search data. Meanwhile, the communication between the Elasticsearch server and the NAS is also controlled through a firewall, and other devices are prohibited from accessing.
Step S40: and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client.
It can be understood that after receiving the data acquisition request, the target server searches for data according to the request content, and if corresponding data required by the user exists, feeds the searched data back to the data transmission device based on cloud deployment as response data. Meanwhile, in order to ensure data security, the response data also needs to be forwarded to the client through the data transmission device based on cloud deployment.
In the first embodiment, when a data acquisition request sent by a client is received, signature information in the data acquisition request is extracted; judging whether the signature information is repeated signature information according to the local cache record information; when the signature information is not the repeated signature information, forwarding the data acquisition request to a target server; and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client. According to the embodiment, the communication between the client and the target server is isolated, the request is authenticated and forwarded through the intermediate device, malicious attack can be effectively prevented, the safety of the server is improved, and the method is strong in universality, low in cost and beneficial to deployment.
Referring to fig. 3, fig. 3 is a schematic flow chart of a second embodiment of the data transmission method based on cloud deployment according to the present invention, and the second embodiment of the data transmission method based on cloud deployment according to the present invention is proposed based on the first embodiment.
In the second embodiment, the step S30 specifically includes:
step S301: and when the signature information is not the repeated signature information, acquiring the node load information of the target cluster server.
In order to improve the performance of the target server, the target server in this embodiment may be set as a cluster server. The cluster server can simultaneously process a plurality of data acquisition requests through a plurality of nodes, thereby avoiding data blockage and improving data searching capacity. Each node in the cluster server may be a server, or a server may be provided with multiple processing partitions, each serving as a processing node. The node load information may be memory occupancy of each processing node to reflect the processing condition of each node. According to the node load information, the processing node is determined to process the data acquisition request under the condition that the load change of the target cluster server is small.
Before the data acquisition request is ready to be forwarded, the data acquisition request can be re-verified in order to further ensure the validity of the data acquisition request. Specifically, when the signature information is not repeated signature information, extracting timestamp information from the signature information; judging whether the data acquisition request meets a preset condition or not according to the current time information and the timestamp information; and when the data acquisition request meets a preset condition, acquiring node load information of the target cluster server.
It should be understood that, when the client initiates the data acquisition request, the client generates a timestamp according to the initiation time, and adds the timestamp to the data acquisition request. The preset condition may be that whether the time difference between the current time and the initiation time is within a preset time threshold. If the time difference between the current time and the initiating time is smaller than a preset time threshold, the data acquisition request is legal; otherwise, it is illegal.
In addition, the re-verifying the data acquisition request may further include: when the signature information is not repeated signature information, extracting token information from the signature information; judging whether the data acquisition request is legal or not according to the preset token information and the token information; and when the data acquisition request is legal, acquiring the node load information of the target cluster server.
It should be understood that, when the client initiates the data acquisition request, the client may also add a preset token to the data acquisition request. The preset token is a unique token registered by the client for identifying the identity of the client, which token is also stored in the server. Correspondingly, after judging that the signature is not the repeated signature, the server can also obtain a preset token in the data acquisition request; and judging whether the preset token is legal or not according to the locally stored token information. Specifically, when a token identical to the preset token exists in the token information, judging that the preset token is legal; otherwise, it is illegal. If the attacker launches the attack through the unauthenticated device, the server can also deny service because the attack cannot be verified through the token.
Of course, the signature, timestamp, and token may be used simultaneously. For example, the client performs sequencing encryption on parameters including a Token and a timestamp according to a preset encryption algorithm to obtain a signature sign, and then generates a request according to the Token, the timestamp and the sign. For example, the URL of the request is set to (http:// URL/requesttoken ═ 123& timestamp ═ 123& sign ═ 123123123).
Step S302: and determining a target server from the target cluster servers according to the node load information, and acquiring the address information of the target server.
It is understood that, in order to ensure the operation efficiency of the target cluster server, the node with the smallest load in the current processing nodes can be generally used as the target server. Specifically, the memory vacancy rate of each processing node may be determined according to the node load information, and the server corresponding to the processing node with the smallest memory vacancy rate is used as the target server.
Of course, the node load information may also include information of each node sequence, where a node sequence refers to a sequential relationship in which each node in the target cluster server processes the data acquisition request in sequence, and the node sequence information may include information of a processing node of the last data acquisition request. And determining a processing node corresponding to the last data acquisition request according to the node load information, determining a current processing node corresponding to the current data acquisition request according to the node sequence, and taking a server corresponding to the current processing node as a target server.
It should be noted that the data transmission device deployed based on the cloud stores address information of each server in the target cluster server. After the target server is determined, the address information corresponding to the target server can be searched according to the stored address information.
Step S303: and extracting request text information in the data acquisition request, and generating a forwarding request according to the request text information and the address information.
It can be understood that the client cannot directly access the target server, and the data transmission device deployed based on the cloud needs to rewrite the request to access the target server. When the request is rewritten, the request text information in the original data acquisition request can be extracted and used as the request text of the rewritten request; rewriting the request head according to the address information of the target server; and finally, generating a complete forwarding request according to the rewritten request header and the request text.
Step S304: and sending the forwarding request to the target server.
After the data transmission equipment based on cloud deployment generates the forwarding request, the forwarding request is sent to the target server, so that the target server executes corresponding operation according to the forwarding request and feeds back response data.
In the second embodiment, when the signature information is not the repeated signature information, the node load information of the target cluster server is acquired; determining a target server from the target cluster server according to the node load information, and acquiring address information of the target server; extracting request text information in the data acquisition request, and generating a forwarding request according to the request text information and the address information; and sending the forwarding request to the target server. According to the embodiment, the request forwarding is carried out according to the load condition of the target cluster server, so that the operation efficiency of the target cluster server is ensured, and the data acquisition speed is increased. Meanwhile, in order to further prevent malicious attacks, timestamp verification and token verification are added to the data acquisition request in the embodiment, so that the safety of the server is protected.
Referring to fig. 4, fig. 4 is a schematic flowchart of a third embodiment of the data transmission method based on cloud deployment according to the present invention, and the third embodiment of the data transmission method based on cloud deployment according to the present invention is proposed based on the first embodiment and the second embodiment. The present embodiment is explained based on the first embodiment.
In the third embodiment, the step S10 specifically includes:
step S101: and when a data acquisition request sent by a client is received, acquiring the node load information of the current cluster server.
In order to further improve the request processing capacity, the data transmission device based on cloud deployment, which is the execution subject of the method, can also be a configuration cluster server. Each node in the cluster server may be a server, or a server may be provided with multiple processing partitions, each serving as a processing node. The node load information may be memory occupancy of each processing node to reflect the processing condition of each node.
Step S102: and determining the current processing server from the current cluster server according to the node load information of the current cluster server.
It is understood that, in order to ensure the response efficiency of the data transmission device based on cloud deployment to the client, the node with the smallest load in the current processing nodes can be generally used as the current processing server. Specifically, the memory vacancy rate of each processing node may be determined according to the node load information, and the server corresponding to the processing node with the smallest memory vacancy rate is used as the target server.
Of course, the node load information may further include sequence information of each node, where a node sequence refers to a sequential relationship in which each node in the data transmission device deployed based on the cloud processes the data acquisition request in sequence, and the sequence information of the node may include information of a processing node of the last data acquisition request. And determining a processing node corresponding to the last data acquisition request according to the node load information, determining a current processing node corresponding to the current data acquisition request according to the node sequence, and taking a server corresponding to the current processing node as a current processing server.
Step S103: and sending the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request.
It should be noted that, a central node exists in the data transmission device based on cloud deployment, and the central node is used for scheduling each processing node. After the current processing server is determined, the central node sends the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request, and the central node performs verification on the signature information and forwarding operation of the data acquisition request. Of course, the current processing server may also directly perform the verification of the signature information and the data acquisition request forwarding operation after extracting the signature information, without going through the central node.
In addition, in order to prevent the response data from being intercepted, the present embodiment may also verify the response information of the target server. Specifically, step S40 includes: when response information fed back by a target server based on a data acquisition request is received, determining IP information corresponding to the response information; judging whether the IP information meets a preset condition or not according to a preset legal IP table; and when the IP information meets the preset condition, extracting response data from the response information, and forwarding the response data to the client.
It can be understood that the preset legal IP table defines the IP addresses allowed to be accessed, and the judgment whether the IP information meets the preset condition according to the preset legal IP table may be: and judging whether the IP address in the IP information belongs to a legal IP in a preset IP control table, if so, meeting a preset condition to indicate that the response information is legal, and otherwise, not judging the response information is legal.
In the third embodiment, when a data acquisition request sent by a client is received, node load information of a current cluster server is acquired; determining a current processing server from the current cluster server according to the node load information of the current cluster server; and sending the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request. The embodiment determines the current processing server for processing the data acquisition request sent by the client according to the load condition of the current cluster server, thereby ensuring the operating efficiency of the server and improving the response speed of the client. Meanwhile, in order to further ensure data security, response information fed back by the target server is verified, and data is prevented from being tampered.
In addition, an embodiment of the present invention further provides a data transmission device based on cloud deployment, and referring to fig. 5, fig. 5 is a block diagram of a first embodiment of the data transmission device based on cloud deployment according to the present invention.
In this embodiment, the data transmission apparatus based on cloud deployment includes:
the receiving module 10 is configured to, when receiving a data acquisition request sent by a client, extract signature information in the data acquisition request;
the judging module 20 is configured to judge whether the signature information is repeated signature information according to the local cache record information;
a request forwarding module 30, configured to forward the data obtaining request to the target server when the signature information is not the repeated signature information;
and the data forwarding module 40 is configured to receive response data fed back by the target server based on the data acquisition request, and forward the response data to the client.
In this embodiment, when a data acquisition request sent by a client is received, signature information in the data acquisition request is extracted; judging whether the signature information is repeated signature information according to the local cache record information; when the signature information is not the repeated signature information, forwarding the data acquisition request to a target server; and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client. According to the embodiment, the communication between the client and the target server is isolated, the request is authenticated and forwarded through the intermediate device, malicious attack can be effectively prevented, the safety of the server is improved, and the method is strong in universality, low in cost and beneficial to deployment.
In an embodiment, the request forwarding module 30 is further configured to obtain node load information of the target cluster server when the signature information is not repeated signature information; determining a target server from the target cluster server according to the node load information, and acquiring address information of the target server; extracting request text information in the data acquisition request, and generating a forwarding request according to the request text information and the address information; and sending the forwarding request to the target server.
In an embodiment, the request forwarding module 30 is further configured to extract timestamp information from the signature information when the signature information is not repeated signature information; judging whether the data acquisition request meets a preset condition or not according to the current time information and the timestamp information; and when the data acquisition request meets a preset condition, acquiring node load information of the target cluster server.
In an embodiment, the request forwarding module 30 is further configured to extract token information from the signature information when the signature information is not repeated signature information; judging whether the data acquisition request is legal or not according to the preset token information and the token information; and when the data acquisition request is legal, acquiring the node load information of the target cluster server.
In an embodiment, the receiving module 10 is further configured to, when receiving a data obtaining request sent by a client, obtain node load information of a current cluster server; determining a current processing server from the current cluster server according to the node load information of the current cluster server; and sending the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request.
In an embodiment, the determining module 20 is further configured to obtain historical signature information according to the local cache record information; comparing the signature information with historical signature information to obtain a comparison result; and judging whether the signature information is repeated signature information according to the comparison result.
In an embodiment, the data forwarding module 40 is further configured to determine, when receiving response information fed back by the target server based on the data acquisition request, IP information corresponding to the response information; judging whether the IP information meets a preset condition or not according to a preset legal IP table; and when the IP information meets the preset condition, extracting response data from the response information, and forwarding the response data to the client.
Other embodiments or specific implementation manners of the cloud deployment-based data transmission device according to the present invention may refer to the above method embodiments, and are not described herein again.
In addition, an embodiment of the present invention further provides a storage medium, where the storage medium stores a data transmission program based on cloud deployment, and the data transmission program based on cloud deployment, when executed by a processor, implements the steps of the data transmission method based on cloud deployment described above.
Since the storage medium adopts all technical solutions of all the embodiments, at least all the beneficial effects brought by the technical solutions of the embodiments are achieved, and no further description is given here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order, but rather the words first, second, third, etc. are to be interpreted as names.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (e.g., a Read Only Memory (ROM)/Random Access Memory (RAM), a magnetic disk, an optical disk), and includes several instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A data transmission method based on cloud deployment is characterized by comprising the following steps:
when a data acquisition request sent by a client is received, extracting signature information in the data acquisition request;
judging whether the signature information is repeated signature information according to local cache record information;
when the signature information is not repeated signature information, forwarding the data acquisition request to a target server;
and receiving response data fed back by the target server based on the data acquisition request, and forwarding the response data to the client.
2. The cloud deployment-based data transmission method of claim 1, wherein forwarding the data acquisition request to a target server when the signature information is not duplicate signature information comprises:
when the signature information is not repeated signature information, acquiring node load information of a target cluster server;
determining a target server from target cluster servers according to the node load information, and acquiring address information of the target server;
extracting request text information in the data acquisition request, and generating a forwarding request according to the request text information and the address information;
and sending the forwarding request to the target server.
3. The cloud deployment-based data transmission method according to claim 2, wherein the obtaining node load information of the target cluster server when the signature information is not repeated signature information includes:
when the signature information is not repeated signature information, extracting timestamp information from the signature information;
judging whether the data acquisition request meets a preset condition or not according to the current time information and the timestamp information;
and when the data acquisition request meets a preset condition, acquiring node load information of the target cluster server.
4. The cloud deployment-based data transmission method according to claim 2, wherein the obtaining node load information of the target cluster server when the signature information is not repeated signature information includes:
when the signature information is not repeated signature information, extracting token information from the signature information;
judging whether the data acquisition request is legal or not according to preset token information and the token information;
and when the data acquisition request is legal, acquiring the node load information of the target cluster server.
5. The cloud deployment-based data transmission method according to any one of claims 1 to 4, wherein the extracting signature information in a data acquisition request when the data acquisition request sent by a client is received includes:
when a data acquisition request sent by a client is received, acquiring node load information of a current cluster server;
determining a current processing server from the current cluster server according to the node load information of the current cluster server;
and sending the data acquisition request to the current processing server so that the current processing server extracts and feeds back the signature information in the data acquisition request.
6. The cloud deployment-based data transmission method according to any one of claims 1 to 4, wherein the determining whether the signature information is repeated signature information according to local cache record information includes:
acquiring historical signature information according to the local cache record information;
comparing the signature information with historical signature information to obtain a comparison result;
and judging whether the signature information is repeated signature information according to the comparison result.
7. The cloud deployment-based data transmission method according to any one of claims 1 to 4, wherein the receiving response data fed back by the target server based on the data acquisition request and forwarding the response data to the client includes:
when response information fed back by the target server based on the data acquisition request is received, determining IP information corresponding to the response information;
judging whether the IP information meets a preset condition or not according to a preset legal IP table;
and when the IP information meets a preset condition, extracting response data from the response information, and forwarding the response data to the client.
8. A data transmission device based on cloud deployment, the device comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for extracting signature information in a data acquisition request when the data acquisition request sent by a client is received;
the judging module is used for judging whether the signature information is repeated signature information according to local cache record information;
the request forwarding module is used for forwarding the data acquisition request to a target server when the signature information is not repeated signature information;
and the data forwarding module is used for receiving response data fed back by the target server based on the data acquisition request and forwarding the response data to the client.
9. A data transmission device based on cloud deployment is characterized by comprising: a memory, a processor, and a cloud deployment-based data transfer program stored on the memory and executable on the processor, the cloud deployment-based data transfer program when executed by the processor implementing the steps of the cloud deployment-based data transfer method of any of claims 1 to 7.
10. A storage medium having stored thereon a data transfer program based on a cloud deployment, which when executed by a processor implements the steps of the data transfer method based on a cloud deployment according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011644229.0A CN112804222B (en) | 2020-12-31 | 2020-12-31 | Data transmission method, device, equipment and storage medium based on cloud deployment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011644229.0A CN112804222B (en) | 2020-12-31 | 2020-12-31 | Data transmission method, device, equipment and storage medium based on cloud deployment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112804222A true CN112804222A (en) | 2021-05-14 |
CN112804222B CN112804222B (en) | 2022-11-15 |
Family
ID=75809403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011644229.0A Active CN112804222B (en) | 2020-12-31 | 2020-12-31 | Data transmission method, device, equipment and storage medium based on cloud deployment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112804222B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113368494A (en) * | 2021-06-30 | 2021-09-10 | 北京爱奇艺科技有限公司 | Cloud equipment distribution method and device, electronic equipment and storage medium |
CN114035899A (en) * | 2021-11-15 | 2022-02-11 | 中原银行股份有限公司 | Cross-cluster parameter configuration method and device and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107172121A (en) * | 2017-03-29 | 2017-09-15 | 努比亚技术有限公司 | A kind of devices and methods therefor for preventing Data duplication from submitting |
WO2019019593A1 (en) * | 2017-07-28 | 2019-01-31 | 深圳市光峰光电技术有限公司 | Stateless communication security signature method, terminal and server end |
CN112019548A (en) * | 2020-08-28 | 2020-12-01 | 重庆可兰达科技有限公司 | User-defined interface signature method, server and system for preventing malicious attacks |
-
2020
- 2020-12-31 CN CN202011644229.0A patent/CN112804222B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107172121A (en) * | 2017-03-29 | 2017-09-15 | 努比亚技术有限公司 | A kind of devices and methods therefor for preventing Data duplication from submitting |
WO2019019593A1 (en) * | 2017-07-28 | 2019-01-31 | 深圳市光峰光电技术有限公司 | Stateless communication security signature method, terminal and server end |
CN112019548A (en) * | 2020-08-28 | 2020-12-01 | 重庆可兰达科技有限公司 | User-defined interface signature method, server and system for preventing malicious attacks |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113368494A (en) * | 2021-06-30 | 2021-09-10 | 北京爱奇艺科技有限公司 | Cloud equipment distribution method and device, electronic equipment and storage medium |
CN114035899A (en) * | 2021-11-15 | 2022-02-11 | 中原银行股份有限公司 | Cross-cluster parameter configuration method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112804222B (en) | 2022-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111935169B (en) | Business data access method, device, equipment and storage medium | |
CN109743315B (en) | Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website | |
CN105939326B (en) | Method and device for processing message | |
CN106685932B (en) | A kind of file access system and method based on cloud service | |
CN107634959B (en) | Protection method, device and system based on automobile | |
CN110213276B (en) | Authorization verification method under micro-service architecture, server, terminal and medium | |
JP5704518B2 (en) | Confidential information leakage prevention system, confidential information leakage prevention method, and confidential information leakage prevention program | |
CN106779716B (en) | Authentication method, device and system based on block chain account address | |
CN110071806B (en) | Data processing method and system based on interface verification | |
WO2019047513A1 (en) | Internet defense method and authentication server | |
CN111478910B (en) | User identity authentication method and device, electronic equipment and storage medium | |
CN108259514B (en) | Vulnerability detection method and device, computer equipment and storage medium | |
CN102110200A (en) | Authentication method capable of being executed by computer | |
CN112804222B (en) | Data transmission method, device, equipment and storage medium based on cloud deployment | |
CN107733853B (en) | Page access method, device, computer and medium | |
CN113347072B (en) | VPN resource access method, device, electronic equipment and medium | |
CN111182537A (en) | Network access method, device and system for mobile application | |
CN111147625B (en) | Method, device and storage medium for acquiring local external network IP address | |
CN111259371B (en) | Internet of things equipment authentication method, electronic device and storage medium | |
CN103888465A (en) | Method and device for detecting webpage hijacking | |
US9794261B2 (en) | Method and apparatus for controlling access to a server | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN107707550B (en) | Method, device and system for accessing virtual machine | |
CN114338060B (en) | Authority verification method, device, system, equipment and storage medium | |
CN112131588B (en) | Application access method, device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |