CN206728053U - A kind of big data processing system based on network security - Google Patents

A kind of big data processing system based on network security Download PDF

Info

Publication number
CN206728053U
CN206728053U CN201720347426.3U CN201720347426U CN206728053U CN 206728053 U CN206728053 U CN 206728053U CN 201720347426 U CN201720347426 U CN 201720347426U CN 206728053 U CN206728053 U CN 206728053U
Authority
CN
China
Prior art keywords
module
sent
access information
virus
modules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201720347426.3U
Other languages
Chinese (zh)
Inventor
魏宁
廖斌
曾大勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Enjoy Technology Co Ltd
Original Assignee
Chengdu Enjoy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Enjoy Technology Co Ltd filed Critical Chengdu Enjoy Technology Co Ltd
Priority to CN201720347426.3U priority Critical patent/CN206728053U/en
Application granted granted Critical
Publication of CN206728053U publication Critical patent/CN206728053U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a kind of big data processing system based on network security, including data input center, SLA protocol modules and SLM management modules;The data input center:Including local cloud module, virtual cloud module, mixed cloud module and public cloud module, each cloud module inputs access protocol to SLA protocol modules;The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encrypted access information and arrive control extension module, transmission generic access information to SLM management modules;The SLM management modules:The generic access information identification that SLA protocol modules are sent is received, sends level access information to EMC processing centers;The EMC processing centers:The level access information that SLM management modules are sent is received, the grade of level access information is extracted, by the corresponding monitoring grade of real-time security monitoring module, draws safety value and Virus Info.

Description

A kind of big data processing system based on network security
Technical field
It the utility model is related to a kind of big data safety, and in particular to a kind of big data processing system based on network security System.
Background technology
Data safety is there is many levels, such as:System safety, technical security, computing safety, storage safety, transmission peace Entirely, products & services safety etc..For Computer Data Security:System is taken stopgap measures safely, and technical security effects a permanent cure, other safety And essential link.Data safety is one of important subjects of subject such as computer and network.It is not only closed It is to individual privacy, Enterprise business privacy;And Technology On Data Encryption directly affects national security, the threat to data safety can It can directly threaten database.For example, next obtaining may browse to those people of database unauthorized access, change Become, even steal them.The data of access right are obtained.But special attention database security does not ensure that safe number According to storehouse.All parts of system all must be safe, including database, network, operating system, physics storage database builds Build thing and the personnel of access system that have an opportunity.Unexpected loss, including destruction caused by mistake, software and hardware:Build Vertical operating process, unified software installation process, hardware maintenance planning chart are all to threatening and can take caused by unexpected losing Action.As any work participated in people, it is unavoidable that some losses, which occur, it is contemplated that thorough strategy and mistake Journey should be able to reduce the quantity and the order of severity of loss.More serious consequence may be non-unexpected threat.Stealing and fraud:This A little activities often pass through the artificial crime of electronically, possible change data, it is also possible to not change data.For example, it must build Vertical physical security, computer, server, telecommunication facility or computer documents are placed so that the people of unauthorized can not enter Room.Physical security should be also provided for employee office and other any storages or the place for being readily accessible to sensitive data Property.Fire wall is established, prevents unauthorized user from, by unauthorized access of the external communication link to the improper part of database, being Prevent another the security process example for thering is the people of stealing and fraudulent intention to implement its action.Privacy and confidentiality are damaged:It is private The impaired protection generally meant that to personal data of close property meets with failure, and confidentiality is damaged the tissue generally meant that to key The protection of data incurs loss, and these data may have strategic value to organization.Information private control failure may Can cause to blackmail, offer and take bribes, civil disputation or user cipher it is stolen.Confidentiality control unsuccessfully may result in lose it is competing Strive advantage.
Utility model content
Technical problem to be solved in the utility model is to avoid accessing netpage virus, while avoids revealing access information, Purpose is to provide a kind of big data processing system based on network security solve to avoid accessing netpage virus, while avoid letting out The problem of revealing access information.
The utility model is achieved through the following technical solutions:
A kind of big data processing system based on network security, including data input center, SLA protocol modules and SLM pipes Manage module;The data input center:It is described including local cloud module, virtual cloud module, mixed cloud module and public cloud module Each cloud module inputs access protocol to SLA protocol modules;The SLA protocol modules:Receive the institute that data input center is sent With access protocol and identify, send encrypted access information to control extension module, send generic access information and manage mould to SLM Block;The SLM management modules:Receive the generic access information identification that SLA protocol modules are sent, send level access information to EMC processing centers;The EMC processing centers:Receive the level access information that SLM management modules are sent, extraction level access letter The grade of breath, by the corresponding monitoring grade of real-time security monitoring module, draw safety value and Virus Info;The peace in real time Full monitoring module:Including the anti-virus instruction to match with level access grade, virus checking is provided for EMC processing centers;Hair Safe value information is sent to send Virus Info to alarm module to secure data memory module;The secure data memory module:Connect The safe value information that real-time security monitoring module is sent is received, and is stored;The encrypted access module:Receive SLA protocol modules hair The encrypted access information sent, is verified by fire wall, draws encryption safe value and encrypted virus information;The fire wall:To add Close access control module provides virus checking, sends encryption safe value information to extension storage module, sends encrypted virus information To alarm module;The extension storage module:The encryption safe value that fire wall is sent is received, and is stored;The alarm module:Connect The Virus Info of real-time security monitoring module and fire wall transmission is received, encrypted virus information, closes current accessed.Establish fire prevention Wall, prevent that unauthorized user from, by unauthorized access of the external communication link to the improper part of database, being to prevent have stealing Implement another security process example of its action with the people of fraudulent intention.Privacy and confidentiality are damaged:Privacy is impaired logical Often mean that the protection to personal data meets with failure, and confidentiality is damaged the protection for generally meaning that the tissue data to key Incur loss, these data there may be strategic value to organization.Information private control unsuccessfully may result in extortion Extort, offer and take bribes, civil disputation or user cipher it is stolen.Confidentiality control, which unsuccessfully may result in, loses competitive advantage, this Utility model technical problem to be solved is to avoid accessing netpage virus, while avoids revealing access information, it is therefore intended that is carried For a kind of big data processing system based on network security, by accessing source come zoning, user is when accessing, SLA associations Whether be encrypted access, this specifically divides agreement and pre-set if discussing module and will be divided by access protocol, Webpage is identified again by fire wall, and this is also to include removing function, and extension storage module can be automatic according to user Reset, so when accessing, can not only protect oneself browses record, can also be judged according to the identification of fire wall Webpage goes security, judges that this whole step solves access netpage virus by carrying out a step, while avoid leakage from visiting Ask information.
The level access information includes 3 grades.This grade freely divides, and to be set after division corresponding The grade of real-time security monitoring module, including several gas defence grades.
The fire wall uses H3C SecBlade FW FWSMs.As preferred scheme of the present utility model.
The extension storage module uses FX1N-1DA-BD 1.Further, as preferred scheme of the present utility model.
The utility model compared with prior art, has the following advantages and advantages:
1st, a kind of big data processing system based on network security of the utility model, SLA protocol modules will pass through access Whether agreement division is encrypted access, and this specifically divides agreement and pre-set, and is identified again by fire wall Webpage, and this is also to include removing function, and extension storage module can so access according to user's automatic clear When, can not only protect oneself browses record, can also go security according to the identification of fire wall come judge webpage, Judge that this whole step solves access netpage virus by carrying out a step, while avoid revealing access information;
2nd, a kind of big data processing system based on network security of the utility model, the level access information include 3 This grade of grade is freely divided, and the grade of corresponding real-time security monitoring module is set after division, including several Gas defence grade;
3rd, a kind of big data processing system based on network security of the utility model, the fire wall use H3C SecBlade FW FWSMs, as preferred scheme of the present utility model.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding the utility model embodiment, forms the one of the application Part, the restriction to the utility model embodiment is not formed.In the accompanying drawings:
Fig. 1 is Tthe utility model system structural representation.
Embodiment
For the purpose of this utility model, technical scheme and advantage is more clearly understood, with reference to embodiment and accompanying drawing, The utility model is described in further detail, and exemplary embodiment of the present utility model and its explanation are only used for explaining this Utility model, it is not intended as to restriction of the present utility model.
Embodiment
As shown in figure 1, a kind of big data processing system based on network security of the utility model, one kind is based on network security Big data processing system, including data input center, SLA protocol modules and SLM management modules;The data input center: Including local cloud module, virtual cloud module, mixed cloud module and public cloud module, each cloud module input access protocol arrives SLA protocol modules;The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encryption Access information sends generic access information to SLM management modules to control extension module;The SLM management modules:Receive SLA The generic access information identification that protocol module is sent, sends level access information to EMC processing centers;The EMC processing centers: The level access information that SLM management modules are sent is received, the grade of level access information is extracted, passes through real-time security monitoring module Corresponding monitoring grade, draw safety value and Virus Info;The real-time security monitoring module:Including with level access grade The anti-virus instruction to match, virus checking is provided for EMC processing centers;Send safe value information to secure data and store mould Block, Virus Info is sent to alarm module;The secure data memory module:Receive the safety that real-time security monitoring module is sent Value information, and store;The encrypted access module:The encrypted access information that SLA protocol modules are sent is received, is tested by fire wall Card, draws encryption safe value and encrypted virus information;The fire wall:Virus checking, hair are provided for encrypted access control module Encryption safe value information is sent to send encrypted virus information to alarm module to extension storage module;The extension storage module:Connect The encryption safe value that fire wall is sent is received, and is stored;The alarm module:Receive real-time security monitoring module and fire wall is sent Virus Info, encrypted virus information, close current accessed.The level access information includes 3 grades.The fire wall is adopted With H3C SecBlade FW FWSMs.The extension storage module uses FX1N-1DA-BD 1.
Above-described embodiment, the purpose of this utility model, technical scheme and beneficial effect are entered One step describes in detail, should be understood that and the foregoing is only specific embodiment of the present utility model, is not used to limit Determine the scope of protection of the utility model, it is all within the spirit and principles of the utility model, any modification for being made, equally replace Change, improve, should be included within the scope of protection of the utility model.

Claims (4)

  1. A kind of 1. big data processing system based on network security, it is characterised in that:Including data input center, SLA agreement moulds Block and SLM management modules;
    The data input center:It is described each including local cloud module, virtual cloud module, mixed cloud module and public cloud module Individual cloud module inputs access protocol to SLA protocol modules;
    The SLA protocol modules:Receive that data input center is sent so access protocol and identifying, send encrypted access information To control extension module, generic access information is sent to SLM management modules;
    The SLM management modules:Receive the generic access information identification that SLA protocol modules are sent, send level access information to EMC processing centers;
    The EMC processing centers:The level access information that SLM management modules are sent is received, extracts the grade of level access information, By the corresponding monitoring grade of real-time security monitoring module, safety value and Virus Info are drawn;
    The real-time security monitoring module:Including the anti-virus instruction to match with level access grade, carried for EMC processing centers Verified for virus;Safe value information is sent to secure data memory module, sends Virus Info to alarm module;
    The secure data memory module:The safe value information that real-time security monitoring module is sent is received, and is stored;
    The encrypted access module:The encrypted access information that SLA protocol modules are sent is received, is verified by fire wall, draws and adds Close safety value and encrypted virus information;
    The fire wall:Virus checking is provided for encrypted access control module, sends encryption safe value information to extension storage mould Block, encrypted virus information is sent to alarm module;
    The extension storage module:The encryption safe value that fire wall is sent is received, and is stored;
    The alarm module:The Virus Info of real-time security monitoring module and fire wall transmission is received, encrypted virus information, is closed Current accessed.
  2. A kind of 2. big data processing system based on network security according to claim 1, it is characterised in that:The rank Access information includes 3 grades.
  3. A kind of 3. big data processing system based on network security according to claim 1, it is characterised in that:The fire prevention Wall uses H3C SecBlade FW FWSMs.
  4. A kind of 4. big data processing system based on network security according to claim 1, it is characterised in that:The extension Memory module uses FX1N-1DA-BD 1.
CN201720347426.3U 2017-04-05 2017-04-05 A kind of big data processing system based on network security Expired - Fee Related CN206728053U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720347426.3U CN206728053U (en) 2017-04-05 2017-04-05 A kind of big data processing system based on network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720347426.3U CN206728053U (en) 2017-04-05 2017-04-05 A kind of big data processing system based on network security

Publications (1)

Publication Number Publication Date
CN206728053U true CN206728053U (en) 2017-12-08

Family

ID=60503678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720347426.3U Expired - Fee Related CN206728053U (en) 2017-04-05 2017-04-05 A kind of big data processing system based on network security

Country Status (1)

Country Link
CN (1) CN206728053U (en)

Similar Documents

Publication Publication Date Title
CN105430000A (en) Cloud computing security management system
CN105337971A (en) Electric power information system cloud safety guarantee system and implementation method thereof
CN108270716A (en) A kind of audit of information security method based on cloud computing
CN101015163A (en) A network security enforcement system
CN110233817A (en) A kind of vessel safety system based on cloud computing
CN107147627A (en) A kind of network safety protection method and system based on big data platform
CN110543761A (en) big data analysis method applied to information security field
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
CN106982204A (en) Credible and secure platform
Hurlburt " Good Enough" Security: The Best We'll Ever Have
Rath et al. Strengthening access control in case of compromised accounts in smart home
CN206728053U (en) A kind of big data processing system based on network security
CN204697072U (en) A kind of secure accessing managing and control system of network end nodes
CN107104953A (en) A kind of pair of net security system and the method for lifting Information Security
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
Gupta et al. Internet of Things security using AI and blockchain
Waziri et al. A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania
CN115600189A (en) Commercial password application security evaluation system
Rathod et al. Database intrusion detection by transaction signature
Jo et al. A blockchain-based trusted security zone architecture
CN110233855A (en) A kind of region anti-violence crack method based on block chain
CN106941497A (en) Safe processing system based on informatization platform data
Cho et al. Detection and response of identity theft within a company utilizing location information
Li et al. The Research on Security Technology of Big Data Platform
Reddy et al. Trust and access controls in IoT to avoid malicious activity

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171208

Termination date: 20180405