CN117235761B - Cloud computing-based data security processing method, system and storage medium - Google Patents

Cloud computing-based data security processing method, system and storage medium Download PDF

Info

Publication number
CN117235761B
CN117235761B CN202311230007.8A CN202311230007A CN117235761B CN 117235761 B CN117235761 B CN 117235761B CN 202311230007 A CN202311230007 A CN 202311230007A CN 117235761 B CN117235761 B CN 117235761B
Authority
CN
China
Prior art keywords
data
initial data
preset
key
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311230007.8A
Other languages
Chinese (zh)
Other versions
CN117235761A (en
Inventor
席利宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baolian Star Technology Co ltd
Original Assignee
Beijing Baolian Star Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baolian Star Technology Co ltd filed Critical Beijing Baolian Star Technology Co ltd
Priority to CN202311230007.8A priority Critical patent/CN117235761B/en
Publication of CN117235761A publication Critical patent/CN117235761A/en
Application granted granted Critical
Publication of CN117235761B publication Critical patent/CN117235761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data security processing method, a system and a storage medium based on cloud computing, wherein the method comprises the following steps: acquiring initial data information to be processed; the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data; encrypting the first data based on a preset encryption system to obtain encrypted data; and sending the encrypted data to a user for display. According to the invention, the first data is encrypted through the preset encryption system, and the preset encryption system comprises a plurality of encryption keys, so that the safety performance of the data is improved.

Description

Cloud computing-based data security processing method, system and storage medium
Technical Field
The invention relates to the technical field of data security, in particular to a data security processing method, system and storage medium based on cloud computing.
Background
With the continuous development of cloud computing technology, the cloud computing technology is widely applied in the fields of business, life and the like, the data security problem of the cloud computing technology is also paid attention to, and particularly in recent years, various security accidents continuously exploded by cloud computing service providers reduce the trust of a user side to cloud computing services and bring adverse effects to the cloud computing services.
Therefore, the prior art has defects and needs to be estimated.
Disclosure of Invention
In view of the above problems, an object of the present invention is to provide a data security processing method, system and storage medium based on cloud computing, which can improve the data security performance of the cloud computing.
The first aspect of the invention provides a data security processing method based on cloud computing, which comprises the following steps:
acquiring initial data information to be processed;
the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data;
encrypting the first data based on a preset encryption system to obtain encrypted data;
Sending the encrypted data to a user for display;
the cloud computing system is stored in the preset processing module, the physical units are formed by a plurality of physical hosts, and the physical units can compute initial data.
In this scheme, before sending the initial data information to be processed to the preset processing module, the method further includes:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
In this scheme, the step of obtaining the encrypted data specifically includes:
Extracting features of the initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
matching the corresponding type physical host clusters according to the type of the initial data;
inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
acquiring the number of important grades of initial data;
Inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
acquiring the number of interfered grades of the corresponding type of physical host clusters;
Inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
combining the first key, the second key and the third key to obtain a combined key;
And encrypting the first data according to the combined key to obtain encrypted data.
In this solution, the step of obtaining the number of important classes of the initial data specifically includes:
extracting keywords in the initial data;
screening keywords in the initial data based on a preset knowledge point keyword library to obtain knowledge point keywords;
Obtaining knowledge points related to the corresponding initial data according to the knowledge point keywords;
Inquiring in a preset weight score table according to the knowledge points related in the initial data to obtain weight scores of the corresponding knowledge points;
Obtaining important weight values corresponding to the initial data according to the weight scores of the knowledge points;
And obtaining the number of important classes corresponding to the initial data according to a preset important weight value range within which the important weight value of the corresponding initial data falls.
In this scheme, the formula for obtaining the important weight value corresponding to the initial data according to the weight score of the knowledge point specifically includes:
the important weight value of the initial data is set as S, and the formula is that Where n represents all knowledge point numbers in the initial data, i represents a knowledge point number, a i represents a coefficient corresponding to the weight score of the knowledge point i, a i represents the weight score of the knowledge point i, and n i represents the number of times the knowledge point i appears in the initial data.
In this solution, the step of obtaining the number of interfered classes of the corresponding type of physical host clusters specifically includes:
Acquiring interfered information of a physical host cluster of a corresponding type based on a preset first time period;
extracting characteristic values in the interfered information of the type of physical host clusters;
multiplying the characteristic value in the interfered information of the type of physical host clusters by a corresponding coefficient, and accumulating to obtain the interfered value of the corresponding type of physical host clusters;
and obtaining the number of interfered grades of the corresponding type of physical host clusters according to the preset interference value range in which the interfered value of the corresponding type of physical host clusters falls.
The second aspect of the present invention provides a data security processing system based on cloud computing, including a memory and a processor, where the memory stores a data security processing method program based on cloud computing, and when the data security processing method program based on cloud computing is executed by the processor, the following steps are implemented:
acquiring initial data information to be processed;
the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data;
encrypting the first data based on a preset encryption system to obtain encrypted data;
Sending the encrypted data to a user for display;
the cloud computing system is stored in the preset processing module, the physical units are formed by a plurality of physical hosts, and the physical units can compute initial data.
In this scheme, before sending the initial data information to be processed to the preset processing module, the method further includes:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
In this scheme, the step of obtaining the encrypted data specifically includes:
Extracting features of the initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
matching the corresponding type physical host clusters according to the type of the initial data;
inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
acquiring the number of important grades of initial data;
Inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
acquiring the number of interfered grades of the corresponding type of physical host clusters;
Inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
combining the first key, the second key and the third key to obtain a combined key;
And encrypting the first data according to the combined key to obtain encrypted data.
In this solution, the step of obtaining the number of important classes of the initial data specifically includes:
extracting keywords in the initial data;
screening keywords in the initial data based on a preset knowledge point keyword library to obtain knowledge point keywords;
Obtaining knowledge points related to the corresponding initial data according to the knowledge point keywords;
Inquiring in a preset weight score table according to the knowledge points related in the initial data to obtain weight scores of the corresponding knowledge points;
Obtaining important weight values corresponding to the initial data according to the weight scores of the knowledge points;
And obtaining the number of important classes corresponding to the initial data according to a preset important weight value range within which the important weight value of the corresponding initial data falls.
In this scheme, the formula for obtaining the important weight value corresponding to the initial data according to the weight score of the knowledge point specifically includes:
the important weight value of the initial data is set as S, and the formula is that Where n represents all knowledge point numbers in the initial data, i represents a knowledge point number, a i represents a coefficient corresponding to the weight score of the knowledge point i, a i represents the weight score of the knowledge point i, and n i represents the number of times the knowledge point i appears in the initial data.
In this solution, the step of obtaining the number of interfered classes of the corresponding type of physical host clusters specifically includes:
Acquiring interfered information of a physical host cluster of a corresponding type based on a preset first time period;
extracting characteristic values in the interfered information of the type of physical host clusters;
multiplying the characteristic value in the interfered information of the type of physical host clusters by a corresponding coefficient, and accumulating to obtain the interfered value of the corresponding type of physical host clusters;
and obtaining the number of interfered grades of the corresponding type of physical host clusters according to the preset interference value range in which the interfered value of the corresponding type of physical host clusters falls.
A third aspect of the present invention provides a computer-readable storage medium having stored therein a cloud computing-based data security processing method program which, when executed by a processor, implements the steps of a cloud computing-based data security processing method as described in any one of the above.
The invention discloses a data security processing method, a system and a storage medium based on cloud computing, wherein first data is encrypted through a preset encryption system, the preset encryption system comprises a plurality of encryption keys, and the security performance of the data is improved.
Drawings
FIG. 1 shows a flow chart of a data security processing method based on cloud computing of the present invention;
FIG. 2 shows a flow chart of the present invention for obtaining encrypted data;
FIG. 3 shows a block diagram of a cloud computing-based data security processing system of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
Fig. 1 shows a flow chart of a data security processing method based on cloud computing.
S101, acquiring initial data information to be processed;
s102, sending initial data information to be processed to a preset processing module to obtain first data;
s103, encrypting the first data based on a preset encryption system to obtain encrypted data;
s104, sending the encrypted data to a user side for display;
according to the embodiment of the invention, the user side sends the initial data to be processed to the preset processing module, the cloud computing system is stored in the preset processing module, the plurality of physical units are stored in the cloud computing system, the physical units are formed by a plurality of physical hosts, the physical units can calculate the initial data to obtain first data, then the first data is encrypted through the preset encryption system to obtain encrypted data, and the safety performance of data processing is improved through the preset encryption system.
According to an embodiment of the present invention, before the initial data information to be processed is sent to the preset processing module, the method further includes:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
Before the user terminal sends the initial data to the preset processing module, the user data of the initial data needs to be verified, if the user data information comprises signature authentication of a corresponding user, the user data indicates that the corresponding initial data is sent by the corresponding user, and the user data has authenticity, is real-name authentication, and improves reliability for the source of the initial data.
Fig. 2 shows a flow chart of the invention for obtaining encrypted data.
As shown in fig. 2, according to an embodiment of the present invention, the step of obtaining encrypted data specifically includes:
S201, extracting features of initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
S202, matching corresponding type physical host clusters according to the type of the initial data;
S203, inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
s204, acquiring the number of important grades of the initial data;
S205, inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
s206, obtaining the number of interfered grades of the corresponding type of physical host clusters;
S207, inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
S208, combining the first key, the second key and the third key to obtain a combined key;
s209, encrypting the first data according to the combined key to obtain encrypted data.
It should be noted that, the physical host clusters are classified according to their computing functions, for example, they are classified into image processing, speech processing, and comprehensive processing, and the physical hosts included in the image processing physical host clusters mainly process initial data of image types, for example, rendered images, image light adjustment, and the like. The preset first key table stores various types of physical host clusters and corresponding first keys, for example, a first key with the corresponding number 01 of the physical host cluster for image processing and a first key with the corresponding number 02 of the physical host cluster for voice processing, wherein the first keys are determined by the type of initial data; presetting a second key corresponding to the number of importance levels of various initial data, wherein the higher the number of importance levels of the initial data is, the more complex the corresponding second key is, and the stronger the safety performance is, for example, setting the second key with the number of importance levels of the initial data as one as 3 digits, setting the second key with the number of importance levels of the initial data as three as 4 digits, and the like; the preset third key table stores third keys corresponding to interference level numbers of different levels, wherein the higher the number of interfered level numbers of the physical host cluster is, the more complex the corresponding third keys are, the stronger the security performance is, for example, the higher the number of interfered level numbers of the physical host cluster is, and the more character types such as numbers, large letters, special symbols and the like are contained in the corresponding third keys; and sequencing the first key, the second key and the third key, combining the combined keys, and encrypting the first data according to the corresponding combined keys to obtain encrypted data.
According to an embodiment of the present invention, the step of obtaining the number of important classes of initial data specifically includes:
extracting keywords in the initial data;
screening keywords in the initial data based on a preset knowledge point keyword library to obtain knowledge point keywords;
Obtaining knowledge points related to the corresponding initial data according to the knowledge point keywords;
Inquiring in a preset weight score table according to the knowledge points related in the initial data to obtain weight scores of the corresponding knowledge points;
Obtaining important weight values corresponding to the initial data according to the weight scores of the knowledge points;
And obtaining the number of important classes corresponding to the initial data according to a preset important weight value range within which the important weight value of the corresponding initial data falls.
It should be noted that, a large number of knowledge point keywords are stored in the preset knowledge point keywords, wherein if the keywords in the initial data are the same as the knowledge point keywords in the preset knowledge point keyword library, the corresponding knowledge points are related to the corresponding initial data, the preset weight score table stores various knowledge points and weight scores of the corresponding knowledge points, the knowledge points are digitized, the longer the time of the knowledge points passing through the cloud computing process, the higher the weight scores of the corresponding knowledge points, for example, the time of the cloud computing process is within 1 minute, and the weight scores of the corresponding knowledge points are set to be 1 minute; and setting the weight score of the corresponding knowledge point to be 2 points within the time of cloud computing processing within 1 to 2 minutes. According to the preset important weight value range in which the important weight value of the corresponding initial data falls, the important grade number of the corresponding initial data is obtained, the different preset important weight value ranges correspond to the important grade number of different initial data, the higher the important weight value of the initial data is, the higher the important grade number of the corresponding initial data is, for example, the preset important weight value range (0, 5) is set as a first important grade number, the preset important weight value range (5, 10) is set as a second important grade number, and the like.
According to the embodiment of the invention, the formula for obtaining the important weight value corresponding to the initial data according to the weight score of the knowledge point specifically comprises the following steps:
the important weight value of the initial data is set as S, and the formula is that Where n represents all knowledge point numbers in the initial data, i represents a knowledge point number, a i represents a coefficient corresponding to the weight score of the knowledge point i, a i represents the weight score of the knowledge point i, and n i represents the number of times the knowledge point i appears in the initial data.
It should be noted that, the important weight value of the initial data and the number of occurrences of the knowledge point related to the corresponding initial data are in direct proportion to the weight score of the corresponding knowledge point.
According to an embodiment of the present invention, the step of obtaining the number of interfered classes of the corresponding type of physical host clusters specifically includes:
Acquiring interfered information of a physical host cluster of a corresponding type based on a preset first time period;
extracting characteristic values in the interfered information of the type of physical host clusters;
multiplying the characteristic value in the interfered information of the type of physical host clusters by a corresponding coefficient, and accumulating to obtain the interfered value of the corresponding type of physical host clusters;
and obtaining the number of interfered grades of the corresponding type of physical host clusters according to the preset interference value range in which the interfered value of the corresponding type of physical host clusters falls.
It should be noted that, obtaining the interfered information of the corresponding type of physical host cluster in the preset first time period, for example, setting the preset first time period to be 1 hour, obtaining the interfered information of the corresponding type of physical host cluster in1 hour, where the characteristic value in the interfered information of the type of physical host cluster includes the number of times of being interfered, the level of being interfered, the duration of being interfered, and so on; different preset interference value ranges correspond to different interfered grade numbers, wherein the higher the preset interference value range is, the higher the corresponding interfered grade number is, the preset important weight value range (0, 6) is set to be an interfered first grade, the preset important weight value range (6, 12) is set to be an interfered second grade, and so on.
According to an embodiment of the present invention, before the initial data information to be processed is sent to the preset processing module, the method further includes:
The method comprises the steps of sending initial data to a preset examination system, judging whether the initial data has threat factors, if so, refusing to receive the corresponding initial data by a preset processing module, and generating revised data according to the threat factors; if not, the preset processing module receives corresponding initial data;
Removing threat factors in the initial data according to the revised data to obtain revised initial data;
And sending the revised initial data to a preset processing module.
It should be noted that, the preset inspection system is a cloud computing security defense system, such as 360 antivirus software, and scans the initial data through the preset inspection system, determines whether the initial data has a threat factor, if so, the preset processing module refuses to receive the corresponding initial data, processes the threat factor according to the preset inspection system, obtains revised initial data, and the preset processing module receives the revised initial data.
According to an embodiment of the present invention, it further includes;
acquiring combined key information of the encrypted data;
grading the combined secret key of the encrypted data to obtain the security grade number of the corresponding combined secret key;
acquiring the number of interfered grades of the encrypted data during transmission;
judging whether the security level number of the combined key is greater than or equal to the interfered level number of the corresponding encrypted data during transmission, if so, the corresponding encrypted data is normally transmitted;
If not, the encrypted data is destroyed based on a preset destroy program, and destroyed data is obtained.
It should be noted that, the combined encryption key of the encrypted data is divided according to the length and complexity of the corresponding combined key, and the security level number of the corresponding combined key is determined, where when the security level number of the combined key is greater than or equal to the number of interfered levels of the corresponding encrypted data during transmission, the possibility that the corresponding encrypted data is invaded during transmission is described to be great, so that the corresponding encrypted data is destroyed, and the corresponding encrypted data is prevented from being stolen.
According to an embodiment of the present invention, if not, the destroying the encrypted data based on the predetermined destroying procedure specifically includes:
Acquiring a preset destroy program to destroy the encrypted data;
The method comprises the steps of destroying encrypted data according to a preset destroy program to obtain a regeneration code;
Acquiring real-name authentication information of a user;
When the real-name authentication information of the user passes, a preset destroy program sends a regeneration code to the user;
And (5) orderly arranging the destroyed data according to the reproduction code to obtain the encrypted data.
It should be noted that, the step of destroying the encrypted data by the preset destroying program is stored in the regeneration code, the step of destroying the encrypted data by the preset destroying program is reversely pushed according to the step of storing the encrypted data by the preset destroying program in the regeneration code, the destroyed data is recovered to obtain the encrypted data, and if the real-name authentication information of the user terminal does not pass, the corresponding regeneration code is sealed to prevent the leakage of the encrypted data.
FIG. 3 shows a block diagram of a cloud computing-based data security processing system of the present invention.
As shown in fig. 3, a second aspect of the present invention provides a data security processing system 3 based on cloud computing, including a memory 31 and a processor 32, where the memory stores a data security processing method program based on cloud computing, and the data security processing method program based on cloud computing implements the following steps when executed by the processor:
acquiring initial data information to be processed;
the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data;
encrypting the first data based on a preset encryption system to obtain encrypted data;
Sending the encrypted data to a user for display;
according to the embodiment of the invention, the user side sends the initial data to be processed to the preset processing module, the cloud computing system is stored in the preset processing module, the plurality of physical units are stored in the cloud computing system, the physical units are formed by a plurality of physical hosts, the physical units can calculate the initial data to obtain first data, then the first data is encrypted through the preset encryption system to obtain encrypted data, and the safety performance of data processing is improved through the preset encryption system.
According to an embodiment of the present invention, before the initial data information to be processed is sent to the preset processing module, the method further includes:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
Before the user terminal sends the initial data to the preset processing module, the user data of the initial data needs to be verified, if the user data information comprises signature authentication of a corresponding user, the user data indicates that the corresponding initial data is sent by the corresponding user, and the user data has authenticity, is real-name authentication, and improves reliability for the source of the initial data.
According to an embodiment of the present invention, the step of obtaining encrypted data specifically includes:
Extracting features of the initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
matching the corresponding type physical host clusters according to the type of the initial data;
inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
acquiring the number of important grades of initial data;
Inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
acquiring the number of interfered grades of the corresponding type of physical host clusters;
Inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
combining the first key, the second key and the third key to obtain a combined key;
And encrypting the first data according to the combined key to obtain encrypted data.
It should be noted that, the physical host clusters are classified according to their computing functions, for example, they are classified into image processing, speech processing, and comprehensive processing, and the physical hosts included in the image processing physical host clusters mainly process initial data of image types, for example, rendered images, image light adjustment, and the like. The preset first key table stores various types of physical host clusters and corresponding first keys, for example, a first key with the corresponding number 01 of the physical host cluster for image processing and a first key with the corresponding number 02 of the physical host cluster for voice processing, wherein the first keys are determined by the type of initial data; presetting a second key corresponding to the number of importance levels of various initial data, wherein the higher the number of importance levels of the initial data is, the more complex the corresponding second key is, and the stronger the safety performance is, for example, setting the second key with the number of importance levels of the initial data as one as 3 digits, setting the second key with the number of importance levels of the initial data as three as 4 digits, and the like; the preset third key table stores third keys corresponding to interference level numbers of different levels, wherein the higher the number of interfered level numbers of the physical host cluster is, the more complex the corresponding third keys are, the stronger the security performance is, for example, the higher the number of interfered level numbers of the physical host cluster is, and the more character types such as numbers, large letters, special symbols and the like are contained in the corresponding third keys; and sequencing the first key, the second key and the third key, combining the combined keys, and encrypting the first data according to the corresponding combined keys to obtain encrypted data.
According to an embodiment of the present invention, the step of obtaining the number of important classes of initial data specifically includes:
extracting keywords in the initial data;
screening keywords in the initial data based on a preset knowledge point keyword library to obtain knowledge point keywords;
Obtaining knowledge points related to the corresponding initial data according to the knowledge point keywords;
Inquiring in a preset weight score table according to the knowledge points related in the initial data to obtain weight scores of the corresponding knowledge points;
Obtaining important weight values corresponding to the initial data according to the weight scores of the knowledge points;
And obtaining the number of important classes corresponding to the initial data according to a preset important weight value range within which the important weight value of the corresponding initial data falls.
It should be noted that, a large number of knowledge point keywords are stored in the preset knowledge point keywords, wherein if the keywords in the initial data are the same as the knowledge point keywords in the preset knowledge point keyword library, the corresponding knowledge points are related to the corresponding initial data, the preset weight score table stores various knowledge points and weight scores of the corresponding knowledge points, the knowledge points are digitized, the longer the time of the knowledge points passing through the cloud computing process, the higher the weight scores of the corresponding knowledge points, for example, the time of the cloud computing process is within 1 minute, and the weight scores of the corresponding knowledge points are set to be 1 minute; and setting the weight score of the corresponding knowledge point to be 2 points within the time of cloud computing processing within 1 to 2 minutes. According to the preset important weight value range in which the important weight value of the corresponding initial data falls, the important grade number of the corresponding initial data is obtained, the different preset important weight value ranges correspond to the important grade number of different initial data, the higher the important weight value of the initial data is, the higher the important grade number of the corresponding initial data is, for example, the preset important weight value range (0, 5) is set as a first important grade number, the preset important weight value range (5, 10) is set as a second important grade number, and the like.
According to the embodiment of the invention, the formula for obtaining the important weight value corresponding to the initial data according to the weight score of the knowledge point specifically comprises the following steps:
the important weight value of the initial data is set as S, and the formula is that Where n represents all knowledge point numbers in the initial data, i represents a knowledge point number, a i represents a coefficient corresponding to the weight score of the knowledge point i, a i represents the weight score of the knowledge point i, and n i represents the number of times the knowledge point i appears in the initial data.
It should be noted that, the important weight value of the initial data and the number of occurrences of the knowledge point related to the corresponding initial data are in direct proportion to the weight score of the corresponding knowledge point.
According to an embodiment of the present invention, the step of obtaining the number of interfered classes of the corresponding type of physical host clusters specifically includes:
Acquiring interfered information of a physical host cluster of a corresponding type based on a preset first time period;
extracting characteristic values in the interfered information of the type of physical host clusters;
multiplying the characteristic value in the interfered information of the type of physical host clusters by a corresponding coefficient, and accumulating to obtain the interfered value of the corresponding type of physical host clusters;
and obtaining the number of interfered grades of the corresponding type of physical host clusters according to the preset interference value range in which the interfered value of the corresponding type of physical host clusters falls.
It should be noted that, obtaining the interfered information of the corresponding type of physical host cluster in the preset first time period, for example, setting the preset first time period to be 1 hour, obtaining the interfered information of the corresponding type of physical host cluster in1 hour, where the characteristic value in the interfered information of the type of physical host cluster includes the number of times of being interfered, the level of being interfered, the duration of being interfered, and so on; different preset interference value ranges correspond to different interfered grade numbers, wherein the higher the preset interference value range is, the higher the corresponding interfered grade number is, the preset important weight value range (0, 6) is set to be an interfered first grade, the preset important weight value range (6, 12) is set to be an interfered second grade, and so on.
According to an embodiment of the present invention, before the initial data information to be processed is sent to the preset processing module, the method further includes:
The method comprises the steps of sending initial data to a preset examination system, judging whether the initial data has threat factors, if so, refusing to receive the corresponding initial data by a preset processing module, and generating revised data according to the threat factors; if not, the preset processing module receives corresponding initial data;
Removing threat factors in the initial data according to the revised data to obtain revised initial data;
And sending the revised initial data to a preset processing module.
It should be noted that, the preset inspection system is a cloud computing security defense system, such as 360 antivirus software, and scans the initial data through the preset inspection system, determines whether the initial data has a threat factor, if so, the preset processing module refuses to receive the corresponding initial data, processes the threat factor according to the preset inspection system, obtains revised initial data, and the preset processing module receives the revised initial data.
According to an embodiment of the present invention, it further includes;
acquiring combined key information of the encrypted data;
grading the combined secret key of the encrypted data to obtain the security grade number of the corresponding combined secret key;
acquiring the number of interfered grades of the encrypted data during transmission;
judging whether the security level number of the combined key is greater than or equal to the interfered level number of the corresponding encrypted data during transmission, if so, the corresponding encrypted data is normally transmitted;
If not, the encrypted data is destroyed based on a preset destroy program, and destroyed data is obtained.
It should be noted that, the combined encryption key of the encrypted data is divided according to the length and complexity of the corresponding combined key, and the security level number of the corresponding combined key is determined, where when the security level number of the combined key is greater than or equal to the number of interfered levels of the corresponding encrypted data during transmission, the possibility that the corresponding encrypted data is invaded during transmission is described to be great, so that the corresponding encrypted data is destroyed, and the corresponding encrypted data is prevented from being stolen.
According to an embodiment of the present invention, if not, the destroying the encrypted data based on the predetermined destroying procedure specifically includes:
Acquiring a preset destroy program to destroy the encrypted data;
The method comprises the steps of destroying encrypted data according to a preset destroy program to obtain a regeneration code;
Acquiring real-name authentication information of a user;
When the real-name authentication information of the user passes, a preset destroy program sends a regeneration code to the user;
And (5) orderly arranging the destroyed data according to the reproduction code to obtain the encrypted data.
It should be noted that, the step of destroying the encrypted data by the preset destroying program is stored in the regeneration code, the step of destroying the encrypted data by the preset destroying program is reversely pushed according to the step of storing the encrypted data by the preset destroying program in the regeneration code, the destroyed data is recovered to obtain the encrypted data, and if the real-name authentication information of the user terminal does not pass, the corresponding regeneration code is sealed to prevent the leakage of the encrypted data.
A third aspect of the present invention provides a computer-readable storage medium having stored therein a cloud computing-based data security processing method program which, when executed by a processor, implements the steps of a cloud computing-based data security processing method as described in any one of the above.
The invention discloses a data security processing method, a system and a storage medium based on cloud computing, wherein the method comprises the following steps: acquiring initial data information to be processed; the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data; encrypting the first data based on a preset encryption system to obtain encrypted data; and sending the encrypted data to a user for display. According to the invention, the first data is encrypted through the preset encryption system, and the preset encryption system comprises a plurality of encryption keys, so that the safety performance of the data is improved.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Or the above-described integrated units of the invention may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.

Claims (8)

1. The data security processing method based on cloud computing is characterized by comprising the following steps of:
acquiring initial data information to be processed;
the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data;
encrypting the first data based on a preset encryption system to obtain encrypted data;
Sending the encrypted data to a user for display;
the cloud computing system is stored in the preset processing module, the physical units are formed by a plurality of physical hosts, and the physical units can compute initial data;
The step of obtaining the encrypted data specifically comprises the following steps:
Extracting features of the initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
matching the corresponding type physical host clusters according to the type of the initial data;
inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
acquiring the number of important grades of initial data;
Inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
acquiring the number of interfered grades of the corresponding type of physical host clusters;
Inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
combining the first key, the second key and the third key to obtain a combined key;
And encrypting the first data according to the combined key to obtain encrypted data.
2. The method for securely processing data based on cloud computing according to claim 1, wherein before the initial data information to be processed is sent to the preset processing module, the method further comprises:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
3. The method for securely processing data based on cloud computing according to claim 1, wherein the step of obtaining the number of important classes of the initial data specifically comprises:
extracting keywords in the initial data;
screening keywords in the initial data based on a preset knowledge point keyword library to obtain knowledge point keywords;
Obtaining knowledge points related to the corresponding initial data according to the knowledge point keywords;
Inquiring in a preset weight score table according to the knowledge points related in the initial data to obtain weight scores of the corresponding knowledge points;
Obtaining important weight values corresponding to the initial data according to the weight scores of the knowledge points;
And obtaining the number of important classes corresponding to the initial data according to a preset important weight value range within which the important weight value of the corresponding initial data falls.
4. The method for securely processing data based on cloud computing according to claim 3, wherein the formula for obtaining the important weight value corresponding to the initial data according to the weight score of the knowledge point specifically comprises:
the important weight value of the initial data is set as S, and the formula is that Where n represents all knowledge point numbers in the initial data, i represents a knowledge point number, a i represents a coefficient corresponding to the weight score of the knowledge point i, a i represents the weight score of the knowledge point i, and n i represents the number of times the knowledge point i appears in the initial data.
5. The method for securely processing data based on cloud computing according to claim 1, wherein the step of obtaining the number of interfered classes of the corresponding type of physical host clusters specifically comprises:
Acquiring interfered information of a physical host cluster of a corresponding type based on a preset first time period;
extracting characteristic values in the interfered information of the type of physical host clusters;
multiplying the characteristic value in the interfered information of the type of physical host clusters by a corresponding coefficient, and accumulating to obtain the interfered value of the corresponding type of physical host clusters;
and obtaining the number of interfered grades of the corresponding type of physical host clusters according to the preset interference value range in which the interfered value of the corresponding type of physical host clusters falls.
6. The data security processing system based on cloud computing is characterized by comprising a memory and a processor, wherein a data security processing method program based on cloud computing is stored in the memory, and the data security processing method program based on cloud computing realizes the following steps when being executed by the processor:
acquiring initial data information to be processed;
the method comprises the steps of sending initial data information to be processed to a preset processing module to obtain first data;
encrypting the first data based on a preset encryption system to obtain encrypted data;
Sending the encrypted data to a user for display;
the cloud computing system is stored in the preset processing module, the physical units are formed by a plurality of physical hosts, and the physical units can compute initial data;
The step of obtaining the encrypted data specifically comprises the following steps:
Extracting features of the initial data, and classifying the initial data according to the corresponding features to obtain types of the corresponding initial data;
matching the corresponding type physical host clusters according to the type of the initial data;
inquiring in a preset first key table according to the corresponding type of physical host cluster to obtain a first key of first data;
acquiring the number of important grades of initial data;
Inquiring in a preset second key table according to the number of important grades of the initial data to obtain a second key corresponding to the first data;
acquiring the number of interfered grades of the corresponding type of physical host clusters;
Inquiring in a preset third key table according to the number of interfered grades of the physical host clusters of the corresponding type to obtain a third key corresponding to the first data;
combining the first key, the second key and the third key to obtain a combined key;
And encrypting the first data according to the combined key to obtain encrypted data.
7. The cloud computing-based data security processing system according to claim 6, wherein before the initial data information to be processed is sent to the preset processing module, the cloud computing-based data security processing system further comprises:
Acquiring user information of initial data;
Judging whether the user data has signature authentication or not according to the user data information of the initial data, if so, allowing the corresponding initial data to be sent to a preset processing module; if not, the corresponding initial data is not allowed to be sent to a preset processing module, and user signature authentication warning information is triggered;
And sending the user signature authentication warning information to a user terminal for display.
8. A computer-readable storage medium, wherein a data security processing method program based on cloud computing is stored in the computer-readable storage medium, and when the data security processing method program based on cloud computing is executed by a processor, the steps of a data security processing method based on cloud computing according to any one of claims 1 to 5 are implemented.
CN202311230007.8A 2023-09-22 2023-09-22 Cloud computing-based data security processing method, system and storage medium Active CN117235761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311230007.8A CN117235761B (en) 2023-09-22 2023-09-22 Cloud computing-based data security processing method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311230007.8A CN117235761B (en) 2023-09-22 2023-09-22 Cloud computing-based data security processing method, system and storage medium

Publications (2)

Publication Number Publication Date
CN117235761A CN117235761A (en) 2023-12-15
CN117235761B true CN117235761B (en) 2024-04-19

Family

ID=89090749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311230007.8A Active CN117235761B (en) 2023-09-22 2023-09-22 Cloud computing-based data security processing method, system and storage medium

Country Status (1)

Country Link
CN (1) CN117235761B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117910062B (en) * 2024-03-20 2024-06-18 深圳市铨兴科技有限公司 Solid state disk data encryption method, system and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812394A (en) * 2016-05-24 2016-07-27 王四春 Novel application of cloud computing to cross-border electronic commerce
CN106131017A (en) * 2016-07-14 2016-11-16 何钟柱 Cloud computing information security visualization system based on trust computing
CN109918938A (en) * 2018-12-29 2019-06-21 亚信科技(中国)有限公司 A kind of storage, querying method and the device of cloud computing platform user data
CN112202808A (en) * 2020-10-14 2021-01-08 深圳市洛奇机电科技有限公司 Data security management system based on cloud computing
CN114268508A (en) * 2021-12-30 2022-04-01 天翼物联科技有限公司 Internet of things equipment secure access method, device, equipment and medium
CN114679340A (en) * 2022-05-27 2022-06-28 苏州浪潮智能科技有限公司 File sharing method, system, device and readable storage medium
CN114866289A (en) * 2022-04-12 2022-08-05 西北工业大学 Privacy credit data security protection method based on alliance chain
CN115396885A (en) * 2022-08-26 2022-11-25 中国联合网络通信集团有限公司 Key safety management method and device, electronic equipment and storage medium
CN115499120A (en) * 2022-09-12 2022-12-20 四川云云旺软件技术有限公司 Data storage method and data storage platform based on cloud computing
CN116090024A (en) * 2023-02-06 2023-05-09 山东昱鑫信息科技有限公司 Reliable data storage device, system and method
CN116192481A (en) * 2023-02-08 2023-05-30 晋永源科技(深圳)有限公司 Analysis method for secure communication mechanism between cloud computing server models

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10733061B2 (en) * 2017-06-27 2020-08-04 Western Digital Technologies, Inc. Hybrid data storage system with private storage cloud and public storage cloud
CN109687975B (en) * 2018-12-29 2020-11-03 飞天诚信科技股份有限公司 Method and device for realizing off-line initialization of hardware wallet

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812394A (en) * 2016-05-24 2016-07-27 王四春 Novel application of cloud computing to cross-border electronic commerce
CN106131017A (en) * 2016-07-14 2016-11-16 何钟柱 Cloud computing information security visualization system based on trust computing
CN109918938A (en) * 2018-12-29 2019-06-21 亚信科技(中国)有限公司 A kind of storage, querying method and the device of cloud computing platform user data
CN112202808A (en) * 2020-10-14 2021-01-08 深圳市洛奇机电科技有限公司 Data security management system based on cloud computing
CN114268508A (en) * 2021-12-30 2022-04-01 天翼物联科技有限公司 Internet of things equipment secure access method, device, equipment and medium
CN114866289A (en) * 2022-04-12 2022-08-05 西北工业大学 Privacy credit data security protection method based on alliance chain
CN114679340A (en) * 2022-05-27 2022-06-28 苏州浪潮智能科技有限公司 File sharing method, system, device and readable storage medium
CN115396885A (en) * 2022-08-26 2022-11-25 中国联合网络通信集团有限公司 Key safety management method and device, electronic equipment and storage medium
CN115499120A (en) * 2022-09-12 2022-12-20 四川云云旺软件技术有限公司 Data storage method and data storage platform based on cloud computing
CN116090024A (en) * 2023-02-06 2023-05-09 山东昱鑫信息科技有限公司 Reliable data storage device, system and method
CN116192481A (en) * 2023-02-08 2023-05-30 晋永源科技(深圳)有限公司 Analysis method for secure communication mechanism between cloud computing server models

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
A comparative study of applying real-time encryption in cloud computing environments;Faraz Fatemi Moghaddam等;2013 IEEE 2nd International Conference on Cloud Networking (CloudNet);20140116;全文 *
A fast adaptive stream cipher algorithm and expanded search;Xiaojing Hu等;2011 6th International Conference on Computer Science & Education (ICCSE 2011);20111027;全文 *
云计算中数据信息加密安全存储仿真研究;涂俊英;张学敏;;计算机仿真;20171215;第34卷(第12期);全文 *
数据加密技术在计算机网络安全中的应用;郅霁月等;现代信息科技;20210925;第5卷(第18期);全文 *
标准模型下基于身份的分等级加密方案;陈宇等;计算机技术与发展;20180704;第28卷(第6期);全文 *
等级加密体制中的密钥管理研究;蒙杨等;软件学报;20040108;第12卷(第8期);全文 *

Also Published As

Publication number Publication date
CN117235761A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US10423786B2 (en) System and method for statistical analysis of comparative entropy
CN109815742B (en) Data desensitization method and device
CN106375331B (en) Attack organization mining method and device
WO2010126733A1 (en) Systems and methods for sensitive data remediation
CN117235761B (en) Cloud computing-based data security processing method, system and storage medium
CN107426173B (en) File protection method and device
CN111324911A (en) Privacy data protection method, system and device
CN107809371B (en) Shared resource display method and device
CN114172703A (en) Malicious software identification method, device and medium
Breidenbach et al. Privacy-enhanced robust image hashing with bloom filters
Gurulian et al. You can’t touch this: Consumer-centric android application repackaging detection
CN113836578A (en) Method and system for maintaining security of sensitive data of big data
CN115080956A (en) Detection method and system based on violation permission of installed application program of mobile terminal
Agilandeeswari et al. A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication
CN112099870B (en) Document processing method, device, electronic equipment and computer readable storage medium
Alghamdi A descriptive study on the impact of cybercrime and possible measures to curtail its spread worldwide
CN116611116A (en) Data secure storage management method and system
CN113596044B (en) Network protection method and device, electronic equipment and storage medium
CN110933047B (en) Network authentication information security verification method, device, medium and terminal equipment
Kamran et al. Existing Cyber Laws and Their Role in Legal Aspects of Cybercrime in Pakistan
CN113971285A (en) Method, device and equipment for identifying malicious process of terminal and readable storage medium
US11934523B1 (en) System and method for securing data files
CN116319084B (en) Random grouping method and device, computer program product and electronic equipment
CN107943876B (en) Page response method and system
CN116450745B (en) Multi-device-based note file operation method, system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant