CN116975940A - Network security storage method and system based on big data - Google Patents

Network security storage method and system based on big data Download PDF

Info

Publication number
CN116975940A
CN116975940A CN202310951729.6A CN202310951729A CN116975940A CN 116975940 A CN116975940 A CN 116975940A CN 202310951729 A CN202310951729 A CN 202310951729A CN 116975940 A CN116975940 A CN 116975940A
Authority
CN
China
Prior art keywords
data
bim
receiving end
storage
bim data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310951729.6A
Other languages
Chinese (zh)
Inventor
王育新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202310951729.6A priority Critical patent/CN116975940A/en
Publication of CN116975940A publication Critical patent/CN116975940A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a network security storage method and system based on big data. Generating an encryption key and a decryption key according to a storage list index corresponding to the optimal BIM data receiving end, transmitting the encryption key transmission time to the BIM data transmitting end so that the BIM data transmitting end encrypts data to be transmitted, and transmitting the encrypted data to a transfer service station according to the allowed data transmission time; the encrypted data and the decryption key are both sent to the optimal BIM data receiving end, so that the optimal BIM data receiving end decrypts the encrypted data by using the decryption key, the decrypted data is directly stored to a corresponding storage position, the optimal BIM data receiving end is found out according to the storage list index through the transfer service station, the problem of storage failure after a part of traditional storage is avoided, and the problems of damage and data theft in the data storage process are also avoided.

Description

Network security storage method and system based on big data
Technical Field
The invention belongs to the technical field of network security data storage, and particularly relates to a network security storage method and system based on big data.
Background
With the rapid development of computer technology and network technology, the Internet (Internet) technology plays an increasing role in daily life, study and work of people, so that a large amount of data is generated in various fields of industry and needs to be stored, so that the following summary application based on previous experience is performed: such as the field of BIM architecture.
When BIM data is stored in the traditional architecture field, BIM historical data to be stored is directly sent to a BIM data receiving end corresponding to a data terminal through a BIM data sending end, but the scheme has the following defects: first, the BIM data receiving end may be receiving other data, and there is a problem of data receiving congestion. Second, since only one BIM data receiving end is corresponding, when data storage is performed, a problem of stopping storage after storing a part of data occurs. Thirdly, when the important BIM history data is stored, the problem that the data is stolen is easily caused.
Disclosure of Invention
Based on the technical problems, the invention provides a network security storage method and a system based on big data, which are used for transmitting and storing encrypted data in idle time and avoiding data transmission congestion and data theft.
In one aspect, the present invention provides a big data based network secure storage system, the system comprising: the system comprises a BIM data sending end, at least one BIM data receiving end and a transfer service station; the BIM data sending end is connected with each BIM data receiving end through the transit service station.
The BIM data transmitting end is used for transmitting a data transmission request; the data transmission request comprises a data storage type and occupied memory; the BIM data transmitting end is also used for encrypting the data to be transmitted by using the encryption key to obtain encrypted data, and transmitting the encrypted data to the transfer service station according to the allowed data transmission time.
The BIM data receiving end is used for receiving the data sending request, determining a storage position according to the data sending request and sending a storage list index to the transfer service station; the storage list index comprises a storage position, an allowed data sending time, a data receiving speed and a BIM data receiving end corresponding ID.
The transfer service station is used for sending the data sending request sent by the BIM data sending end to each BIM data receiving end; the transfer service station is further configured to receive the storage list index sent by each BIM data receiving end, determine an optimal BIM data receiving end according to the storage list index, generate the encryption key and the decryption key, and send both the encryption key and the allowed data sending time to the BIM data sending end; the transfer service station is further configured to send the encrypted data and the decryption key to the optimal BIM data receiving end, so that the optimal BIM data receiving end receives the encrypted data and the decryption key, decrypt the encrypted data by using the decryption key, and directly store the decrypted data to a corresponding storage location; the encryption key and the decryption key are matched to each other.
Optionally, the BIM data receiving end is configured to receive the data sending request, determine a storage location according to the data sending request, and send a storage list index to the transit service station, and specifically includes:
the BIM data receiving terminal judges whether a storage position exists according to the data sending request; if the storage position exists, sending a storage list index to the transfer service station; and if the storage position does not exist, transmitting the 'no storage position' to the transfer service station.
Optionally, the determining the optimal BIM data receiving end according to the stored list index specifically includes:
and determining the distance from the BIM data receiving end corresponding to each ID to the transfer service station.
And determining BIM data storage factors according to the corresponding distance of each BIM data receiving end, the speed of receiving data and the allowed data sending time.
And taking the BIM data receiving end corresponding to the minimum BIM data storage factor as an optimal BIM data receiving end.
Optionally, the BIM data storage factor is determined according to the distance corresponding to each BIM data receiving end, the speed of receiving data and the allowed data sending time, and a specific calculation formula is as follows:
Q=k 1 t i1 -t 2 2 +k 2 s i +k 3 v i
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
Optionally, the BIM data sending end is further configured to determine whether the encryption key is a valid encryption key; if the encryption key is an effective encryption key, encrypting the data to be transmitted by using the encryption key to obtain encrypted data; and if the encryption key is an invalid encryption key, sending the encryption key to the transit service station to be invalid, so that the subsequent transit service station generates the encryption key according to the stored list index corresponding to the optimal BIM data receiving end and an additional parameter factor.
Optionally, the BIM data receiving end is further configured to determine whether the decryption key is a valid decryption key; if the decryption key is a valid decryption key, decrypting the encrypted data using the decryption key; and if the decryption key is an invalid decryption key, transmitting the invalid decryption key to the transfer service station so that the subsequent transfer service station generates the decryption key according to the stored list index corresponding to the optimal BIM data receiving end and an additional parameter factor.
In another aspect, the present invention provides a method for securely storing a network based on big data, the method being performed by a transit service station, the method comprising:
acquiring a data transmission request sent by a BIM data sending end, and sending the data transmission request to each BIM data receiving end, so that the BIM data receiving end determines a storage position according to the data transmission request and sends a storage list index; the data transmission request comprises a data storage type and occupied memory; the storage list index comprises a storage position, an allowed data sending time and a BIM data receiving end corresponding ID.
And receiving the storage list index sent by each BIM data receiving end, and determining the optimal BIM data receiving end according to the storage list index.
Generating the encryption key and the decryption key, and transmitting the encryption key and the allowed data transmission time to the BIM data transmitting end; and the BIM data transmitting end encrypts data to be transmitted by using an encryption key to obtain encrypted data, and transmits the encrypted data according to the allowed data transmission time.
The encrypted data and the decryption key are both sent to the optimal BIM data receiving end, so that the optimal BIM data receiving end decrypts the encrypted data by using the decryption key, and the decrypted data is directly stored in a corresponding storage position; the encryption key and the decryption key are matched to each other.
Optionally, the determining the optimal BIM data receiving end according to the stored list index specifically includes:
and determining the distance from the BIM data receiving end corresponding to each ID to the transfer service station.
And determining BIM data storage factors according to the corresponding distance of each BIM data receiving end, the speed of receiving data and the allowed data sending time.
And taking the BIM data receiving end corresponding to the minimum BIM data storage factor as an optimal BIM data receiving end.
Optionally, the BIM data storage factor is determined according to the distance corresponding to each BIM data receiving end, the speed of receiving data and the allowed data sending time, and a specific calculation formula is as follows:
Q=k 1 t i1 -t 2 2 +k 2 s i +k 3 v i
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
Optionally, the method further comprises:
and when the encryption key is invalid, generating the encryption key according to the storage list index corresponding to the optimal BIM data receiving end and the additional parameter factors.
And when the decryption key is invalid, generating the decryption key according to the storage list index corresponding to the optimal BIM data receiving end and the additional parameter factors.
Compared with the prior art, the invention has the following beneficial effects:
1. before the BIM data transmitting end transmits the data to be transmitted, the optimal BIM data receiving end is found out according to the storage list index through the transfer service station, so that the optimal storage of the data to be transmitted is realized, and the problem of storage failure after the storage of a part of traditional data is solved; the problems of the speed of receiving data and the transmission distance are comprehensively balanced.
2. The invention generates an encryption key and a decryption key according to the storage list index corresponding to the optimal BIM data receiving end, and transmits the encryption key transmission time to the BIM data transmitting end, so that the BIM data transmitting end encrypts data to be transmitted and transmits the encrypted data to the transfer service station according to the allowed data transmission time; the encrypted data and the decryption key are both sent to the optimal BIM data receiving end, so that the optimal BIM data receiving end decrypts the encrypted data by using the decryption key, and the decrypted data is directly stored in a corresponding storage position, thereby avoiding the problems of damage and data theft in the data storage process.
Drawings
FIG. 1 is a block diagram of a network security storage system based on big data according to the present invention.
101, a BIM data transmitting end; 102. a BIM data receiving end; 103. and (5) transferring the service station.
Detailed Description
The invention is further described below in connection with specific embodiments and the accompanying drawings, but the invention is not limited to these embodiments.
Example 1
As shown in fig. 1, the present invention discloses a network secure storage system based on big data, the system comprising: a BIM data transmitting terminal 101, at least one BIM data receiving terminal 102, and a transit service station 103; the BIM data transmitting terminal 101 is connected to each of the BIM data receiving terminals 102 through the relay service station 103.
In this embodiment, the BIM data transmitting end 101 is any one of electronic products such as an upper computer, a tablet computer, a computer, and a mobile phone, and the BIM data receiving end 102 is at least one of electronic products such as an upper computer, a tablet computer, a computer, and a mobile phone, but is preferably an upper computer. In addition, the number of BIM data receiving terminals 102 may be set according to actual requirements. The transfer service station 103 is any one of a virtual host, a VPS, an independent host, a cloud host, the cloud transfer service station 103, and a hosting host. Wireless network data connection is adopted among the BIM data sending terminal 101, each BIM data receiving terminal 102 and the transit service station 103. The communication between the terminals and the relay station 103 is required to pass through core network elements, such as SGSN or GGSN, through which data transmitted between the terminals and the relay station 103 passes.
The BIM data transmitting terminal 101 is configured to transmit a data transmission request; the data transmission request comprises a data storage type and occupied memory; the BIM data transmitting terminal 101 is further configured to encrypt data to be transmitted with an encryption key to obtain encrypted data, and transmit the encrypted data to the relay service station 103 according to the allowed data transmission time.
In this embodiment, the data storage type includes at least one of text, chart, voice, and image, including but not limited to the above. In addition, the occupied memory is actually the size of the space occupied to accommodate the data to be transmitted.
The BIM data receiving end 102 is configured to receive the data sending request, determine a storage location according to the data sending request, and send a storage list index to the relay service station 103; the storage list index includes a storage location, an allowed data transmission time, a speed of receiving data, and a corresponding ID of the BIM data receiving end 102.
The transfer service station 103 is configured to send a data sending request sent by the BIM data sending end 101 to each of the BIM data receiving ends 102; the transfer service station 103 is further configured to receive the storage list index sent by each BIM data receiving end 102, determine an optimal BIM data receiving end 102 according to the storage list index, generate the encryption key and the decryption key, and send both the encryption key and the allowed data sending time to the BIM data sending end 101; the transfer service station 103 is further configured to send the encrypted data and the decryption key to the optimal BIM data receiving end 102, so that the optimal BIM data receiving end 102 receives the encrypted data and the decryption key, decrypt the encrypted data with the decryption key, and directly store the decrypted data in a corresponding storage location; the encryption key and the decryption key are matched to each other.
In order to save resources, before the BIM data sending end 101 sends data to be sent, the invention finds the optimal BIM data receiving end 102 according to the index of the storage list through the transfer service station 103, thereby not only realizing the storage of the data to be sent, but also comprehensively balancing the speed of receiving the data and the transmission distance.
In order to improve the security in the data transmission process, the invention generates an encryption key and a decryption key according to the storage list index corresponding to the optimal BIM data receiving end 102, and transmits the encryption key transmission time to the BIM data transmitting end 101, so that the BIM data transmitting end 101 encrypts the data to be transmitted, and transmits the encrypted data to the transit service station 103 according to the allowed data transmission time; the encrypted data and the decryption key are both sent to the optimal BIM data receiving end 102, so that the optimal BIM data receiving end 102 decrypts the encrypted data by using the decryption key, and the decrypted data is directly stored in a corresponding storage position, thereby further avoiding the problems of damage and data theft in the data transmission process.
As an alternative embodiment, the present invention generates the encryption key and the decryption key, specifically, generates the encryption key and the decryption key according to a storage location in the storage list index corresponding to the optimal BIM data receiving end 102, an allowable data transmission time, a speed of receiving data, and an ID corresponding to the BIM data receiving end 102. The method comprises the following specific steps of: a random key is obtained. A time key is generated based on the allowed data transmission time. An ID key is generated according to the corresponding ID of the BIM data receiving end 102. A transmission key is generated based on the speed at which the data is received. A location key is generated from the storage location. The encryption key and the decryption key are generated from the random key, the location key, the time key, the ID key, and the transmission key.
The encryption key and the decryption key are generated according to the storage list index corresponding to the optimal BIM data receiving end 102, the storage position, the allowed data sending time, the data receiving speed and the ID corresponding to the BIM data receiving end 102 are comprehensively considered in the process of generating the key, and the parameters are changed when the data to be sent are sent each time, so that the generated keys are different, the same key is prevented from being used for multiple times, and compared with the conventional data encryption and decryption method, the encryption method disclosed by the invention is safer.
As an alternative embodiment, the BIM data receiving end 102 of the present invention is configured to receive the data transmission request, determine a storage location according to the data transmission request, and send a storage list index to the transit service station 103, and specifically includes:
BIM data receiving end 102 judges whether a storage position exists according to the data sending request; if a storage location exists, sending a storage list index to the transfer service station 103; if there is no storage location, a "no storage location" is sent to the staging service station 103.
The internal storage space of different transfer service stations 103 is different, so that more data are likely to be stored in the internal storage space, and new data cannot be received because the internal storage space is full, so that it is very necessary to judge whether the internal storage space has a place to store new data in the process of storing data, and interruption after half of data reception can be avoided, and further the data receiving time is prolonged.
As an optional implementation manner, the determining the optimal BIM data receiving end 102 according to the stored list index according to the present invention specifically includes:
1. the distance from the BIM data receiving end 102 corresponding to each ID to the transit service station 103 is determined. Specifically, the distance between the transit service station 103 and each data receiving end may be calculated by using a product of the data propagation speed and time, or may be calculated by using each distance formula, and may specifically be selected according to actual requirements.
2. According to the distance corresponding to each BIM data receiving end 102, the speed of receiving data and the allowed data sending time, the BIM data storage factor is determined, and the specific calculation formula is as follows:
Q=k 1 t i1 -t 2 2 +k 2 s i +k 3 v i
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
3. And taking the BIM data receiving end 102 corresponding to the minimum BIM data storage factor as an optimal BIM data receiving end.
As an optional implementation manner, the BIM data sending end 101 of the present invention is further configured to determine whether the encryption key is a valid encryption key; if the encryption key is an effective encryption key, encrypting the data to be transmitted by using the encryption key to obtain encrypted data; and if the encryption key is an invalid encryption key, sending the encryption key to the transit service station 103 to be invalid, so that the subsequent transit service station 103 generates the encryption key according to the stored list index corresponding to the optimal BIM data receiving end 102 and an additional parameter factor.
As an optional implementation manner, the BIM data receiving end 102 of the present invention is further configured to determine whether the decryption key is a valid decryption key; if the decryption key is a valid decryption key, decrypting the encrypted data using the decryption key; and if the decryption key is an invalid decryption key, transmitting the invalid decryption key to the transit service station 103, so that the subsequent transit service station 103 generates the decryption key according to the stored list index corresponding to the optimal BIM data receiving end 102 and an additional parameter factor.
The invention is judged that the invalid encryption key and the invalid decryption key mainly include, but are not limited to, the following, the first is that the encryption key or the decryption key has been used; the second is that the encryption key and the decryption key are not matched; the third is that the encryption key and the decryption key lack bits or messy codes, etc.; the fourth is that the encryption key and the decryption key are attacked, etc.
The additional parameter factors of the invention can be special characters set in advance or random codes selected randomly, and can be set according to actual requirements.
Example 2
The invention also provides a network security storage method based on big data, the method is executed by the transit service station 103, and the method comprises the following steps:
acquiring a data transmission request sent by a BIM data sending terminal 101, and sending the data transmission request to each BIM data receiving terminal 102, so that the BIM data receiving terminal 102 determines a storage position according to the data transmission request, and sends a storage list index; the data transmission request comprises a data storage type and occupied memory; the storage list index includes a storage location, an allowed data transmission time, and a corresponding ID of the BIM data receiving end 102.
And receiving the storage list index sent by each BIM data receiving end 102, and determining the optimal BIM data receiving end 102 according to the storage list index.
Generating the encryption key and the decryption key, and transmitting both the encryption key and the allowed data transmission time to the BIM data transmitting terminal 101; so that the BIM data transmitting terminal 101 encrypts data to be transmitted by using an encryption key to obtain encrypted data, and transmits the encrypted data according to the allowed data transmission time.
The encrypted data and the decryption key are both sent to the optimal BIM data receiving end 102, so that the optimal BIM data receiving end 102 decrypts the encrypted data by using the decryption key, and the decrypted data is directly stored in a corresponding storage position; the encryption key and the decryption key are matched to each other.
As an optional implementation manner, the determining the optimal BIM data receiving end 102 according to the stored list index according to the present invention specifically includes:
the distance from the BIM data receiving end 102 corresponding to each ID to the transit service station 103 is determined.
The BIM data storage factor is determined according to the distance corresponding to each BIM data receiving end 102, the speed of receiving data, and the allowed data transmission time.
The BIM data receiving terminal 102 corresponding to the minimum BIM data storage factor is used as the optimal BIM data receiving terminal 102.
As an optional implementation manner, the specific calculation formula of determining the BIM data storage factor according to the distance corresponding to each BIM data receiving end 102, the speed of receiving data, and the allowed data transmission time in the present invention is:
Q=mink 1 t i1 -t 2 2 +k 2 s i +k 3 v i
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
As an alternative embodiment, the method of the present invention further comprises:
when the encryption key is invalid, generating the encryption key according to the storage list index corresponding to the optimal BIM data receiving end 102 and an additional parameter factor; the BIM data sending end 101 judges whether the encryption key is a valid encryption key; if the encryption key is an effective encryption key, encrypting the data to be transmitted by using the encryption key to obtain encrypted data; if the encryption key is an invalid encryption key, an encryption key invalidation is sent to the transit service station 103.
And when the decryption key is invalid, generating the decryption key according to the storage list index corresponding to the optimal BIM data receiving end 102 and the additional parameter factors. The BIM data receiving end 102 determines whether the decryption key is a valid decryption key; if the decryption key is a valid decryption key, decrypting the encrypted data using the decryption key; if the decryption key is an invalid decryption key, a decryption key invalidation is sent to the transit service station 103.
In the description of the present invention, the terms "one embodiment," "some embodiments," "particular embodiments," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In the present invention, the schematic representations of the above terms do not necessarily refer to the same embodiment or example.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A big data based network secure storage system, the system comprising: the system comprises a BIM data sending end, at least one BIM data receiving end and a transfer service station; the BIM data sending end is connected with each BIM data receiving end through the transit service station;
the BIM data transmitting end is used for transmitting a data transmission request; the data transmission request comprises a data storage type and occupied memory; the BIM data transmitting end is also used for encrypting the data to be transmitted by using the encryption key to obtain encrypted data, and transmitting the encrypted data to the transfer service station according to the allowed data transmission time;
the BIM data receiving end is used for receiving the data sending request, determining a storage position according to the data sending request and sending a storage list index to the transfer service station; the storage list index comprises a storage position, an allowed data sending time, a data receiving speed and a BIM data receiving end corresponding ID;
the transfer service station is used for sending the data sending request sent by the BIM data sending end to each BIM data receiving end; the transfer service station is further configured to receive the storage list index sent by each BIM data receiving end, determine an optimal BIM data receiving end according to the storage list index, generate the encryption key and the decryption key, and send both the encryption key and the allowed data sending time to the BIM data sending end; the transfer service station is further configured to send the encrypted data and the decryption key to the optimal BIM data receiving end, so that the optimal BIM data receiving end receives the encrypted data and the decryption key, decrypt the encrypted data by using the decryption key, and directly store the decrypted data to a corresponding storage location; the encryption key and the decryption key are matched to each other.
2. The big data based network security storage system of claim 1, wherein the BIM data receiving end is configured to receive the data transmission request, determine a storage location according to the data transmission request, and send a storage list index to the transit service station, and specifically includes:
the BIM data receiving terminal judges whether a storage position exists according to the data sending request; if the storage position exists, sending a storage list index to the transfer service station; and if the storage position does not exist, transmitting the 'no storage position' to the transfer service station.
3. The big data based network security storage system of claim 1, wherein the determining the optimal BIM data receiving end according to the storage list index specifically includes:
determining the distance from the BIM data receiving end corresponding to each ID to the transfer service station;
determining BIM data storage factors according to the corresponding distance of each BIM data receiving end, the speed of receiving data and the allowed data sending time;
and taking the BIM data receiving end corresponding to the minimum BIM data storage factor as an optimal BIM data receiving end.
4. The network security storage system based on big data according to claim 3, wherein the specific calculation formula is as follows:
Q=(k 1 (t i1 -t 2 ) 2 +k 2 s i +k 3 v i )
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
5. The big data based network security storage system of claim 1, wherein the BIM data transmitting end is further configured to determine whether the encryption key is a valid encryption key; if the encryption key is an effective encryption key, encrypting the data to be transmitted by using the encryption key to obtain encrypted data; and if the encryption key is an invalid encryption key, sending the encryption key to the transit service station to be invalid, so that the subsequent transit service station generates the encryption key according to the stored list index corresponding to the optimal BIM data receiving end and an additional parameter factor.
6. The big data based network security storage system of claim 1, wherein the BIM data receiving end is further configured to determine whether the decryption key is a valid decryption key; if the decryption key is a valid decryption key, decrypting the encrypted data using the decryption key; and if the decryption key is an invalid decryption key, transmitting the invalid decryption key to the transfer service station so that the subsequent transfer service station generates the decryption key according to the stored list index corresponding to the optimal BIM data receiving end and an additional parameter factor.
7. A method for secure storage of big data based networks, the method being performed by a transit service station, the method comprising:
acquiring a data transmission request sent by a BIM data sending end, and sending the data transmission request to each BIM data receiving end, so that the BIM data receiving end determines a storage position according to the data transmission request and sends a storage list index; the data transmission request comprises a data storage type and occupied memory; the storage list index comprises a storage position, an allowed data sending time and a BIM data receiving end corresponding ID;
receiving a storage list index sent by each BIM data receiving end, and determining an optimal BIM data receiving end according to the storage list index;
generating the encryption key and the decryption key, and transmitting the encryption key and the allowed data transmission time to the BIM data transmitting end; the BIM data transmitting end encrypts data to be transmitted by using an encryption key to obtain encrypted data, and transmits the encrypted data according to the allowed data transmission time;
the encrypted data and the decryption key are both sent to the optimal BIM data receiving end, so that the optimal BIM data receiving end decrypts the encrypted data by using the decryption key, and the decrypted data is directly stored in a corresponding storage position; the encryption key and the decryption key are matched to each other.
8. The method for securely storing big data in a network according to claim 7, wherein said determining an optimal BIM data receiving end according to the storage list index specifically includes:
determining the distance from the BIM data receiving end corresponding to each ID to the transfer service station;
determining BIM data storage factors according to the corresponding distance of each BIM data receiving end, the speed of receiving data and the allowed data sending time;
and taking the BIM data receiving end corresponding to the minimum BIM data storage factor as an optimal BIM data receiving end.
9. The network security storage method based on big data according to claim 8, wherein the specific calculation formula is as follows:
Q=(k 1 (t i1 -t 2 ) 2 +k 2 s i +k 3 v i )
wherein t is i1 Allowing data transmission time s for ith BIM data receiving end i V is the distance from the ith BIM data receiving end to the transit service station i For the speed t of receiving data by the ith BIM data receiving end 2 For BIM data transmitting end to transmit data transmission request time k 1 、k 2 、k 3 All are parameter coefficients, and Q is a BIM data storage factor.
10. The method for secure storage of big data based network of claim 7, further comprising:
when the encryption key is invalid, generating the encryption key according to the storage list index corresponding to the optimal BIM data receiving end and the additional parameter factors;
and when the decryption key is invalid, generating the decryption key according to the storage list index corresponding to the optimal BIM data receiving end and the additional parameter factors.
CN202310951729.6A 2023-07-31 2023-07-31 Network security storage method and system based on big data Pending CN116975940A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310951729.6A CN116975940A (en) 2023-07-31 2023-07-31 Network security storage method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310951729.6A CN116975940A (en) 2023-07-31 2023-07-31 Network security storage method and system based on big data

Publications (1)

Publication Number Publication Date
CN116975940A true CN116975940A (en) 2023-10-31

Family

ID=88474448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310951729.6A Pending CN116975940A (en) 2023-07-31 2023-07-31 Network security storage method and system based on big data

Country Status (1)

Country Link
CN (1) CN116975940A (en)

Similar Documents

Publication Publication Date Title
JP4688296B2 (en) Safe handover method
CN101340443B (en) Session key negotiating method, system and server in communication network
CN101772024B (en) User identification method, device and system
CN101677269B (en) Method and system for transmitting keys
CN102195957A (en) Resource sharing method, device and system
JP4917116B2 (en) Data encryption system, communication device, and data encryption method
CN103533539A (en) Virtual SIM (subscriber identity module) card parameter management method and device
US9148757B2 (en) Method for tracking a mobile device onto a remote displaying unit
CN101895882A (en) Data transmission method, system and device in WiMAX system
CN102088441A (en) Data encryption transmission method and system for message-oriented middleware
CN110650009B (en) Mobile network and communication method
CN110166410B (en) Method and terminal for safely transmitting data and multimode communication terminal
KR20190040443A (en) Apparatus and method for creating secure session of smart meter
JP2006217275A (en) Vpn communication equipment and communication system
CN100499649C (en) Method for realizing safety coalition backup and switching
CN101378551A (en) WAP business system and method
CN111093060A (en) Protection device and protection method for video data acquisition and transmission safety
CN116975940A (en) Network security storage method and system based on big data
CN101902462B (en) Sensor network access control method and system with low expenditure
CN111885510B (en) Attendance checking method, attendance checking client and attendance checking system
CN101019082A (en) Method and apparatus for delivering keys
CN104159320A (en) Data exchange method of local heterogeneous network
JP2020162026A (en) Radio communication system and encryption key transmission/reception method
KR100458955B1 (en) Security method for the Wireless LAN
CN109274765B (en) Data transmission method, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination