CN115664800A - Big data safety protection system based on cloud computing - Google Patents

Big data safety protection system based on cloud computing Download PDF

Info

Publication number
CN115664800A
CN115664800A CN202211309812.5A CN202211309812A CN115664800A CN 115664800 A CN115664800 A CN 115664800A CN 202211309812 A CN202211309812 A CN 202211309812A CN 115664800 A CN115664800 A CN 115664800A
Authority
CN
China
Prior art keywords
user
cloud
node
client
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211309812.5A
Other languages
Chinese (zh)
Inventor
李罡
成晨雨
李璨璨
李景丽
赵强
杨皓天
万腾
杨树成
程一洋
包括
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baicheng Normal University
Original Assignee
Baicheng Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baicheng Normal University filed Critical Baicheng Normal University
Priority to CN202211309812.5A priority Critical patent/CN115664800A/en
Publication of CN115664800A publication Critical patent/CN115664800A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data security management, in particular to a cloud computing-based big data security protection system and an application method thereof, aiming at solving the technical problem that the access control of different information can be realized when user nodes with different identities are on cloud platforms with different security levels, particularly when a mixed cloud is designed in the prior art, and specifically through a user front-end client, the user front-end client is a user client and a user node bearing the client; the resource access control system on the cloud is used for controlling the access of the resources on the cloud and the users and transmitting the scheduling of system node authentication; and the on-cloud resource library is data on the cloud and comprises an on-cloud application and an on-cloud database, when a user requests to access resources on the cloud, the client sends an access request, and the access request is subjected to user node evaluation through the accessed system module.

Description

Big data safety protection system based on cloud computing
Technical Field
The invention relates to the technical field of data security management, in particular to a cloud computing-based big data security protection system and an application method thereof.
Background
In the 5G era of the internet, not only the popularization of the internet technology, but also the operation of derivative technologies, but also the well-known cloud technology is more embodied in the hybrid cloud, and no matter the public cloud or the private cloud platform pay more attention to security factors such as user identity authentication, and the access control is also based on the coarse-grained management of the user identity; in addition, because the elastic application and platform of cloud computing are open, the security of the whole environment cannot be guaranteed when a user accesses the cloud. In order to solve the problem, the problem that access control on different information can be performed on user nodes with different identities on cloud platforms with different security levels, especially when a hybrid cloud is designed, needs to be solved.
Disclosure of Invention
The invention aims to solve the technical problem in the prior art that access control on different information can be realized on different security levels of cloud platforms for user nodes with different identities, particularly when a hybrid cloud is designed, and provides a cloud computing-based big data security protection system and an application method thereof.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a big data security protection system based on cloud computing comprises the following components in a mixed mode of the cloud computing:
the system comprises a user front-end client, a client and a user node, wherein the user front-end client is a client of a user and a user node for bearing the client;
the resource access control system on the cloud is used for controlling the access of the resources on the cloud and the user and transmitting the scheduling of system node authentication;
and the resource library on the cloud is data on the cloud, and comprises an application on the cloud and a database on the cloud.
Specifically, when a user requests to access resources on the cloud, the client sends an access request, and the access request is evaluated by the user node through the accessed system module.
Specifically, the user node evaluation comprises a credibility grade corresponding to the node, the credibility grade is verified based on the identity information of the user, a credibility verification calculation result is stored according to a preset and assignable credibility grade, and the credibility grade is used as a reference value so that the user can obtain the authentication of the access authority;
after the authentication is completed, the user can be authorized to access the corresponding resources on the cloud.
Specifically, the system for controlling access to resources on the cloud further includes:
the access control strategy module is used for determining the user authority according to the node credibility level of the application user, the user credibility level, the user group and the credibility level when the user applies for the authority;
after the authority is distributed, when the user accesses the resources on the cloud, the access control strategy module can avoid the serious strategy library to judge whether the user has the operation authority or not, and provides an authorization result or a result of refusing the operation according to whether the user has the operation authority or not.
Specifically, the resource access control system on the cloud further includes a communication module, which is used for message transmission and communicating with the client of the user node.
Specifically, the method further comprises the following steps: and the authority distribution control module is responsible for the distribution activity of the authority.
Specifically, after a user node enters a trusted level calculation process, a client of the user collects information of the node where the user node is located, and sends the node information to a trusted level calculation module;
the credibility level of one node is determined by the system and the application program of the node together;
after all the relevant data are collected, the management system obtains a comprehensive user node credible grade value.
Specifically, a final trusted level value of the user node is obtained through calculation, and a calculation result of the time is stored and used as a corresponding management factor of subsequent authorization;
the calculation is performed through a preset formula, and the preset formula is a calculation method for obtaining a corresponding credibility level by using the credibility information of the node.
Specifically, the formula of the calculation method of the confidence level is as follows:
node confidence rating value = λ C (sys) + (1- λ) E8 iC (app)
The lambda is used as the weight of the credibility level of the system and is customized by a system administrator;
wherein, 1-in is the weight of the credibility level of the application software;
δ i represents the trust weight of each application software system in all application software systems, and E δ i =1;
the function C represents the comparison between the user platform and the standard platform.
An application method of the cloud computing-based big data security protection system is characterized by comprising the following steps:
step one, a user client is started to collect current node information;
after the information is collected, the user client sends the collected relevant information to a communication module;
step three, the communication module receives the user node information and uses the user node information as a cache;
step four, the communication module requests the trusted information standard information of the standard database node, the request passes through the step five, otherwise, the request is proposed again, and the program is exited when the request times exceed the preset times;
step five, the communication module receives the trusted information of the standard node and uses the trusted information as a cache;
step six, the communication module requests to inquire a strategy library, obtains a weight value of a credible level of a calculation node realizing the agreement, and requests to pass through a skip step seven, otherwise, requests are provided again, and the program exits when the request times exceed the preset times;
step seven, the communication module receives the weighted value, sends the data to the node credibility level calculation module, and calculates the credibility level according to a corresponding calculation formula;
and step eight, storing the calculated result.
The invention has the following beneficial effects:
according to the technical scheme, the access control on different information can be realized on the cloud platforms with different safety levels for the user nodes with different identities, particularly when a hybrid cloud is designed.
Drawings
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
FIG. 1 is a schematic diagram of the system topology of the present invention;
FIG. 2 is a block diagram of the system of the present invention;
FIG. 3 is an overall workflow diagram of the present invention;
fig. 4 is a flow chart of node trust level confirmation according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without any creative effort belong to the protection scope of the present invention; for convenience of description, in the present application, the left side is a "first end", the right side is a "second end", the upper side is a "first end", and the lower side is a "second end" in the current view, so that the description is for the purpose of clearly expressing the technical solution, and should not be construed as an improper limitation to the technical solution of the present application.
The invention aims to solve the technical problem in the prior art that access control on different information can be realized on different security levels of cloud platforms for user nodes with different identities, particularly when a hybrid cloud is designed, and provides a cloud computing-based big data security protection system and an application method thereof.
Referring to fig. 1, 2, 3, and 4, a cloud computing-based big data security protection system in a hybrid mode of cloud computing includes:
the system comprises a user front-end client, a client and a user node, wherein the user front-end client is a client of a user and a user node for bearing the client;
the resource access control system on the cloud is used for controlling the access of the resources on the cloud and the user and transmitting the scheduling of system node authentication;
and the on-cloud resource library is data on the cloud and comprises on-cloud applications and on-cloud databases.
Specifically, when a user requests to access resources on the cloud, the client sends an access request, and the access request is evaluated by the accessed system module.
Specifically, the user node evaluation comprises a credibility grade corresponding to the node, the credibility grade is verified based on the identity information of the user, a credibility verification calculation result is stored according to a preset and assignable credibility grade, and the credibility grade is used as a reference value so that the user can obtain the authentication of the access authority;
after the authentication is completed, the user can be authorized to access the corresponding resources on the cloud.
Specifically, the system for controlling access to resources on the cloud further includes:
the access control strategy module is used for determining the user authority according to the node credibility level of the application user, the user credibility level, the user group and the credibility level when the user applies for the authority;
after the authority is distributed, when the user accesses the resources on the cloud, the access control strategy module can avoid the serious strategy library to judge whether the user has the operation authority or not, and provides an authorization result or a result of refusing the operation according to whether the user has the operation authority or not.
Specifically, the resource access control system on the cloud further includes a communication module, which is used for message transmission and communicating with the client of the user node.
Specifically, the method further comprises the following steps: and the authority distribution control module is responsible for the distribution activity of the authority.
Specifically, after a user node enters a trusted level calculation process, a client of the user collects information of the node where the user node is located, and sends the node information to a trusted level calculation module;
the credibility level of one node is determined by the system and the application program of the node;
after all the related data are collected, the management system obtains a comprehensive user node credibility grade value.
Specifically, a final trusted level value of the user node is obtained through calculation, and a calculation result of the time is stored and used as a corresponding management factor of subsequent authorization;
the calculation is performed through a preset formula, and the preset formula is a calculation method for obtaining a corresponding credibility level by using the credibility information of the node.
Specifically, the formula of the calculation method of the confidence level is as follows:
node confidence rating value = λ C (sys) + (1- λ) E8 iC (app)
The lambda is used as the weight of the credibility level of the system and is customized by a system administrator;
wherein, 1-in is the weight of the credibility level of the application software;
δ i represents the credibility weight of each application software system in all application software systems, and E δ i =1;
the function C represents the comparison between the user platform and the standard platform.
Specifically, an application method of the cloud computing-based big data security protection system includes the following steps:
step one, a user client is started to collect current node information;
after the information is collected, the user client sends the collected relevant information to a communication module;
step three, the communication module receives the user node information and uses the user node information as a cache;
step four, the communication module requests the trusted information standard information of the standard database node, the request passes through the step five, otherwise, the request is proposed again, and the program is exited when the request times exceed the preset times;
step five, the communication module receives the trusted information of the standard node and uses the trusted information as a cache;
step six, the communication module requests to inquire a strategy library, obtains a weight value of a credible level of a calculation node realizing the agreement, and requests to pass through a skip step seven, otherwise, requests are provided again, and the program exits when the request times exceed the preset times;
step seven, the communication module receives the weight value, sends the data to the node credibility level calculation module, and calculates the credibility level according to the corresponding calculation formula;
and step eight, storing the calculated result.
In addition, it should be noted that: the access control strategy module mainly comprises a strategy server for strategy management, a credible grade server for credible grade management and a standard database. The policy server mainly stores each policy therein, and as a core policy server of the whole system, the policy of the policy server changes with the change of the real policy configuration file, so that the security requirement of the server is high. The credible grade server is responsible for completing credible grade evaluation of all user nodes, and the node credible grade calculation module is a part of the server and comprises a credible grade management module for credible grade management and the like. And finally, the standard database stores standard values of all credible grades, and the standard database can be used for verification when node result comparison is required.
The specific working steps and principle are as follows: and Sl, when the access control management system on the cloud is started, loading preset configuration files, and determining the static data such as the current state of the system through the configuration files.
And S2, before the user node enters the node trusted information collection, the system checks the current strategy configuration file in advance, verifies the current strategy and determines the collection content and the process of the user node information.
And S3, sending corresponding information to the client after determining the collection content and process of the user node information.
S4, at the moment, the user enters a node information credibility level calculation process, and at the moment, standard node credibility information is requested from a standard database.
And S5, the standard database sends the standard value of the corresponding type according to the type of the node system in the application.
And S6, the communication module sends the integrated data to the node credibility level calculation module for calculation.
And S7, notifying the communication module after the calculation result of the credibility level is generated.
S8, the communication module sends the calculation result to the strategy server and provides a query request, and the strategy server
The server will query its policy.
And S9, the strategy server inquires the strategy distribution file and compares the time of the strategy file to obtain the latest strategy.
And S10, the strategy server sends the strategy according to the received credibility level.
In order to ensure the security of the database, a special storage process is operated for each entity in the database, so that the database is accessed when the system needs to access the database. When the data is stored through a special storage process, only the stored data type and the stored sequence are consistent with the data checked by the process and can be smoothly stored, and the method better protects the safety and stability of the database. Since the whole application service is stored in the cloud, a special field needs to be provided to store a corresponding field to be used, and system expansion can be completed easily.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. This need not be, nor should it be exhaustive of all embodiments. And obvious variations or modifications derived therefrom are intended to be within the scope of the invention.

Claims (10)

1. A big data security protection system based on cloud computing is characterized by comprising the following components in a cloud computing mixed mode:
the system comprises a user front-end client, a client and a user node, wherein the user front-end client is a client of a user and a user node for bearing the client;
the resource access control system on the cloud is used for controlling the access of the resources on the cloud and the users and transmitting the scheduling of system node authentication;
and the on-cloud resource library is data on the cloud and comprises on-cloud applications and on-cloud databases.
2. The cloud-computing-based big data security protection system as claimed in claim 1, wherein when a user requests access to a resource on the cloud, the client sends an access request, and the access request is evaluated by the accessed system module at the time.
3. The cloud computing-based big data security protection system as claimed in claim 2, wherein the user node evaluation includes a trust level corresponding to the node, the trust level is verified based on the identity information of the user, and the trust verification calculation result is stored according to a preset and assignable trust level, and the trust level is used as a reference value, so that the user obtains the authentication of the access right;
after the authentication is completed, the user can be authorized to access the corresponding resources on the cloud.
4. The cloud computing-based big data security protection system as claimed in claim 3, wherein the resource access control system on the cloud further comprises:
the access control strategy module is used for determining the user authority according to the node credibility level of the application user, the user credibility level, the user group and the credibility level when the user applies for the authority;
after the authority is distributed, when the user accesses the resources on the cloud, the access control strategy module can avoid the serious strategy library to judge whether the user has the operation authority or not, and provides an authorization result or a result of refusing the operation according to whether the user has the operation authority or not.
5. The cloud-computing-based big data security protection system as claimed in claim 4, wherein the resource access control system on the cloud further comprises a communication module for message passing and communicating with the client of the user node.
6. The cloud computing-based big data security protection system according to claim 5, further comprising: and the authority distribution control module is responsible for the distribution activity of the authority.
7. The cloud-computing-based big data security protection system as claimed in claim 6, wherein after a user node enters a trusted level computing process, a client of the user collects information of the node where the user node is located, and sends the node information to the trusted level computing module;
the credibility level of one node is determined by the system and the application program of the node together;
after all the related data are collected, the management system obtains a comprehensive user node credibility grade value.
8. The cloud computing-based big data security protection system according to claim 7, wherein a trust level value of a final user node is obtained through calculation, and a calculation result of this time is stored and used as a corresponding management factor of subsequent authorization;
the calculation is performed through a preset formula, and the preset formula is a calculation method for obtaining a corresponding credibility level by using the credibility information of the node.
9. The cloud computing-based big data security protection system as claimed in claim 1, wherein the formula of the calculation method of the trust level is:
node confidence rating value = λ C (sys) + (1- λ) E8 iC (app)
The lambda is used as the weight of the credibility level of the system and is customized by a system administrator;
wherein, 1-in is the weight of the credibility level of the application software;
δ i represents the credibility weight of each application software system in all application software systems, and E δ i =1;
the function C represents the comparison between the user platform and the standard platform.
10. An application method of the cloud computing-based big data security protection system according to claims 1-9, comprising the following steps:
step one, a user client is started to collect current node information;
step two, after the information collection is finished, the user client sends the collected related information to the communication module;
step three, the communication module receives the user node information and uses the user node information as a cache;
step four, the communication module requests the trusted information standard information of the standard database node, the request goes through the step five, otherwise, the request is proposed again, and the program exits when the request times exceed the preset times;
step five, the communication module receives the trusted information of the standard node and uses the trusted information as a cache;
step six, the communication module requests to inquire a strategy library, obtains a weight value of a trust level of a calculation node realizing the agreement, and requests to pass through a skip step seven, otherwise, requests are proposed again, and the program exits when the request times exceed the preset times;
step seven, the communication module receives the weight value, sends the data to the node credibility level calculation module, and calculates the credibility level according to the corresponding calculation formula;
and step eight, storing the calculated result.
CN202211309812.5A 2022-10-25 2022-10-25 Big data safety protection system based on cloud computing Pending CN115664800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211309812.5A CN115664800A (en) 2022-10-25 2022-10-25 Big data safety protection system based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211309812.5A CN115664800A (en) 2022-10-25 2022-10-25 Big data safety protection system based on cloud computing

Publications (1)

Publication Number Publication Date
CN115664800A true CN115664800A (en) 2023-01-31

Family

ID=84990949

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211309812.5A Pending CN115664800A (en) 2022-10-25 2022-10-25 Big data safety protection system based on cloud computing

Country Status (1)

Country Link
CN (1) CN115664800A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305220A (en) * 2023-05-18 2023-06-23 天云融创数据科技(北京)有限公司 Big data-based resource data processing method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127368A (en) * 2016-06-14 2016-11-16 成都镜杰科技有限责任公司 Date storage method for ERP System
US20160344736A1 (en) * 2015-05-19 2016-11-24 Microsoft Technology Licensing, Llc. Secured access control to cloud-based applications
CN106997440A (en) * 2017-04-10 2017-08-01 中经汇通电子商务有限公司 A kind of role access control method
CN111953679A (en) * 2020-08-11 2020-11-17 中国人民解放军战略支援部队信息工程大学 Intranet user behavior measurement method and network access control method based on zero trust
CN112118102A (en) * 2020-10-21 2020-12-22 国网天津市电力公司 Dedicated zero trust network system of electric power
CN112565189A (en) * 2020-11-04 2021-03-26 国网安徽省电力有限公司信息通信分公司 Access control system based on cloud computing data security
CN113395271A (en) * 2021-06-07 2021-09-14 武汉卓尔信息科技有限公司 Data security access method in cloud computing platform and cloud computing platform
CN114629719A (en) * 2022-04-08 2022-06-14 中国移动通信集团陕西有限公司 Resource access control method and resource access control system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160344736A1 (en) * 2015-05-19 2016-11-24 Microsoft Technology Licensing, Llc. Secured access control to cloud-based applications
CN106127368A (en) * 2016-06-14 2016-11-16 成都镜杰科技有限责任公司 Date storage method for ERP System
CN106997440A (en) * 2017-04-10 2017-08-01 中经汇通电子商务有限公司 A kind of role access control method
CN111953679A (en) * 2020-08-11 2020-11-17 中国人民解放军战略支援部队信息工程大学 Intranet user behavior measurement method and network access control method based on zero trust
CN112118102A (en) * 2020-10-21 2020-12-22 国网天津市电力公司 Dedicated zero trust network system of electric power
CN112565189A (en) * 2020-11-04 2021-03-26 国网安徽省电力有限公司信息通信分公司 Access control system based on cloud computing data security
CN113395271A (en) * 2021-06-07 2021-09-14 武汉卓尔信息科技有限公司 Data security access method in cloud computing platform and cloud computing platform
CN114629719A (en) * 2022-04-08 2022-06-14 中国移动通信集团陕西有限公司 Resource access control method and resource access control system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305220A (en) * 2023-05-18 2023-06-23 天云融创数据科技(北京)有限公司 Big data-based resource data processing method and system
CN116305220B (en) * 2023-05-18 2023-08-08 天云融创数据科技(北京)有限公司 Big data-based resource data processing method and system

Similar Documents

Publication Publication Date Title
US10055561B2 (en) Identity risk score generation and implementation
CN110941844B (en) Authentication method, system, electronic equipment and readable storage medium
CN108494703A (en) A kind of access frequency control method, device and storage medium
EP3547634B1 (en) Method and apparatus for determining access permission, and terminal
CN109918924A (en) The control method and system of dynamic access permission
CN116708037B (en) Cloud platform access right control method and system
CN105872094A (en) Service robot cloud platform interface system based on SOA and working method thereof
CN114465807A (en) Zero-trust API gateway dynamic trust evaluation and access control method and system based on machine learning
WO2011162750A1 (en) Authorization control
CN104735091A (en) Linux system-based user access control method and device
CN101562558A (en) Method, system and device for terminal grade classification
CN115664800A (en) Big data safety protection system based on cloud computing
CN112651001A (en) Access request authentication method, device, equipment and readable storage medium
CN116418568A (en) Data security access control method, system and storage medium based on dynamic trust evaluation
CN101594386B (en) Method and device for constructing reliable virtual organization based on distributed strategy verification
CN118041667A (en) Block chain-based attribute access control system and method for Internet of things in edge computing environment
Faiella et al. Collaborative attribute retrieval in environment with faulty attribute managers
Zhang et al. Access control and trust management for emerging multidomain environments
CN112116348B (en) Access control method for node resources
CN102238037B (en) Cooperative target strategy detailing method
US20220255970A1 (en) Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices
CN111367617A (en) Computing resource trusted management linkage system and method
CN112104653B (en) Trusted computing management method and device for charging system and storage medium
CN115277252B (en) Data authorization method based on multi-signature mechanism
CN117318914B (en) Block chain service platform based on terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20230131

RJ01 Rejection of invention patent application after publication