CN206728053U - A kind of big data processing system based on network security - Google Patents
A kind of big data processing system based on network security Download PDFInfo
- Publication number
- CN206728053U CN206728053U CN201720347426.3U CN201720347426U CN206728053U CN 206728053 U CN206728053 U CN 206728053U CN 201720347426 U CN201720347426 U CN 201720347426U CN 206728053 U CN206728053 U CN 206728053U
- Authority
- CN
- China
- Prior art keywords
- module
- sent
- access information
- virus
- modules
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model discloses a kind of big data processing system based on network security, including data input center, SLA protocol modules and SLM management modules;The data input center:Including local cloud module, virtual cloud module, mixed cloud module and public cloud module, each cloud module inputs access protocol to SLA protocol modules;The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encrypted access information and arrive control extension module, transmission generic access information to SLM management modules;The SLM management modules:The generic access information identification that SLA protocol modules are sent is received, sends level access information to EMC processing centers;The EMC processing centers:The level access information that SLM management modules are sent is received, the grade of level access information is extracted, by the corresponding monitoring grade of real-time security monitoring module, draws safety value and Virus Info.
Description
Technical field
It the utility model is related to a kind of big data safety, and in particular to a kind of big data processing system based on network security
System.
Background technology
Data safety is there is many levels, such as:System safety, technical security, computing safety, storage safety, transmission peace
Entirely, products & services safety etc..For Computer Data Security:System is taken stopgap measures safely, and technical security effects a permanent cure, other safety
And essential link.Data safety is one of important subjects of subject such as computer and network.It is not only closed
It is to individual privacy, Enterprise business privacy;And Technology On Data Encryption directly affects national security, the threat to data safety can
It can directly threaten database.For example, next obtaining may browse to those people of database unauthorized access, change
Become, even steal them.The data of access right are obtained.But special attention database security does not ensure that safe number
According to storehouse.All parts of system all must be safe, including database, network, operating system, physics storage database builds
Build thing and the personnel of access system that have an opportunity.Unexpected loss, including destruction caused by mistake, software and hardware:Build
Vertical operating process, unified software installation process, hardware maintenance planning chart are all to threatening and can take caused by unexpected losing
Action.As any work participated in people, it is unavoidable that some losses, which occur, it is contemplated that thorough strategy and mistake
Journey should be able to reduce the quantity and the order of severity of loss.More serious consequence may be non-unexpected threat.Stealing and fraud:This
A little activities often pass through the artificial crime of electronically, possible change data, it is also possible to not change data.For example, it must build
Vertical physical security, computer, server, telecommunication facility or computer documents are placed so that the people of unauthorized can not enter
Room.Physical security should be also provided for employee office and other any storages or the place for being readily accessible to sensitive data
Property.Fire wall is established, prevents unauthorized user from, by unauthorized access of the external communication link to the improper part of database, being
Prevent another the security process example for thering is the people of stealing and fraudulent intention to implement its action.Privacy and confidentiality are damaged:It is private
The impaired protection generally meant that to personal data of close property meets with failure, and confidentiality is damaged the tissue generally meant that to key
The protection of data incurs loss, and these data may have strategic value to organization.Information private control failure may
Can cause to blackmail, offer and take bribes, civil disputation or user cipher it is stolen.Confidentiality control unsuccessfully may result in lose it is competing
Strive advantage.
Utility model content
Technical problem to be solved in the utility model is to avoid accessing netpage virus, while avoids revealing access information,
Purpose is to provide a kind of big data processing system based on network security solve to avoid accessing netpage virus, while avoid letting out
The problem of revealing access information.
The utility model is achieved through the following technical solutions:
A kind of big data processing system based on network security, including data input center, SLA protocol modules and SLM pipes
Manage module;The data input center:It is described including local cloud module, virtual cloud module, mixed cloud module and public cloud module
Each cloud module inputs access protocol to SLA protocol modules;The SLA protocol modules:Receive the institute that data input center is sent
With access protocol and identify, send encrypted access information to control extension module, send generic access information and manage mould to SLM
Block;The SLM management modules:Receive the generic access information identification that SLA protocol modules are sent, send level access information to
EMC processing centers;The EMC processing centers:Receive the level access information that SLM management modules are sent, extraction level access letter
The grade of breath, by the corresponding monitoring grade of real-time security monitoring module, draw safety value and Virus Info;The peace in real time
Full monitoring module:Including the anti-virus instruction to match with level access grade, virus checking is provided for EMC processing centers;Hair
Safe value information is sent to send Virus Info to alarm module to secure data memory module;The secure data memory module:Connect
The safe value information that real-time security monitoring module is sent is received, and is stored;The encrypted access module:Receive SLA protocol modules hair
The encrypted access information sent, is verified by fire wall, draws encryption safe value and encrypted virus information;The fire wall:To add
Close access control module provides virus checking, sends encryption safe value information to extension storage module, sends encrypted virus information
To alarm module;The extension storage module:The encryption safe value that fire wall is sent is received, and is stored;The alarm module:Connect
The Virus Info of real-time security monitoring module and fire wall transmission is received, encrypted virus information, closes current accessed.Establish fire prevention
Wall, prevent that unauthorized user from, by unauthorized access of the external communication link to the improper part of database, being to prevent have stealing
Implement another security process example of its action with the people of fraudulent intention.Privacy and confidentiality are damaged:Privacy is impaired logical
Often mean that the protection to personal data meets with failure, and confidentiality is damaged the protection for generally meaning that the tissue data to key
Incur loss, these data there may be strategic value to organization.Information private control unsuccessfully may result in extortion
Extort, offer and take bribes, civil disputation or user cipher it is stolen.Confidentiality control, which unsuccessfully may result in, loses competitive advantage, this
Utility model technical problem to be solved is to avoid accessing netpage virus, while avoids revealing access information, it is therefore intended that is carried
For a kind of big data processing system based on network security, by accessing source come zoning, user is when accessing, SLA associations
Whether be encrypted access, this specifically divides agreement and pre-set if discussing module and will be divided by access protocol,
Webpage is identified again by fire wall, and this is also to include removing function, and extension storage module can be automatic according to user
Reset, so when accessing, can not only protect oneself browses record, can also be judged according to the identification of fire wall
Webpage goes security, judges that this whole step solves access netpage virus by carrying out a step, while avoid leakage from visiting
Ask information.
The level access information includes 3 grades.This grade freely divides, and to be set after division corresponding
The grade of real-time security monitoring module, including several gas defence grades.
The fire wall uses H3C SecBlade FW FWSMs.As preferred scheme of the present utility model.
The extension storage module uses FX1N-1DA-BD 1.Further, as preferred scheme of the present utility model.
The utility model compared with prior art, has the following advantages and advantages:
1st, a kind of big data processing system based on network security of the utility model, SLA protocol modules will pass through access
Whether agreement division is encrypted access, and this specifically divides agreement and pre-set, and is identified again by fire wall
Webpage, and this is also to include removing function, and extension storage module can so access according to user's automatic clear
When, can not only protect oneself browses record, can also go security according to the identification of fire wall come judge webpage,
Judge that this whole step solves access netpage virus by carrying out a step, while avoid revealing access information;
2nd, a kind of big data processing system based on network security of the utility model, the level access information include 3
This grade of grade is freely divided, and the grade of corresponding real-time security monitoring module is set after division, including several
Gas defence grade;
3rd, a kind of big data processing system based on network security of the utility model, the fire wall use H3C
SecBlade FW FWSMs, as preferred scheme of the present utility model.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding the utility model embodiment, forms the one of the application
Part, the restriction to the utility model embodiment is not formed.In the accompanying drawings:
Fig. 1 is Tthe utility model system structural representation.
Embodiment
For the purpose of this utility model, technical scheme and advantage is more clearly understood, with reference to embodiment and accompanying drawing,
The utility model is described in further detail, and exemplary embodiment of the present utility model and its explanation are only used for explaining this
Utility model, it is not intended as to restriction of the present utility model.
Embodiment
As shown in figure 1, a kind of big data processing system based on network security of the utility model, one kind is based on network security
Big data processing system, including data input center, SLA protocol modules and SLM management modules;The data input center:
Including local cloud module, virtual cloud module, mixed cloud module and public cloud module, each cloud module input access protocol arrives
SLA protocol modules;The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encryption
Access information sends generic access information to SLM management modules to control extension module;The SLM management modules:Receive SLA
The generic access information identification that protocol module is sent, sends level access information to EMC processing centers;The EMC processing centers:
The level access information that SLM management modules are sent is received, the grade of level access information is extracted, passes through real-time security monitoring module
Corresponding monitoring grade, draw safety value and Virus Info;The real-time security monitoring module:Including with level access grade
The anti-virus instruction to match, virus checking is provided for EMC processing centers;Send safe value information to secure data and store mould
Block, Virus Info is sent to alarm module;The secure data memory module:Receive the safety that real-time security monitoring module is sent
Value information, and store;The encrypted access module:The encrypted access information that SLA protocol modules are sent is received, is tested by fire wall
Card, draws encryption safe value and encrypted virus information;The fire wall:Virus checking, hair are provided for encrypted access control module
Encryption safe value information is sent to send encrypted virus information to alarm module to extension storage module;The extension storage module:Connect
The encryption safe value that fire wall is sent is received, and is stored;The alarm module:Receive real-time security monitoring module and fire wall is sent
Virus Info, encrypted virus information, close current accessed.The level access information includes 3 grades.The fire wall is adopted
With H3C SecBlade FW FWSMs.The extension storage module uses FX1N-1DA-BD 1.
Above-described embodiment, the purpose of this utility model, technical scheme and beneficial effect are entered
One step describes in detail, should be understood that and the foregoing is only specific embodiment of the present utility model, is not used to limit
Determine the scope of protection of the utility model, it is all within the spirit and principles of the utility model, any modification for being made, equally replace
Change, improve, should be included within the scope of protection of the utility model.
Claims (4)
- A kind of 1. big data processing system based on network security, it is characterised in that:Including data input center, SLA agreement moulds Block and SLM management modules;The data input center:It is described each including local cloud module, virtual cloud module, mixed cloud module and public cloud module Individual cloud module inputs access protocol to SLA protocol modules;The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encrypted access information To control extension module, generic access information is sent to SLM management modules;The SLM management modules:Receive the generic access information identification that SLA protocol modules are sent, send level access information to EMC processing centers;The EMC processing centers:The level access information that SLM management modules are sent is received, extracts the grade of level access information, By the corresponding monitoring grade of real-time security monitoring module, safety value and Virus Info are drawn;The real-time security monitoring module:Including the anti-virus instruction to match with level access grade, carried for EMC processing centers Verified for virus;Safe value information is sent to secure data memory module, sends Virus Info to alarm module;The secure data memory module:The safe value information that real-time security monitoring module is sent is received, and is stored;The encrypted access module:The encrypted access information that SLA protocol modules are sent is received, is verified by fire wall, draws and adds Close safety value and encrypted virus information;The fire wall:Virus checking is provided for encrypted access control module, sends encryption safe value information to extension storage mould Block, encrypted virus information is sent to alarm module;The extension storage module:The encryption safe value that fire wall is sent is received, and is stored;The alarm module:The Virus Info of real-time security monitoring module and fire wall transmission is received, encrypted virus information, is closed Current accessed.
- A kind of 2. big data processing system based on network security according to claim 1, it is characterised in that:The rank Access information includes 3 grades.
- A kind of 3. big data processing system based on network security according to claim 1, it is characterised in that:The fire prevention Wall uses H3C SecBlade FW FWSMs.
- A kind of 4. big data processing system based on network security according to claim 1, it is characterised in that:The extension Memory module uses FX1N-1DA-BD 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720347426.3U CN206728053U (en) | 2017-04-05 | 2017-04-05 | A kind of big data processing system based on network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720347426.3U CN206728053U (en) | 2017-04-05 | 2017-04-05 | A kind of big data processing system based on network security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206728053U true CN206728053U (en) | 2017-12-08 |
Family
ID=60503678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720347426.3U Expired - Fee Related CN206728053U (en) | 2017-04-05 | 2017-04-05 | A kind of big data processing system based on network security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206728053U (en) |
-
2017
- 2017-04-05 CN CN201720347426.3U patent/CN206728053U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105430000A (en) | Cloud computing security management system | |
CN105337971A (en) | Electric power information system cloud safety guarantee system and implementation method thereof | |
CN108270716A (en) | A kind of audit of information security method based on cloud computing | |
CN101015163A (en) | A network security enforcement system | |
CN110233817A (en) | A kind of vessel safety system based on cloud computing | |
CN107147627A (en) | A kind of network safety protection method and system based on big data platform | |
CN110543761A (en) | big data analysis method applied to information security field | |
CN109936555A (en) | A kind of date storage method based on cloud platform, apparatus and system | |
CN106982204A (en) | Credible and secure platform | |
Hurlburt | " Good Enough" Security: The Best We'll Ever Have | |
Rath et al. | Strengthening access control in case of compromised accounts in smart home | |
CN206728053U (en) | A kind of big data processing system based on network security | |
CN204697072U (en) | A kind of secure accessing managing and control system of network end nodes | |
CN107104953A (en) | A kind of pair of net security system and the method for lifting Information Security | |
CN108183906B (en) | Time bank management method, server, terminal, storage medium and electronic device | |
Gupta et al. | Internet of Things security using AI and blockchain | |
Waziri et al. | A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania | |
CN115600189A (en) | Commercial password application security evaluation system | |
Rathod et al. | Database intrusion detection by transaction signature | |
Jo et al. | A blockchain-based trusted security zone architecture | |
CN110233855A (en) | A kind of region anti-violence crack method based on block chain | |
CN106941497A (en) | Safe processing system based on informatization platform data | |
Cho et al. | Detection and response of identity theft within a company utilizing location information | |
Li et al. | The Research on Security Technology of Big Data Platform | |
Reddy et al. | Trust and access controls in IoT to avoid malicious activity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171208 Termination date: 20180405 |