CN115225387A - Data security tamper-proof method and system based on big data and cloud platform - Google Patents

Data security tamper-proof method and system based on big data and cloud platform Download PDF

Info

Publication number
CN115225387A
CN115225387A CN202210858452.8A CN202210858452A CN115225387A CN 115225387 A CN115225387 A CN 115225387A CN 202210858452 A CN202210858452 A CN 202210858452A CN 115225387 A CN115225387 A CN 115225387A
Authority
CN
China
Prior art keywords
access terminal
data access
data
terminal device
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210858452.8A
Other languages
Chinese (zh)
Other versions
CN115225387B (en
Inventor
杨胜良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huashang Small Loan Co ltd
Original Assignee
Jining Simple Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jining Simple Information Technology Co ltd filed Critical Jining Simple Information Technology Co ltd
Priority to CN202210858452.8A priority Critical patent/CN115225387B/en
Publication of CN115225387A publication Critical patent/CN115225387A/en
Application granted granted Critical
Publication of CN115225387B publication Critical patent/CN115225387B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data security tamper-proofing method and system based on big data and a cloud platform, and relates to the technical field of big data. In the present invention, for each first data access terminal device, device correlation coefficient determination processing is performed on the first data access terminal device and each of the other data access terminal devices other than the first data access terminal device to generate a device correlation coefficient. And for each first data access terminal device, matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through the device correlation coefficient, so as to perform data security verification processing on the data access of the first data access terminal device through the at least one second data access terminal device. Based on the method, the problem of low reliability of data security verification in the prior art can be solved.

Description

Data security tamper-proof method and system based on big data and cloud platform
Technical Field
The invention relates to the technical field of big data, in particular to a data security tamper-proof method and system based on big data and a cloud platform.
Background
With the development of the internet, the data volume of the internet data is gradually increased, so that the effective storage of massive internet data is an important link, wherein the storage of massive internet data is effectively realized based on a distributed storage means and other storage means. However, after storage, in order to realize application to mass internet data, especially, development of big data technology has gradually increased its application range. In addition, mass internet data is applied on the basis of being able to be accessed, but malicious network devices may tamper data when accessing, so that security verification needs to be performed on data access to reduce possibility of tampering, but in the prior art, generally, a device itself storing data or other fixed devices verify access, so that the reliability is not high.
Disclosure of Invention
In view of this, the present invention provides a data security tamper-proofing method, system and cloud platform based on big data, so as to improve the problem of low reliability of data security verification in the prior art.
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
a data security tamper-proofing method based on big data is applied to a big data processing cloud platform, the big data processing cloud platform is in communication connection with a plurality of data access terminal devices, and the data security tamper-proofing method based on the big data comprises the following steps:
for any data access terminal equipment in the plurality of data access terminal equipment, carrying out equipment identity determination processing on the data access terminal equipment to generate an equipment identity determination result corresponding to the data access terminal equipment, wherein the equipment identity determination result is used for reflecting whether the corresponding data access terminal equipment belongs to first data access terminal equipment or not;
under the condition that an equipment identity determination result corresponding to each data access terminal equipment is formed, for each determined first data access terminal equipment, equipment correlation coefficient determination processing is carried out on the first data access terminal equipment and each other data access terminal equipment except the first data access terminal equipment so as to generate equipment correlation coefficients between the first data access terminal equipment and each other data access terminal equipment;
for each first data access terminal device, matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through a device correlation coefficient between the first data access terminal device and each other data access terminal device, and performing data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, the step of performing, for any data access terminal device in the multiple data access terminal devices, device identity determination processing on the data access terminal device to generate a device identity determination result corresponding to the data access terminal device includes:
for any data access terminal equipment in the plurality of data access terminal equipment, performing information sending monitoring processing on the data access terminal equipment to form an information sending monitoring result corresponding to the data access terminal equipment, wherein the information sending monitoring result is used for reflecting whether the corresponding data access terminal equipment sends a data access request to the big data processing cloud platform or not;
and for any data access terminal equipment in the plurality of data access terminal equipment, taking an information sending monitoring result corresponding to the data access terminal equipment as a basis for equipment identity analysis, and performing equipment identity determination processing on the data access terminal equipment to generate an equipment identity determination result corresponding to the data access terminal equipment.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, the step of performing, for any one of the plurality of data access terminal devices, device identity determination processing on the data access terminal device by using an information sending monitoring result corresponding to the data access terminal device as a basis for device identity analysis to generate a device identity determination result corresponding to the data access terminal device includes:
for any data access terminal equipment in the plurality of data access terminal equipment, under the condition that an information sending monitoring result corresponding to the data access terminal equipment reflects that the data access terminal equipment sends a data access request to the big data processing cloud platform, analyzing the data access request to output equipment identity information corresponding to the data access terminal equipment;
for any data access terminal equipment in the plurality of data access terminal equipment, comparing and analyzing equipment identity information corresponding to the data access terminal equipment with a preset reference equipment identity information set to output a comparison and analysis result corresponding to the data access terminal equipment, wherein the comparison and analysis result is used for reflecting whether the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set or not;
for any data access terminal equipment in the plurality of data access terminal equipment, forming an equipment identity determination result corresponding to the data access terminal equipment according to a comparative analysis result corresponding to the data access terminal equipment, wherein the corresponding equipment identity determination result reflects that the data access terminal equipment belongs to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is different from each piece of reference equipment identity information in the reference equipment identity information set, and the corresponding equipment identity determination result reflects that the data access terminal equipment does not belong to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, in the case that a device identity determination result corresponding to each of the data access terminal devices is formed, for each of the determined first data access terminal devices, performing device correlation coefficient determination processing on the first data access terminal device and each of the other data access terminal devices except the first data access terminal device to generate a device correlation coefficient between the first data access terminal device and each of the other data access terminal devices, the method includes:
under the condition that an equipment identity determination result corresponding to each data access terminal equipment is formed, for each data access terminal equipment in the plurality of data access terminal equipment, performing data extraction processing on equipment interaction performed by the data access terminal equipment in history to form an equipment interaction data set corresponding to the data access terminal equipment;
and for each determined first data access terminal device, respectively performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device according to the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, for each determined first data access terminal device, respectively according to a device interaction data set corresponding to the first data access terminal device and a device interaction data set corresponding to each other data access terminal device except the first data access terminal device, the step of performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device includes:
for each determined first data access terminal device, respectively performing set correlation calculation processing on a device interaction data set corresponding to the first data access terminal device and a device interaction data set corresponding to each other data access terminal device except the first data access terminal device, so as to output set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device;
and for each determined first data access terminal device, performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device according to the set correlation degree between the first data access terminal device and each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, for each determined first data access terminal device, performing set correlation calculation processing on a device interaction data set corresponding to the first data access terminal device and a device interaction data set corresponding to each other data access terminal device except the first data access terminal device, respectively, so as to output a set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device, the method includes:
for each piece of first equipment interaction data in an equipment interaction data set corresponding to the first data access terminal equipment, performing text keyword extraction processing on the first equipment interaction data to form a corresponding first text keyword set, and for each piece of second equipment interaction data in an equipment interaction data set corresponding to the other data access terminal equipment, performing text keyword extraction processing on the second equipment interaction data to form a corresponding second text keyword set;
for each piece of first device interaction data, performing set overlap ratio calculation processing on a first text keyword set corresponding to the first device interaction data and a first text keyword set corresponding to previous adjacent first device interaction data of the first device interaction data to output first text set overlap ratio corresponding to the first device interaction data, and for each piece of second device interaction data, performing set overlap ratio calculation processing on a second text keyword set corresponding to the second device interaction data and a second text keyword set corresponding to previous adjacent second device interaction data of the second device interaction data to output second text set overlap ratio corresponding to the second device interaction data;
according to the coincidence degree of a first text set corresponding to each piece of first equipment interaction data, splitting the equipment interaction data set corresponding to the first data access terminal equipment to form a plurality of first equipment interaction data sub-sets, wherein the equipment interaction data set belongs to an ordered set, and the splitting positions of the equipment interaction data set are respectively each piece of first equipment interaction data of which the coincidence degree of the corresponding first text set is less than or equal to the coincidence degree of a preset text set;
splitting the device interaction data sets corresponding to the other data access terminal devices according to the coincidence degree of the second text set corresponding to each piece of the second device interaction data to form a plurality of second device interaction data subsets, wherein the splitting positions of the device interaction data sets are respectively each piece of the second device interaction data of which the coincidence degree of the corresponding second text set is less than or equal to the coincidence degree of the preset text set;
for each first device interactive data subset, merging a first text keyword set corresponding to each piece of first device interactive data included in the first device interactive data subset to form a first text keyword merged set corresponding to the first device interactive data subset, and for each second device interactive data subset, merging a second text keyword set corresponding to each piece of second device interactive data included in the second device interactive data subset to form a second text keyword merged set corresponding to the second device interactive data subset;
respectively calculating the text set overlap ratio between each first text keyword merging set and each second text keyword merging set, and then carrying out fusion processing on the text set overlap ratio between each first text keyword merging set and each second text keyword merging set to form first set correlation;
forming a first object set corresponding to the first data access terminal device according to a data interaction object corresponding to each piece of first device interaction data in the device interaction data set corresponding to the first data access terminal device, and forming a second object set corresponding to the other data access terminal devices according to a data interaction object corresponding to each piece of second device interaction data in the device interaction data set corresponding to the other data access terminal devices;
and performing set contact ratio calculation processing on the first object set and the second object set to output a second set correlation degree, and performing fusion processing on the second set correlation degree and the first set correlation degree to output the set correlation degree between the first data access terminal equipment and the other data access terminal equipment.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, the step of matching, for each first data access terminal device, at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through a device correlation coefficient between the first data access terminal device and each other data access terminal device, so as to perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device includes:
for each first data access terminal device, screening out a target number of other data access terminal devices with the minimum device correlation coefficient with the first data access terminal device from other data access terminal devices except the first data access terminal device, and respectively marking each other data access terminal device in the target number of other data access terminal devices as a second data access terminal device corresponding to the first data access terminal device;
and for each first data access terminal device, respectively performing data security verification processing on the data access of the first data access terminal device through each second data access terminal device corresponding to the first data access terminal device.
In some preferred embodiments, in the above method for preventing data security from being tampered with based on big data, the step of performing, for each first data access terminal device, data security verification processing on data access of the first data access terminal device through each second data access terminal device corresponding to the first data access terminal device includes:
for each first data access terminal device, respectively sending a data access request corresponding to data access of the first data access terminal device to each second data access terminal device corresponding to the first data access terminal device for data security verification processing to form a data security verification result corresponding to each second data access terminal device, wherein the data security verification result is used for representing whether the corresponding data access request belongs to a secure data access request;
for each first data access terminal device, performing fusion processing on a data security verification result corresponding to each second data access terminal device according to a device correlation coefficient between the first data access terminal device and each second data access terminal device corresponding to the first data access terminal device to form a target data security verification result corresponding to the first data access terminal device, wherein the target data security verification result is used for reflecting whether a data access request corresponding to the corresponding first data access terminal device belongs to a secure data access request, and the big data processing cloud platform is further used for refusing to execute an unsecure data access request.
The embodiment of the invention also provides a data security tamper-proof system based on big data, which is applied to a big data processing cloud platform, wherein the big data processing cloud platform is in communication connection with a plurality of data access terminal devices, and the data security tamper-proof system based on big data comprises:
the device identity determining module is used for determining the identity of any data access terminal device in the data access terminal devices to generate a device identity determining result corresponding to the data access terminal device, wherein the device identity determining result is used for reflecting whether the corresponding data access terminal device belongs to the first data access terminal device;
a correlation coefficient determining module, configured to, in a case where an apparatus identity determination result corresponding to each of the data access terminal apparatuses is formed, perform, for each of the determined first data access terminal apparatuses, apparatus correlation coefficient determination processing on the first data access terminal apparatus and each of other data access terminal apparatuses other than the first data access terminal apparatus, so as to generate an apparatus correlation coefficient between the first data access terminal apparatus and each of the other data access terminal apparatuses;
and the data security verification module is used for matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through the device correlation coefficient between the first data access terminal device and each other data access terminal device for each first data access terminal device, so as to perform data security verification processing on the data access of the first data access terminal device through the at least one second data access terminal device.
The embodiment of the invention also provides a big data processing cloud platform, and the big data processing cloud platform is used for executing the big data-based data security tamper-proof method.
According to the data security tamper-proofing method, system and cloud platform based on the big data, firstly, for each first data access terminal device, device correlation coefficient determination processing is carried out on the first data access terminal device and each other data access terminal device except the first data access terminal device, so that a device correlation coefficient is generated. Secondly, for each first data access terminal device, matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through a device correlation coefficient, so as to perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device. Based on the foregoing, the diversity of the devices performing the data security verification processing can be improved to a certain extent, so that the difficulty that malicious access terminal devices attack (manipulate) the devices performing the verification processing is improved, the corresponding data security verification processing can be performed more reliably, and the problem of low reliability of the data security verification in the prior art is solved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
Fig. 1 is a structural block diagram of a big data processing cloud platform according to an embodiment of the present invention.
Fig. 2 is a schematic flowchart of steps included in a big data-based data security tamper-proof method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of modules included in a big data-based data security tamper-resistant system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a big data processing cloud platform. Wherein the big data processing cloud platform may include a memory and a processor.
For example, the memory and the processor are electrically connected, directly or indirectly, to enable transmission or interaction of data. For example, they may be electrically connected to each other via one or more communication buses or signal lines. The memory can have at least one software functional module (computer program) stored therein, which can be in the form of software or firmware. The processor may be configured to execute the executable computer program stored in the memory, so as to implement the big data based data security tamper-proof method provided by the embodiment of the present invention.
Further, in some embodiments, the Memory may be, for example, but is not limited to, random Access Memory (RAM), read Only Memory (ROM), programmable Read-Only Memory (PROM), erasable Read-Only Memory (EPROM), electrically Erasable Read-Only Memory (EEPROM), and the like. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), a System on Chip (SoC), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components.
Further, for example, in some embodiments, the big data processing cloud platform may be a server with data processing capabilities. The big data processing cloud platform can be in communication connection with a plurality of data access terminal devices such as mobile phones and computers.
With reference to fig. 2, an embodiment of the present invention further provides a data security tamper-proofing method based on big data, which is applicable to the big data processing cloud platform. The method steps defined by the flow related to the big data-based data security tamper-proof method can be realized by the big data processing cloud platform. The specific process shown in fig. 2 will be described in detail below.
Step S110, for any data access terminal device in the plurality of data access terminal devices, performing device identity determination processing on the data access terminal device to generate a device identity determination result corresponding to the data access terminal device.
In the embodiment of the present invention, the big data processing cloud platform may perform, for any one of the plurality of data access terminal devices, device identity determination processing on the data access terminal device, so as to generate a device identity determination result corresponding to the data access terminal device. And the equipment identity determination result is used for reflecting whether the corresponding data access terminal equipment belongs to the first data access terminal equipment.
Step S120, in a case where an apparatus identity determination result corresponding to each of the data access terminal apparatuses is formed, for each of the determined first data access terminal apparatuses, performing apparatus correlation coefficient determination processing on the first data access terminal apparatus and each of the other data access terminal apparatuses other than the first data access terminal apparatus, so as to generate an apparatus correlation coefficient between the first data access terminal apparatus and each of the other data access terminal apparatuses.
In this embodiment of the present invention, in the case that an apparatus identity determination result corresponding to each data access terminal device is formed, for each determined first data access terminal device, the big data processing cloud platform may perform apparatus correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device, so as to generate an apparatus correlation coefficient between the first data access terminal device and each other data access terminal device.
Step S130, for each of the first data access terminal devices, matching at least one second data access terminal device corresponding to the first data access terminal device from the other data access terminal devices through the device correlation coefficient between the first data access terminal device and each of the other data access terminal devices, so as to perform data security verification processing on the data access of the first data access terminal device through the at least one second data access terminal device.
In this embodiment of the present invention, for each first data access terminal device, the big data processing cloud platform may match, from other data access terminal devices, at least one second data access terminal device corresponding to the first data access terminal device through a device correlation coefficient between the first data access terminal device and each other data access terminal device, so as to perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device.
Based on the foregoing, the diversity of the devices performing the data security verification processing can be improved to a certain extent, so that the difficulty that malicious access terminal devices attack (manipulate) the devices performing the verification processing is improved, the corresponding data security verification processing can be performed more reliably, and the problem of low reliability of the data security verification in the prior art is solved.
Further, for example, in some specific embodiments, the step S110 recited above may include the following more detailed steps:
for any data access terminal equipment in the plurality of data access terminal equipment, performing information sending monitoring processing on the data access terminal equipment to form an information sending monitoring result corresponding to the data access terminal equipment, wherein the information sending monitoring result is used for reflecting whether the corresponding data access terminal equipment sends a data access request to the big data processing cloud platform or not;
and for any data access terminal equipment in the plurality of data access terminal equipment, taking an information sending monitoring result corresponding to the data access terminal equipment as a basis for equipment identity analysis, and performing equipment identity determination processing on the data access terminal equipment to generate an equipment identity determination result corresponding to the data access terminal equipment.
Further, for example, in some specific embodiments, the step of performing, for any data access terminal device in the plurality of data access terminal devices, device identity determination processing on the data access terminal device by using the information sending monitoring result corresponding to the data access terminal device as a basis for device identity analysis to generate a device identity determination result corresponding to the data access terminal device may include the following more detailed steps:
for any data access terminal equipment in the plurality of data access terminal equipment, under the condition that an information sending monitoring result corresponding to the data access terminal equipment reflects that the data access terminal equipment sends a data access request to the big data processing cloud platform, analyzing the data access request to output equipment identity information corresponding to the data access terminal equipment;
for any data access terminal equipment in the plurality of data access terminal equipment, comparing and analyzing equipment identity information corresponding to the data access terminal equipment with a preset reference equipment identity information set to output a comparison and analysis result corresponding to the data access terminal equipment, wherein the comparison and analysis result is used for reflecting whether the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set or not;
for any data access terminal equipment in the plurality of data access terminal equipment, forming an equipment identity determination result corresponding to the data access terminal equipment according to a comparative analysis result corresponding to the data access terminal equipment, wherein the corresponding equipment identity determination result reflects that the data access terminal equipment belongs to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is different from each piece of reference equipment identity information in the reference equipment identity information set, and the corresponding equipment identity determination result reflects that the data access terminal equipment does not belong to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set.
Further, for example, in some specific embodiments, the above-mentioned step S120 may include the following more detailed steps:
under the condition that an equipment identity determination result corresponding to each data access terminal equipment is formed, for each data access terminal equipment in the plurality of data access terminal equipment, performing data extraction processing on historical equipment interaction of the data access terminal equipment to form an equipment interaction data set corresponding to the data access terminal equipment;
and for each determined first data access terminal device, respectively performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device according to the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device.
Further, for example, in some specific embodiments, the above-mentioned step of performing, for each determined first data access terminal device, device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device according to the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, respectively, to generate the device correlation coefficient between the first data access terminal device and each other data access terminal device includes the following more detailed steps:
for each determined first data access terminal device, respectively performing set correlation calculation processing on a device interaction data set corresponding to the first data access terminal device and a device interaction data set corresponding to each other data access terminal device except the first data access terminal device to output set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device;
for each determined first data access terminal device, performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device according to the set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device (the device correlation coefficient and the set correlation may have a positive correlation corresponding relationship).
Further, for example, in some specific embodiments, the above-mentioned step of, for each determined first data access terminal device, performing set correlation calculation processing on the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, respectively, to output the set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device may include the following more detailed steps:
for each piece of first equipment interaction data in an equipment interaction data set corresponding to the first data access terminal equipment, performing text keyword extraction processing on the first equipment interaction data to form a corresponding first text keyword set, and for each piece of second equipment interaction data in an equipment interaction data set corresponding to the other data access terminal equipment, performing text keyword extraction processing on the second equipment interaction data to form a corresponding second text keyword set;
for each piece of first device interaction data, performing set overlap ratio calculation processing on a first text keyword set corresponding to the first device interaction data and a first text keyword set corresponding to previous adjacent first device interaction data of the first device interaction data (namely calculating the number ratio of the same first text keywords between the two sets) to output a first text set overlap ratio corresponding to the first device interaction data, and for each piece of second device interaction data, performing set overlap ratio calculation processing on a second text keyword set corresponding to the second device interaction data and a second text keyword set corresponding to previous adjacent second device interaction data of the second device interaction data to output a second text set overlap ratio corresponding to the second device interaction data;
according to the coincidence degree of a first text set corresponding to each piece of first equipment interaction data, splitting the equipment interaction data set corresponding to the first data access terminal equipment to form a plurality of first equipment interaction data sub-sets, wherein the equipment interaction data set belongs to an ordered set, and the splitting positions of the equipment interaction data set are respectively each piece of first equipment interaction data of which the coincidence degree of the corresponding first text set is less than or equal to the coincidence degree of a preset text set;
splitting the device interaction data sets corresponding to the other data access terminal devices according to the coincidence degree of the second text set corresponding to each piece of the second device interaction data to form a plurality of second device interaction data subsets, wherein the splitting positions of the device interaction data sets are respectively each piece of the second device interaction data of which the coincidence degree of the corresponding second text set is less than or equal to the coincidence degree of the preset text set;
for each first device interactive data subset, merging a first text keyword set corresponding to each piece of first device interactive data included in the first device interactive data subset to form a first text keyword merged set corresponding to the first device interactive data subset, and for each second device interactive data subset, merging a second text keyword set corresponding to each piece of second device interactive data included in the second device interactive data subset to form a second text keyword merged set corresponding to the second device interactive data subset;
respectively calculating the text set overlap ratio between each first text keyword merging set and each second text keyword merging set, and then performing fusion processing (such as average value calculation) on the text set overlap ratio between each first text keyword merging set and each second text keyword merging set to form first set correlation;
forming a first object set corresponding to the first data access terminal device according to a data interaction object corresponding to each piece of first device interaction data in a device interaction data set corresponding to the first data access terminal device (the data interaction object refers to another terminal device performing interaction), and forming a second object set corresponding to the other data access terminal device according to a data interaction object corresponding to each piece of second device interaction data in a device interaction data set corresponding to the other data access terminal device;
and performing set contact degree calculation processing on the first object set and the second object set to output a second set correlation degree, and performing fusion processing (such as weighted sum calculation processing) on the second set correlation degree and the first set correlation degree to output a set correlation degree between the first data access terminal device and the other data access terminal devices.
Further, for example, in some specific embodiments, the above-mentioned step of, for each determined first data access terminal device, performing set correlation calculation processing on the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, respectively, to output the set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device may include the following more detailed steps:
for each piece of first equipment interaction data in an equipment interaction data set corresponding to the first data access terminal equipment, performing text keyword extraction processing on the first equipment interaction data to form a corresponding first text keyword set, and for each piece of second equipment interaction data in an equipment interaction data set corresponding to the other data access terminal equipment, performing text keyword extraction processing on the second equipment interaction data to form a corresponding second text keyword set;
randomly splitting the device interaction data set corresponding to the first data access terminal device to form a plurality of first device interaction data subsets, and then randomly splitting the device interaction data sets corresponding to the other data access terminal devices to form a plurality of second device interaction data subsets, wherein the device interaction data sets belong to an ordered set;
for each first device interaction data subset in the multiple first device interaction data subsets, merging the first text keyword sets corresponding to each piece of first device interaction data included in the first device interaction data subsets to form a first text keyword merged set corresponding to the first device interaction data subsets;
for each second device interaction data subset in the multiple second device interaction data subsets, merging a second text keyword set corresponding to each piece of second device interaction data included in the second device interaction data subset to form a second text keyword merged set corresponding to the second device interaction data subset;
for each first text keyword included in each first text keyword merging set, performing word frequency statistical processing on the first text keyword according to each first device interaction data included in a device interaction data set corresponding to the first data access terminal device and each second device interaction data included in a device interaction data set corresponding to the other data access terminal device to output a first word frequency statistical value (namely, the number of occurrences) corresponding to the first text keyword, and for each second text keyword included in each second text keyword merging set, performing word frequency statistical processing on the second text keyword according to each first device interaction data included in a device interaction data set corresponding to the first data access terminal device and each second device interaction data included in a device interaction data set corresponding to the other data access terminal device to output a second word frequency statistical value corresponding to the second text keyword;
for each first text keyword merging set, according to a first word frequency statistic corresponding to each first text keyword included in the first text keyword merging set, performing importance determination processing on a first device interaction data subset corresponding to the first text keyword merging set (a sum of the first word frequency statistics corresponding to each first text keyword may be calculated first, and then a first importance is determined according to the sum, the first importance positively relates to the sum), so as to output the first importance corresponding to the first device interaction data subset;
for each second text keyword merging set, according to a second word frequency statistic value corresponding to each second text keyword included in the second text keyword merging set, performing importance degree determination processing on a second device interactive data subset corresponding to the second text keyword merging set to output a second importance degree corresponding to the second device interactive data subset;
screening the plurality of first device interaction data subsets according to a first importance degree corresponding to each first device interaction data subset (for example, a first device interaction data subset with a larger first importance degree can be screened out to be used as a target first device interaction data subset), so as to output at least one target first device interaction data subset corresponding to the first data access terminal device, and then screening the plurality of second device interaction data subsets according to a second importance degree corresponding to each second device interaction data subset, so as to output at least one target second device interaction data subset corresponding to the other data access terminal devices;
respectively calculating text set overlap ratio between a first text keyword merging set corresponding to each target first device interactive data sub-set and a second text keyword merging set corresponding to each target second device interactive data sub-set, and then performing fusion processing (such as mean value calculation) on the text set overlap ratio between each first text keyword merging set and each second text keyword merging set to form first set correlation;
respectively calculating object set overlap ratio between a first data interaction object set corresponding to each target first device interaction data subset and a second data interaction object set corresponding to each target second device interaction data subset, and then performing fusion processing (such as mean value calculation and the like) on the object set overlap ratio between each first data interaction object set and each second data interaction object set to form second set correlation;
and performing fusion processing (for example, calculation of a weighted sum value and the like) on the second set correlation and the first set correlation to output the set correlation between the first data access terminal device and the other data access terminal devices.
Further, for example, in some specific embodiments, the step S130 described above may include the following more detailed steps:
for each first data access terminal device, screening out a target number of other data access terminal devices with the minimum device correlation coefficient from the other data access terminal devices except the first data access terminal device, and marking each other data access terminal device in the target number of other data access terminal devices as a second data access terminal device corresponding to the first data access terminal device;
and for each first data access terminal device, respectively performing data security verification processing on the data access of the first data access terminal device through each second data access terminal device corresponding to the first data access terminal device.
Further, for example, in some specific embodiments, the step of performing, for each first data access terminal device, data security verification processing on data access of the first data access terminal device through each second data access terminal device corresponding to the first data access terminal device may include the following more detailed steps:
for each first data access terminal device, respectively sending a data access request corresponding to data access of the first data access terminal device to each second data access terminal device corresponding to the first data access terminal device for data security verification processing to form a data security verification result corresponding to each second data access terminal device, wherein the data security verification result is used for representing whether the corresponding data access request belongs to a secure data access request;
for each first data access terminal device, performing fusion processing on the data security verification result corresponding to each second data access terminal device according to a device correlation coefficient between the first data access terminal device and each second data access terminal device corresponding to the first data access terminal device (in the fusion processing, the greater the device correlation coefficient is, the greater the importance of the corresponding data security verification result is), so as to form a target data security verification result corresponding to the first data access terminal device, where the target data security verification result is used to reflect whether the data access request corresponding to the corresponding first data access terminal device belongs to a secure data access request, and the large data processing cloud platform is further used to reject execution of an unsecure data access request.
With reference to fig. 3, an embodiment of the present invention further provides a data security tamper-proofing system based on big data, which is applicable to the big data processing cloud platform. The data security tamper-proof system can comprise an equipment identity determining module, a correlation coefficient determining module and a data security verifying module.
Further, for example, in some specific embodiments, the device identity determining module is configured to perform, for any data access terminal device in the multiple data access terminal devices, device identity determining processing on the data access terminal device to generate a device identity determining result corresponding to the data access terminal device, where the device identity determining result is used to reflect whether the corresponding data access terminal device belongs to the first data access terminal device. The correlation coefficient determining module is configured to, in a case where an apparatus identity determination result corresponding to each of the data access terminal apparatuses is formed, perform, for each of the determined first data access terminal apparatuses, apparatus correlation coefficient determination processing on the first data access terminal apparatus and each of the other data access terminal apparatuses other than the first data access terminal apparatus, so as to generate an apparatus correlation coefficient between the first data access terminal apparatus and each of the other data access terminal apparatuses. The data security verification module is configured to, for each first data access terminal device, match at least one second data access terminal device corresponding to the first data access terminal device from the other data access terminal devices through a device correlation coefficient between the first data access terminal device and each other data access terminal device, and perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device.
In summary, according to the data security tamper-proofing method, system and cloud platform based on big data provided by the present invention, first, for each first data access terminal device, a device correlation coefficient determination process is performed on the first data access terminal device and each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient. Secondly, for each first data access terminal device, matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through a device correlation coefficient, so as to perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device. Based on the above, the diversity of the devices for performing data security verification processing can be improved to a certain extent, so that the difficulty of attacking (operating) the devices for performing verification processing by malicious access terminal devices is improved, the corresponding data security verification processing can be performed more reliably, and the problem of low reliability of data security verification in the prior art is solved.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The data security tamper-proofing method based on the big data is applied to a big data processing cloud platform, the big data processing cloud platform is in communication connection with a plurality of data access terminal devices, and the data security tamper-proofing method based on the big data comprises the following steps:
for any data access terminal equipment in the plurality of data access terminal equipment, carrying out equipment identity determination processing on the data access terminal equipment to generate an equipment identity determination result corresponding to the data access terminal equipment, wherein the equipment identity determination result is used for reflecting whether the corresponding data access terminal equipment belongs to first data access terminal equipment or not;
under the condition that an equipment identity determination result corresponding to each data access terminal equipment is formed, for each determined first data access terminal equipment, equipment correlation coefficient determination processing is carried out on the first data access terminal equipment and each other data access terminal equipment except the first data access terminal equipment so as to generate equipment correlation coefficients between the first data access terminal equipment and each other data access terminal equipment;
for each first data access terminal device, matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through a device correlation coefficient between the first data access terminal device and each other data access terminal device, so as to perform data security verification processing on data access of the first data access terminal device through the at least one second data access terminal device.
2. The big data-based data security tamper-proofing method according to claim 1, wherein the step of performing, for any one of the plurality of data access terminal devices, device identity determination processing on the data access terminal device to generate a device identity determination result corresponding to the data access terminal device includes:
for any data access terminal equipment in the plurality of data access terminal equipment, performing information sending monitoring processing on the data access terminal equipment to form an information sending monitoring result corresponding to the data access terminal equipment, wherein the information sending monitoring result is used for reflecting whether the corresponding data access terminal equipment sends a data access request to the big data processing cloud platform or not;
and for any data access terminal equipment in the plurality of data access terminal equipment, taking an information sending monitoring result corresponding to the data access terminal equipment as a basis for equipment identity analysis, and performing equipment identity determination processing on the data access terminal equipment to generate an equipment identity determination result corresponding to the data access terminal equipment.
3. The big data-based data security tamper-proofing method according to claim 2, wherein for any one of the plurality of data access terminal devices, the step of performing device identity determination processing on the data access terminal device by using an information sending monitoring result corresponding to the data access terminal device as a basis for device identity analysis to generate a device identity determination result corresponding to the data access terminal device includes:
for any data access terminal equipment in the plurality of data access terminal equipment, under the condition that an information sending monitoring result corresponding to the data access terminal equipment reflects that the data access terminal equipment sends a data access request to the big data processing cloud platform, analyzing the data access request to output equipment identity information corresponding to the data access terminal equipment;
for any data access terminal equipment in the plurality of data access terminal equipment, comparing and analyzing equipment identity information corresponding to the data access terminal equipment with a preset reference equipment identity information set to output a comparison and analysis result corresponding to the data access terminal equipment, wherein the comparison and analysis result is used for reflecting whether the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set or not;
for any data access terminal equipment in the multiple data access terminal equipment, according to a comparative analysis result corresponding to the data access terminal equipment, forming an equipment identity determination result corresponding to the data access terminal equipment, wherein the corresponding equipment identity determination result reflects that the data access terminal equipment belongs to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is different from each piece of reference equipment identity information in the reference equipment identity information set, and the corresponding equipment identity determination result reflects that the data access terminal equipment does not belong to the first data access terminal equipment under the condition that the comparative analysis result reflects that the equipment identity information corresponding to the data access terminal equipment is the same as one piece of reference equipment identity information in the reference equipment identity information set.
4. The big-data-based data security tamper-proofing method according to claim 1, wherein, in a case where a device identity determination result corresponding to each of the data access terminal devices is formed, for each of the determined first data access terminal devices, performing device correlation coefficient determination processing on the first data access terminal device and each of the other data access terminal devices except the first data access terminal device to generate a device correlation coefficient between the first data access terminal device and each of the other data access terminal devices, includes:
under the condition that an equipment identity determination result corresponding to each data access terminal equipment is formed, for each data access terminal equipment in the plurality of data access terminal equipment, performing data extraction processing on equipment interaction performed by the data access terminal equipment in history to form an equipment interaction data set corresponding to the data access terminal equipment;
and for each determined first data access terminal device, respectively performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device according to the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device.
5. The big-data-based data security tamper-proofing method according to claim 4, wherein for each determined first data access terminal device, the step of performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device except the first data access terminal device according to the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each other data access terminal device except the first data access terminal device, respectively, to generate the device correlation coefficient between the first data access terminal device and each other data access terminal device, includes:
for each determined first data access terminal device, respectively performing set correlation calculation processing on a device interaction data set corresponding to the first data access terminal device and a device interaction data set corresponding to each other data access terminal device except the first data access terminal device, so as to output set correlation between the first data access terminal device and each other data access terminal device except the first data access terminal device;
and for each determined first data access terminal device, performing device correlation coefficient determination processing on the first data access terminal device and each other data access terminal device according to the set correlation degree between the first data access terminal device and each other data access terminal device except the first data access terminal device, so as to generate a device correlation coefficient between the first data access terminal device and each other data access terminal device.
6. The big-data-based data security tamper-proofing method according to claim 5, wherein, for each of the determined first data access terminal devices, the step of performing set correlation calculation processing on the device interaction data set corresponding to the first data access terminal device and the device interaction data set corresponding to each of the other data access terminal devices except the first data access terminal device respectively to output the set correlation between the first data access terminal device and each of the other data access terminal devices except the first data access terminal device includes:
for each piece of first device interaction data in the device interaction data set corresponding to the first data access terminal device, performing text keyword extraction processing on the first device interaction data to form a corresponding first text keyword set, and for each piece of second device interaction data in the device interaction data set corresponding to the other data access terminal devices, performing text keyword extraction processing on the second device interaction data to form a corresponding second text keyword set;
for each piece of first device interaction data, performing set overlap ratio calculation processing on a first text keyword set corresponding to the first device interaction data and a first text keyword set corresponding to previous adjacent first device interaction data of the first device interaction data to output first text set overlap ratio corresponding to the first device interaction data, and for each piece of second device interaction data, performing set overlap ratio calculation processing on a second text keyword set corresponding to the second device interaction data and a second text keyword set corresponding to previous adjacent second device interaction data of the second device interaction data to output second text set overlap ratio corresponding to the second device interaction data;
according to the coincidence degree of a first text set corresponding to each piece of first equipment interaction data, splitting the equipment interaction data set corresponding to the first data access terminal equipment to form a plurality of first equipment interaction data sub-sets, wherein the equipment interaction data set belongs to an ordered set, and the splitting positions of the equipment interaction data set are respectively each piece of first equipment interaction data of which the coincidence degree of the corresponding first text set is less than or equal to the coincidence degree of a preset text set;
splitting the device interaction data sets corresponding to the other data access terminal devices according to the coincidence degree of the second text set corresponding to each piece of the second device interaction data to form a plurality of second device interaction data subsets, wherein the splitting positions of the device interaction data sets are respectively each piece of the second device interaction data of which the coincidence degree of the corresponding second text set is less than or equal to the coincidence degree of the preset text set;
for each first device interactive data subset, merging a first text keyword set corresponding to each piece of first device interactive data included in the first device interactive data subset to form a first text keyword merged set corresponding to the first device interactive data subset, and for each second device interactive data subset, merging a second text keyword set corresponding to each piece of second device interactive data included in the second device interactive data subset to form a second text keyword merged set corresponding to the second device interactive data subset;
respectively calculating the text set overlap ratio between each first text keyword merging set and each second text keyword merging set, and then carrying out fusion processing on the text set overlap ratio between each first text keyword merging set and each second text keyword merging set to form first set correlation;
forming a first object set corresponding to the first data access terminal device according to a data interaction object corresponding to each piece of first device interaction data in the device interaction data set corresponding to the first data access terminal device, and forming a second object set corresponding to the other data access terminal devices according to a data interaction object corresponding to each piece of second device interaction data in the device interaction data set corresponding to the other data access terminal devices;
and performing set contact ratio calculation processing on the first object set and the second object set to output a second set correlation degree, and performing fusion processing on the second set correlation degree and the first set correlation degree to output the set correlation degree between the first data access terminal equipment and the other data access terminal equipment.
7. The big-data-based data security tamper-proofing method according to any one of claims 1 to 6, wherein for each of the first data access terminal devices, the step of matching, from the other data access terminal devices, at least one second data access terminal device corresponding to the first data access terminal device by using a device correlation coefficient between the first data access terminal device and each other data access terminal device, so as to perform data security verification processing on data access of the first data access terminal device by using the at least one second data access terminal device, includes:
for each first data access terminal device, screening out a target number of other data access terminal devices with the minimum device correlation coefficient from the other data access terminal devices except the first data access terminal device, and marking each other data access terminal device in the target number of other data access terminal devices as a second data access terminal device corresponding to the first data access terminal device;
and for each first data access terminal device, respectively performing data security verification processing on the data access of the first data access terminal device through each second data access terminal device corresponding to the first data access terminal device.
8. The big-data-based data security tamper-proofing method according to claim 7, wherein the step of performing data security verification processing on the data access of each first data access terminal device through each second data access terminal device corresponding to the first data access terminal device for each first data access terminal device includes:
for each first data access terminal device, respectively sending a data access request corresponding to data access of the first data access terminal device to each second data access terminal device corresponding to the first data access terminal device for data security verification processing to form a data security verification result corresponding to each second data access terminal device, wherein the data security verification result is used for representing whether the corresponding data access request belongs to a secure data access request;
for each first data access terminal device, performing fusion processing on a data security verification result corresponding to each second data access terminal device according to a device correlation coefficient between the first data access terminal device and each second data access terminal device corresponding to the first data access terminal device to form a target data security verification result corresponding to the first data access terminal device, wherein the target data security verification result is used for reflecting whether a data access request corresponding to the corresponding first data access terminal device belongs to a secure data access request, and the big data processing cloud platform is further used for refusing to execute an unsecure data access request.
9. The utility model provides a data security tamper-proofing system based on big data which characterized in that is applied to big data processing cloud platform, big data processing cloud platform communication connection has a plurality of data access terminal equipment, data security tamper-proofing system based on big data includes:
the device identity determining module is used for determining the identity of any data access terminal device in the data access terminal devices to generate a device identity determining result corresponding to the data access terminal device, wherein the device identity determining result is used for reflecting whether the corresponding data access terminal device belongs to the first data access terminal device;
a correlation coefficient determining module, configured to, in a case where an apparatus identity determination result corresponding to each of the data access terminal apparatuses is formed, perform, for each of the determined first data access terminal apparatuses, apparatus correlation coefficient determination processing on the first data access terminal apparatus and each of other data access terminal apparatuses other than the first data access terminal apparatus, so as to generate an apparatus correlation coefficient between the first data access terminal apparatus and each of the other data access terminal apparatuses;
and the data security verification module is used for matching at least one second data access terminal device corresponding to the first data access terminal device from other data access terminal devices through the device correlation coefficient between the first data access terminal device and each other data access terminal device for each first data access terminal device, so as to perform data security verification processing on the data access of the first data access terminal device through the at least one second data access terminal device.
10. A big data processing cloud platform, wherein the big data processing cloud platform is used for executing the big data based data security tamper-proof method of any one of claims 1 to 8.
CN202210858452.8A 2022-07-21 2022-07-21 Data security tamper-proof method and system based on big data and cloud platform Active CN115225387B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210858452.8A CN115225387B (en) 2022-07-21 2022-07-21 Data security tamper-proof method and system based on big data and cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210858452.8A CN115225387B (en) 2022-07-21 2022-07-21 Data security tamper-proof method and system based on big data and cloud platform

Publications (2)

Publication Number Publication Date
CN115225387A true CN115225387A (en) 2022-10-21
CN115225387B CN115225387B (en) 2023-04-07

Family

ID=83612972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210858452.8A Active CN115225387B (en) 2022-07-21 2022-07-21 Data security tamper-proof method and system based on big data and cloud platform

Country Status (1)

Country Link
CN (1) CN115225387B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017031859A1 (en) * 2015-08-26 2017-03-02 百度在线网络技术(北京)有限公司 Method and apparatus for verifying access security
US20170279807A1 (en) * 2016-03-23 2017-09-28 Juan José Bermúdez Safe method to share data and control the access to these in the cloud
CN108881309A (en) * 2018-08-14 2018-11-23 北京奇虎科技有限公司 Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN111475841A (en) * 2020-04-07 2020-07-31 腾讯科技(深圳)有限公司 Access control method, related device, equipment, system and storage medium
CN114036489A (en) * 2021-11-11 2022-02-11 国网山东省电力公司 Information security management method and system based on big data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017031859A1 (en) * 2015-08-26 2017-03-02 百度在线网络技术(北京)有限公司 Method and apparatus for verifying access security
US20170279807A1 (en) * 2016-03-23 2017-09-28 Juan José Bermúdez Safe method to share data and control the access to these in the cloud
CN108881309A (en) * 2018-08-14 2018-11-23 北京奇虎科技有限公司 Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN111475841A (en) * 2020-04-07 2020-07-31 腾讯科技(深圳)有限公司 Access control method, related device, equipment, system and storage medium
CN114036489A (en) * 2021-11-11 2022-02-11 国网山东省电力公司 Information security management method and system based on big data

Also Published As

Publication number Publication date
CN115225387B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN112003870A (en) Network encryption traffic identification method and device based on deep learning
CN111786950B (en) Network security monitoring method, device, equipment and medium based on situation awareness
CN113489713B (en) Network attack detection method, device, equipment and storage medium
CN108600172B (en) Method, device and equipment for detecting database collision attack and computer readable storage medium
CN111783132A (en) SQL sentence security detection method, device, equipment and medium based on machine learning
CN113315828B (en) Traffic recording method and device, traffic recording equipment and storage medium
CN111683047A (en) Unauthorized vulnerability detection method and device, computer equipment and medium
CN111666573A (en) Method and device for evaluating vulnerability grade of website system and computer equipment
CN114726571A (en) Network security early warning management platform and method
CN115225387B (en) Data security tamper-proof method and system based on big data and cloud platform
CN110955890A (en) Method and device for detecting malicious batch access behaviors and computer storage medium
CN114679627B (en) Block chain-based on-demand data processing method and system
CN115242497A (en) Block chain-based data tamper-proof method and system
CN115643044A (en) Data processing method, device, server and storage medium
CN113556338B (en) Computer network security abnormal operation interception method
CN114756850A (en) Data acquisition method, device, equipment and storage medium
CN112073360B (en) Detection method, device, terminal equipment and medium for hypertext transmission data
CN114189585A (en) Crank call abnormity detection method and device and computing equipment
CN116663009A (en) Training system and method
CN112333157B (en) Network security protection method and network security protection platform based on big data
CN113627208B (en) Code scanning login early warning method and device, computer equipment and storage medium
CN113949578B (en) Automatic detection method and device for unauthorized loopholes based on flow and computer equipment
CN114679297A (en) Network security supervision platform and method
CN116094847B (en) Honeypot identification method, honeypot identification device, computer equipment and storage medium
CN115361157A (en) Distributed network security monitoring system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230109

Address after: No. 299, Caiyun Middle Road, Chenggong District, Kunming, Yunnan 650000

Applicant after: Yang Shengliang

Address before: No. 69, Haichuan Road, High tech Zone, Jining City, Shandong Province, 272000

Applicant before: Jining Simple Information Technology Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230321

Address after: Room 3311-3313, 33/F, Wanling Plaza, No. 39, Jiefang South Road, Yuexiu District, Guangzhou City, Guangdong Province, 510000

Applicant after: Guangzhou Huashang Small Loan Co.,Ltd.

Address before: No. 299, Caiyun Middle Road, Chenggong District, Kunming, Yunnan 650000

Applicant before: Yang Shengliang

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant