CN116186791A - Safe and reliable-based scientific data center sharing method - Google Patents

Safe and reliable-based scientific data center sharing method Download PDF

Info

Publication number
CN116186791A
CN116186791A CN202310155864.XA CN202310155864A CN116186791A CN 116186791 A CN116186791 A CN 116186791A CN 202310155864 A CN202310155864 A CN 202310155864A CN 116186791 A CN116186791 A CN 116186791A
Authority
CN
China
Prior art keywords
data
database
center
analysis
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310155864.XA
Other languages
Chinese (zh)
Inventor
李大锋
伍观娣
郑会全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Academy of Forestry
Original Assignee
Guangdong Academy of Forestry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Academy of Forestry filed Critical Guangdong Academy of Forestry
Priority to CN202310155864.XA priority Critical patent/CN116186791A/en
Publication of CN116186791A publication Critical patent/CN116186791A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2358Change logging, detection, and notification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safe and reliable scientific data center sharing method, which is characterized by comprising the following steps of: comprising the following six steps. The invention realizes the separation of the database server and the service system server through the architecture, performs data desensitization encryption in the data reading and exchanging process, prevents data leakage, realizes the desensitization operation on personal information in the data acquisition process through the database desensitization, prevents unauthorized access and illegal use of the personal information, can realize the separation of a production environment and a test environment by means of the data desensitization system, prevents the data leakage in the test process of a new system implementation, ensures that core data of a user is not leaked, lost and tampered, builds a database audit system in a bypass monitoring mode, can realize the safety protection of the core data without changing the existing network structure, establishes a special external network-free service terminal, and uses a special encryption transmission medium to upload and download data so as to ensure the safety of data transmission.

Description

Safe and reliable-based scientific data center sharing method
Technical Field
The invention relates to the technical field of data sharing, in particular to a safe and reliable scientific data center sharing method.
Background
The data sharing is to enable users using different computers and different software in different places to read the data of other people and perform various operations, operations and analysis, and along with the continuous development of informatization, the sharing data center plays a key role in ensuring the stable operation of each service system.
However, the data sharing brings convenience and also faces new risks, and once the data is leaked or tampered in the process of sharing the data, the normal operation of the informatization system is affected.
Disclosure of Invention
The invention aims to provide a safe and reliable scientific data center sharing method to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
the safe and reliable scientific data center sharing method comprises the following six steps:
step one: establishing a scientific data center shared database, collecting data of each service system, collecting the data to the shared data center by using a universal data extraction and synchronization tool, and generating a data update report;
step two: data arrangement, namely arranging updated data according to digitally formulated information standards, reporting data abnormality, ensuring consistency and accuracy of the data, retaining historical data, sharing and utilizing part or all resources of a data center, and providing a data use condition report in real time by a shared data center;
step three: the data encryption transmission is used for encrypting and storing the information stored in the database, and the authority control on the sensitive data access is realized through an independent authority control system, so that the data security is ensured;
step four: the database operation and maintenance audit improves the information security assurance capability and level through three stages of data acquisition, data analysis and audit analysis, and avoids great loss caused by the leakage or damage of the database content;
step five: the data sharing security architecture is established, the data security protection architecture of the safe and reliable scientific data sharing center is established through the security policies of the first step, the second step, the third step and the fourth step, the database server is separated from the service system server, and data desensitization encryption is carried out in the data reading and exchanging process, so that data leakage is prevented.
Step six: the operation and maintenance standardization is deployed by carding system assets, reinforcing system accounts and standardizing operation and maintenance processes, strengthening personnel management and making emergency plans.
Further, the data encryption transmission in the step three generates the desensitized quasi-real data through sampling, replacement and other modes, meets the requirements of being exported from a development database for use by a system developer, prevents real data from being leaked, encrypts important system data in a column-wise, line-wise and record-wise manner through database encryption, and desensitizes personal information through database, thereby preventing unauthorized access and illegal use of personal information.
Further, the data collection in the step four is accessed to the core switch in a bypass monitoring mode, all operations of communication with the database can be monitored by the collection engine through setting a port mirror mode, the operations are restored and tidied according to a database operation protocol and are sent to the data analysis center, the data analysis center carries out association analysis of the database operation by receiving database operation data of the data collection engine according to preset data analysis and event association rules, a result is sent to the data analysis center, the data analysis center sets a database audit rule according to the content of a database manager to be monitored, when the received analysis result accords with the audit rule set by the manager, the data analysis carries out alarming in real time, information such as a user, time, a terminal identification number, SQL statement and the like of the DML and DDL operation can be audited, the control is carried out from the SQL statement level of the access database and the field level of the check database, the audit record can be associated with a user name and a user IP address by utilizing the uniqueness of the session identifier of the database, and the audit record of the database of different types is concentrated on a management platform, and the audit record is prevented from being tampered with the data and the data is tampered with from the root.
In the fifth step, a special non-extranet service terminal is erected, and a special encryption transmission medium is used for uploading and downloading data, so that the data transmission safety is ensured.
Compared with the prior art, the invention has the beneficial effects that: the method is characterized in that a database server is separated from a service system server through a framework, data desensitization encryption is carried out in the data reading and exchanging process, data leakage is prevented, the desensitization operation on personal information is realized in the data collecting process through the database desensitization, unauthorized access and illegal use of the personal information are prevented, the separation of a production environment and a test environment can be realized by means of a data desensitization system, the data leakage in the test process of a new system is prevented, the fact that core data of a user are not leaked, lost and tampered is ensured by the method, a database audit system is built in a bypass monitoring mode, the safety protection of the core data can be realized without changing the existing network structure, a special external network-free service terminal is erected, and data uploading and downloading are carried out by using a special encryption transmission medium, so that the safety of data transmission is ensured.
Drawings
FIG. 1 is a schematic flow chart of the steps of the safe and reliable-based scientific data center sharing method.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "upper", "lower", "inner", "outer", "front", "rear", "both ends", "one end", "the other end", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific direction, be configured and operated in the specific direction, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "provided," "connected," and the like are to be construed broadly, and may be fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Example 1
Referring to fig. 1, an embodiment of the present invention is provided: the safe and reliable scientific data center sharing method comprises the following six steps:
step one: establishing a scientific data center shared database, collecting data of each service system, collecting the data to the shared data center by using a universal data extraction and synchronization tool, and generating a data update report;
step two: data arrangement, namely arranging updated data according to digitally formulated information standards, reporting data abnormality, ensuring consistency and accuracy of the data, retaining historical data, sharing and utilizing part or all resources of a data center, and providing a data use condition report in real time by a shared data center;
step three: the data encryption transmission is used for encrypting and storing the information stored in the database, and the authority control on the sensitive data access is realized through an independent authority control system, so that the data security is ensured;
step four: the database operation and maintenance audit improves the information security assurance capability and level through three stages of data acquisition, data analysis and audit analysis, and avoids great loss caused by the leakage or damage of the database content;
step five: establishing a data sharing security architecture, constructing a data security protection architecture of a safe and reliable scientific data sharing center through security policies of the first step, the second step, the third step and the fourth step, separating a database server from a service system server, and performing data desensitization encryption in the data reading and exchanging process to prevent data leakage;
step six: the operation and maintenance standardization is deployed by carding system assets, reinforcing system accounts and standardizing operation and maintenance processes, strengthening personnel management and making emergency plans.
Further, the data encryption transmission in the third step generates desensitized quasi-real data through sampling, replacement and other modes, meets the requirements of being exported from a development database for use by a system developer, prevents real data from being leaked, encrypts important system data in columns, rows and records through database encryption, and desensitizes personal information through database, so that unauthorized access and illegal use of the personal information are prevented.
Further, the data collection in the fourth step is accessed to the core switch in a bypass monitoring mode, all operations of communication with the database can be monitored by the collection engine through setting a port mirror mode, the operations are restored and tidied according to a database operation protocol and are sent to a data analysis center, the data analysis center carries out association analysis of the database operation by receiving database operation data of the data collection engine according to preset data analysis and event association rules, a result is sent to the data analysis center, the data analysis center sets a database audit rule according to the content of the database manager to be monitored on the database, when the received analysis result accords with the audit rule set by the manager, the data analysis carries out alarming in real time, can audit information such as users, time, terminal identification numbers and SQL sentences of DML and DDL operation, prevents control from accessing SQL sentence levels of the database and viewing field levels of the database, enables audit records of the databases to be associated with user names and user IP addresses by utilizing the uniqueness of session identifiers of the database, and the audit records of the databases of different types are concentrated on a management platform, and tampering of the data, deletion of the data and theft of the data are prevented from a root.
In the fifth step, the special non-extranet service terminal is erected, and the special encryption transmission medium is used for uploading and downloading data, so that the data transmission safety is ensured.
Example 2
The method is characterized in that a database server is separated from a service system server through a framework, data desensitization encryption is carried out in the data reading and exchanging process, data leakage is prevented, the desensitization operation on personal information is realized in the data collecting process through the database desensitization, unauthorized access and illegal use of the personal information are prevented, the separation of a production environment and a test environment can be realized by means of a data desensitization system, the data leakage in the test process of a new system is prevented, the fact that core data of a user are not leaked, lost and tampered is ensured by the method, a database audit system is built in a bypass monitoring mode, the safety protection of the core data can be realized without changing the existing network structure, a special external network-free service terminal is erected, and data uploading and downloading are carried out by using a special encryption transmission medium, so that the safety of data transmission is ensured.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (4)

1. The safe and reliable scientific data center sharing method is characterized by comprising the following steps of: the method comprises the following six steps:
step one: establishing a scientific data center shared database, collecting data of each service system, collecting the data to the shared data center by using a universal data extraction and synchronization tool, and generating a data update report;
step two: data arrangement, namely arranging updated data according to digitally formulated information standards, reporting data abnormality, ensuring consistency and accuracy of the data, retaining historical data, sharing and utilizing part or all resources of a data center, and providing a data use condition report in real time by a shared data center;
step three: the data encryption transmission is used for encrypting and storing the information stored in the database, and the authority control on the sensitive data access is realized through an independent authority control system, so that the data security is ensured;
step four: the database operation and maintenance audit improves the information security assurance capability and level through three stages of data acquisition, data analysis and audit analysis, and avoids great loss caused by the leakage or damage of the database content;
step five: establishing a data sharing security architecture, constructing a data security protection architecture of a safe and reliable scientific data sharing center through security policies of the first step, the second step, the third step and the fourth step, separating a database server from a service system server, and performing data desensitization encryption in the data reading and exchanging process to prevent data leakage;
step six: the operation and maintenance standardization is deployed by carding system assets, reinforcing system accounts and standardizing operation and maintenance processes, strengthening personnel management and making emergency plans.
2. The safe and reliable scientific data center sharing method according to claim 1, wherein: and thirdly, data encryption transmission is performed, desensitized quasi-real data is generated through sampling, replacement and other modes, the requirements of deriving from a development database for use by a system developer are met, real data leakage is prevented, important system data are encrypted in a column-wise, line-wise and record-wise manner through database encryption, desensitization operation on personal information is realized in the data acquisition process through database desensitization, and unauthorized access and illegal use of the personal information are prevented.
3. The safe and reliable scientific data center sharing method according to claim 1, wherein: the data collection in the fourth step is accessed to the core switch in a bypass monitoring mode, all operations of communication with the database can be monitored by the collection engine through setting a port mirror mode, the operations are restored and tidied according to a database operation protocol and are sent to a data analysis center, the data analysis center carries out association analysis of the database operation by receiving database operation data of the data collection engine according to preset data analysis and event association rules, the data analysis center sends results to the data analysis center, the data analysis center sets a database audit rule according to the content of a database manager to be monitored on the database, when the received analysis results accord with audit rules set by the manager, the data analysis carries out real-time alarm, can audit information such as users, time, terminal identification numbers and SQL sentences of DML and DDL operations, prevents control from accessing SQL sentence levels of the database and viewing field levels of the database, enables audit records to be associated with user names and user IP addresses by utilizing the uniqueness of session identifiers of the database, and the audit records of the databases of different types are concentrated on a management platform, and the audit records of the database is prevented from falsifying data, deleting data and stealing data from a root.
4. The safe and reliable scientific data center sharing method according to claim 1, wherein: and step five, a special non-extranet service terminal is erected, and a special encryption transmission medium is used for uploading and downloading data, so that the data transmission safety is ensured.
CN202310155864.XA 2023-02-23 2023-02-23 Safe and reliable-based scientific data center sharing method Withdrawn CN116186791A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310155864.XA CN116186791A (en) 2023-02-23 2023-02-23 Safe and reliable-based scientific data center sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310155864.XA CN116186791A (en) 2023-02-23 2023-02-23 Safe and reliable-based scientific data center sharing method

Publications (1)

Publication Number Publication Date
CN116186791A true CN116186791A (en) 2023-05-30

Family

ID=86436259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310155864.XA Withdrawn CN116186791A (en) 2023-02-23 2023-02-23 Safe and reliable-based scientific data center sharing method

Country Status (1)

Country Link
CN (1) CN116186791A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272355A (en) * 2023-11-22 2023-12-22 杭州绿云软件股份有限公司 Personal information management system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272355A (en) * 2023-11-22 2023-12-22 杭州绿云软件股份有限公司 Personal information management system and method

Similar Documents

Publication Publication Date Title
CN110443048A (en) Data center looks into number system
US6347374B1 (en) Event detection
KR101039698B1 (en) Database Security System, Server and Method which can protect user's Access to Database through Application
CN108416225A (en) Data Audit method, apparatus, computer equipment and storage medium
CN116186791A (en) Safe and reliable-based scientific data center sharing method
CN108965317B (en) Network data protection system
CN112511484B (en) U shield safety control management system
CN111159548A (en) Network information science and technology popularization service system
CN112734057A (en) Comprehensive automatic comprehensive operation and maintenance monitoring system for railway marshalling station
CN112734248A (en) Real estate intelligent management system
CN112613047A (en) System for data security management
CN117411913B (en) Secure interaction method of cloud platform and health application based on power transformation
CN117292054A (en) Three-dimensional digital-based intelligent operation and maintenance method and system for power grid
CN116894259A (en) Safety access control system of database
CN116955441A (en) Broken card early warning platform
CN108388664A (en) Integration method, device, computer equipment and the storage medium of sentence segment
CN115456379A (en) Asset intelligent mining and management method and system based on multi-source data
CN114282194A (en) IT risk monitoring method and device and storage medium
CN111883277A (en) Nuclear power station safety credible state monitoring system based on physical disconnection
CN111259383A (en) Safety management center system
CN110933064A (en) Method and system for determining user behavior track
CN114141342B (en) Medical equipment monitoring management analysis system based on MQTT protocol
CN117220935B (en) Network security monitoring system based on mobile computer
CN102298675A (en) Method and system for sending alarm signal by mobile storage device
EP4362413A1 (en) Diagnostic device and diagnosis method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230530