WO2023236952A1 - 一种云数据处理系统、方法及相关设备 - Google Patents

一种云数据处理系统、方法及相关设备 Download PDF

Info

Publication number
WO2023236952A1
WO2023236952A1 PCT/CN2023/098616 CN2023098616W WO2023236952A1 WO 2023236952 A1 WO2023236952 A1 WO 2023236952A1 CN 2023098616 W CN2023098616 W CN 2023098616W WO 2023236952 A1 WO2023236952 A1 WO 2023236952A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
cloud
management
control module
pool
Prior art date
Application number
PCT/CN2023/098616
Other languages
English (en)
French (fr)
Inventor
李欢
朱洪兵
Original Assignee
华为云计算技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为云计算技术有限公司 filed Critical 华为云计算技术有限公司
Publication of WO2023236952A1 publication Critical patent/WO2023236952A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This application relates to the field of cloud technology, and in particular to a cloud data processing system, method and related equipment.
  • cloud technology can deploy cloud services (usually including necessary hardware and/or software) to different physical locations. This approach can be called cloud site-based (or distributed cloud, distributed cloud site, etc.) implementation. cloud service.
  • cloud services can access cloud sites that are geographically close to the user (or deployed at the same location as the user) in order to obtain cloud services with low latency advantages.
  • the user of the cloud service will generate the user's local data in the cloud site.
  • the cloud technology provider is still responsible for the operation and maintenance management and control of the hardware and/or software corresponding to the cloud service.
  • the operation and maintenance data of the hardware and software corresponding to the cloud service (or (called management and control data, operation and maintenance control data, etc.) need to be reported to the cloud platform (or public cloud) so that the provider of the cloud technology can obtain the operation and maintenance data of the cloud site on the cloud platform.
  • This application provides a cloud data processing system, method and related equipment, which are used to make the data sent by the cloud site to the cloud platform comply with the configuration requirements of the user of the cloud service provided by the cloud site, in order to improve the user's understanding of the cloud service. Trust in cloud services.
  • the first aspect of this application provides a cloud data processing system, including a cloud site, a cloud platform and a management and control module.
  • the management and control module is used to control the data sent by the cloud site to the cloud platform.
  • the cloud site will generate first data that needs to be reported to the cloud platform, and the cloud site will send the first data to the management and control module.
  • the management and control module After receiving the first data from the cloud site that needs to be reported to the cloud platform, the management and control module verifies the first data based on the first available data pool, and determines that the first data passes the first available data When verifying the pool, the first data is sent to the cloud platform; wherein the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the cloud platform After the cloud platform receives the first data from the management and control module, the cloud platform stores the first data.
  • the first data sent by the cloud site to the cloud platform needs to be verified by the management and control module, that is, the management and control module performs the verification based on the first available data pool. Verification, and if the first data verification passes, the management and control module sends the first data to the cloud platform.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services.
  • the cloud site may include one or more servers (or virtual machines, containers, etc.), and the management and control module may be provided in the one or more servers (or virtual machines, containers, etc.), or the management and control module may also Other devices other than the one or more servers (or virtual machines, containers, etc.) may be independently set up, and this application does not limit this.
  • the management and control module is used to control the data sent by the cloud site to the cloud platform.
  • the management and control module can also use other names, such as servers (or virtual machines, containers, etc.) used to provide management and control services, Management server (or management virtual machine, management container, etc.), watchdog (network watch dog, NWD), or other names. This application only uses this name as the management module as an example for explanation.
  • the management and control module is also configured to send first information to the cloud platform, where the first information includes the first available data pool and the management and control module's response to the first available data.
  • the signature information of the pool; the cloud platform is also used to send second information to the management and control module.
  • the second information includes the first available data pool and the cloud platform's signature information for the first available data pool, or, the The second information includes the first available data pool and the cloud platform's signature information for the first information; the cloud platform is also used to verify the first data based on the first available data pool, and determine the third After a data passes the verification of the first available data pool, the first data is stored.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both. Therefore, for the management and control module, the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform. The platform sends illegal data.
  • the cloud platform can verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform, and avoids illegal data stored by the cloud platform. data to improve the security of data stored on the cloud platform.
  • the management and control module is also configured to send the first information to the cloud site; the cloud site is also configured to generate the first data based on the first available data pool.
  • the management and control module can also send the first information including the first available data pool and the signature information of the management and control module to the first available data pool to the cloud site, so that the cloud site can be based on the management and control module.
  • the certified first available data pool generates legal data to prevent the cloud site from generating and sending illegal data to simplify subsequent operations of the management and control module.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, and N is positive integer; the management and control module is also used to obtain the second available data pool containing the M group of data, and determine the third available data pool based on the M group of data based on the configuration information.
  • the management and control module can determine the first available data pool containing N groups of data in the second available data pool containing M groups of data based on the configuration information of the user of the cloud service provided by the cloud site, where M is a positive integer greater than or equal to N. Therefore, the user of the cloud service is supported to customize the first available data pool in the management and control module for performing data verification based on the configuration information to ensure that subsequent data sent by the management and control module to the cloud platform meets the customized requirements.
  • the second available data pool obtained by the management and control module comes from the cloud platform, or the second available data pool obtained by the management and control module is data written by managers in the management and control module, or the management and control module obtains the data in other ways.
  • the second available data pool is not limited here.
  • the category information of the available data includes the category name of the available data, or the category information of the available data includes the index corresponding to the category name of the available data.
  • the value information of the available data may include the value range of the available data, or the value information of the available data may include the index corresponding to the value range of the available data.
  • the first available data pool also includes signature information corresponding to each group of data in the N groups of data, and the signature information includes the signature of the management and control module for each group of data. information and/or the cloud platform's signature information for each set of data; the management and control module is also used to determine the signature corresponding to the first data in the first available data pool when the data transmission mode is non-passthrough mode. information, and sends the signature information corresponding to the first data to the cloud platform.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the non-passthrough mode, wherein, under the non-passthrough module, the management and control module can determine the signature corresponding to the first data in the first available data pool. information, and sends the signature information corresponding to the first data to the cloud platform so that the cloud platform can verify the received first data based on the signature information in the first available data pool to avoid data tampering and improve security. sex.
  • the management and control module is also configured to send the signature information of the management and control module on the first data to the cloud platform when the data sending mode is the pass-through mode.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the pass-through mode, wherein, under the pass-through module, the management and control module can send the signature information of the first data of the management and control module to the cloud platform, so that The cloud platform verifies the received first data based on the signature information of the management and control module to avoid data tampering, improve security, and simplify the operations of the management and control module and the cloud platform.
  • non-passthrough mode has higher data security requirements than pass-through mode.
  • the non-passthrough mode can also be replaced by other descriptions, such as high security mode, trust mode, enhanced verification mode, etc.;
  • the pass-through mode can also be replaced by other descriptions, such as low security mode, non-trust mode, etc. .
  • the first available data pool further includes a sending strategy, the sending strategy includes sending time and/or sending sequence; the management and control module is also configured to send a message to the cloud platform based on the sending strategy. Send the first data.
  • the first available service determined based on the configuration information of the user of the cloud service provided by the cloud site may include a sending policy, so that the management and control module can send the first data to the cloud platform based on the sending policy configured by the user, in order to further enhance the trust of the cloud service user in the cloud service.
  • system further includes an audit system; the management and control module is also configured to send the first data to the audit system, so that the audit system audits the first data.
  • the management and control module can also send the first data to the audit system, so that the user of the cloud service can audit the first data sent by the management and control module to the cloud platform based on the audit system (including implementation of audit or post-event audit). Audit, etc.), in order to further enhance the trust of cloud service users in cloud services.
  • the second aspect of this application provides a cloud data processing method based on a management and control module.
  • the method is executed by the management and control module, or the method is executed by some components in the management and control module (such as a processor, a chip or a chip system, etc.), or , this method is implemented by a logic module or software that can realize all or part of the management and control module functions.
  • the method is described by taking the method being executed by the management and control module as an example, where the management and control module can be a server, a virtual machine, a container and other devices.
  • the management and control module receives the first data from the cloud site, and the management and control module is used to control the data sent by the cloud site to the cloud platform; the management and control module performs the first data on the first available data pool based on Verification, wherein the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site; when it is determined that the first data passes the verification of the first available data pool, the management and control module Send the first data to the cloud platform.
  • the management and control module is used in the cloud data processing system to control the data sent by the cloud site to the cloud platform.
  • the management and control device After the management and control device receives the first data from the cloud site, the management and control device is based on the first available data pool.
  • the first data is verified, and when it is determined that the first data passes the verification of the first available data pool, the management and control module sends the first data to the cloud platform.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services.
  • the cloud site may include one or more servers (or virtual machines, containers, etc.), and the management and control module may be provided in the one or more servers (or virtual machines, containers, etc.), or the management and control module may also Other devices other than the one or more servers (or virtual machines, containers, etc.) may be independently set up, and this application does not limit this.
  • the management and control module is used to control the data sent by the cloud site to the cloud platform.
  • the management and control module can also use other names, such as servers (or virtual machines, containers, etc.) used to provide management and control services, Management server (or management virtual machine, management container, etc.), watchdog (network watch dog, NWD), or other names. This application only uses this name as the management module as an example for explanation.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, and N is positive Integer; before the management and control module verifies the first data based on the first available data pool, the method also includes: the management and control module receives a second available data pool from the cloud platform, the second available data pool includes M groups Data, each group of data in the M group of data includes category information of available data and value information of available data, M is a positive integer greater than or equal to N; the management and control module determines the M group of data based on the configuration information. First available data pool.
  • the management and control module can be based on the configuration information of the user of the cloud service provided by the cloud site.
  • the second available data pool containing M sets of data determines the first available data pool containing N sets of data, where M is a positive integer greater than or equal to N. Therefore, the user of the cloud service is supported to customize the first available data pool in the management and control module for performing data verification based on the configuration information to ensure that subsequent data sent by the management and control module to the cloud platform meets the customized requirements.
  • the configuration information includes at least one of an instruction to delete available data and an instruction to modify available data.
  • the user of the cloud service can perform customized operations such as deletion and modification to ensure that the subsequent management and control module sends the data to the cloud platform.
  • the data meets the requirements for this customized operation.
  • the second available data pool obtained by the management and control module can also be data written by managers in the management and control module, or data written by the management and control module.
  • the module obtains the second available data pool through other methods, which are not limited here.
  • the category information of the available data includes the category name of the available data, or the category information of the available data includes the index corresponding to the category name of the available data.
  • the value information of the available data may include the value range of the available data, or the value information of the available data may include the index corresponding to the value range of the available data.
  • the method further includes: the management and control module sending first information to the cloud platform, the first information including the first available data pool and the first available data pool by the management and control module. Signature information of the data pool; the management and control module receives second information from the cloud platform, the second information includes the first available data pool and the cloud platform's signature information for the first available data pool, or, the second The information includes the first available data pool and the cloud platform's signature information for the first information.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both. Therefore, for the management and control module, the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform. The platform sends illegal data.
  • the cloud platform can subsequently verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform to avoid illegal storage by the cloud platform. data to improve the security of data stored on the cloud platform.
  • the method further includes: the management and control module sending first information to the cloud site, the first information including the first available data pool and the management and control module's response to the first available data. Pool signature information.
  • the management and control module can also send the first information including the first available data pool and the signature information of the management and control module to the first available data pool to the cloud site, so that the cloud site can be based on the management and control module.
  • the certified first available data pool generates legal data to prevent the cloud site from generating and sending illegal data to simplify subsequent operations of the management and control module.
  • the method when it is determined that the first data passes the verification of the first available data pool, the method further includes: the management and control module sending the first data to the audit system.
  • the management and control module can also send the first data to the audit system, so that the use of the cloud service
  • the user can audit the first data sent by the management and control module to the cloud platform based on the audit system (including implementation audit or post-audit, etc.), in order to further enhance the trust of the cloud service user in the cloud service.
  • the first available data pool also includes the sending strategy, which includes sending time and/or sending sequence;
  • the management and control module sending the first data to the cloud platform includes: The management and control module sends the first data to the cloud platform based on the sending policy.
  • the first available data pool determined based on the configuration information of the user of the cloud service provided by the cloud site may include a sending policy, so that the management and control module can send the first available data pool to the cloud platform based on the sending policy configured by the user.
  • One data in order to further enhance the trust of cloud service users in cloud services.
  • the first available data pool also includes signature information corresponding to each group of data in the N groups of data, and the signature information includes the signature of the management and control module for each group of data. information and/or the cloud platform's signature information for each set of data; when determining that the first data passes the verification of the first available data pool, the method also includes: when the data sending mode is a non-passthrough mode, the The management and control module determines the signature information corresponding to the first data based on the first available data pool; the management and control module sends the signature information corresponding to the first data to the cloud platform.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the non-passthrough mode, wherein, under the non-passthrough module, the management and control module can determine the signature corresponding to the first data in the first available data pool. information, and sends the signature information corresponding to the first data to the cloud platform so that the cloud platform can verify the received first data based on the signature information in the first available data pool to avoid data tampering and improve security. sex.
  • the method when determining that the first data passes the verification of the first available data pool, the method further includes: when the data sending mode is the pass-through mode, the management and control module sends a request to the cloud.
  • the platform sends the signature information of the first data by the management and control module.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the pass-through mode, wherein, under the pass-through module, the management and control module can send the signature information of the first data of the management and control module to the cloud platform, so that The cloud platform verifies the received first data based on the signature information of the management and control module to avoid data tampering, improve security, and simplify the operations of the management and control module and the cloud platform.
  • non-passthrough mode has higher data security requirements than pass-through mode.
  • the non-passthrough mode can also be replaced by other descriptions, such as high security mode, trust mode, enhanced verification mode, etc.;
  • the pass-through mode can also be replaced by other descriptions, such as low security mode, non-trust mode, etc. .
  • the third aspect of this application provides a cloud data processing method based on a cloud platform.
  • the method is executed by the cloud platform, or the method is executed by some components in the cloud platform (such as a processor, a chip or a chip system, etc.), or , this method is implemented by logical modules or software that can realize all or part of the cloud platform functions.
  • the method is described by taking the method executed by the cloud platform as an example.
  • the cloud platform receives the first data from the management and control module; the cloud platform verifies the first data based on a first available data pool, where the first available data pool is based on the data provided by the cloud site.
  • a data pool determined by the configuration information of the user of the cloud service; when it is determined that the first data passes the verification of the first available data pool, the cloud platform stores the first data.
  • the management and control module is used in the cloud data processing system to control the data sent by the cloud site to the cloud platform.
  • the cloud platform receives the first data from the management and control device, the cloud platform based on the first available data pool
  • the first data is verified, and when it is determined that the first data passes the verification of the first available data pool, the cloud platform stores the first data.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site. Therefore, the first data stored by the cloud platform is data that has been verified by the cloud platform, so that the data stored by the cloud platform meets the configuration requirements of the user of the cloud service provided by the cloud site, in order to improve the user's understanding of the cloud service. Trust in cloud services.
  • the data stored on the cloud platform is legal data certified by the cloud platform, which prevents the cloud platform from storing illegal data and improves the security of the data stored on the cloud platform.
  • the method before the cloud platform verifies the first data based on the first available data pool, the method further includes: the cloud platform receives the first information from the management and control module , the first information includes the first available data pool and the signature information of the management and control module for the first available data pool; the cloud platform sends second information to the management and control module, the second information includes the first available data pool and the cloud platform's signature information for the first available data pool, or the second information includes the first available data pool and the cloud platform's signature information for the first information.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both. Therefore, for the management and control module, the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform. The platform sends illegal data.
  • the cloud platform can subsequently verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform to avoid illegal storage by the cloud platform. data to improve the security of data stored on the cloud platform.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, and N is positive integer; the method also includes: the cloud platform sends a second available data pool to the management and control module, so that the management and control module determines the first available data pool based on the second available data pool, and the second available data pool includes M sets of data , each group of data in the M groups of data includes category information of available data and value information of available data, and M is a positive integer.
  • the cloud platform can send the second available data pool to the management and control device, so that the management and control module can determine the second available data pool containing M groups of data based on the configuration information of the user of the cloud service provided by the cloud site.
  • M is a positive integer greater than or equal to N. Therefore, the user of the cloud service is supported to customize the first available data pool in the management and control module for performing data verification based on the configuration information to ensure that subsequent data sent by the management and control module to the cloud platform meets the customized requirements.
  • the first available data pool also includes signature information corresponding to each group of data in the N groups of data, and the signature information includes the signature of the management and control module for each group of data. information and/or the cloud platform's signature information for each set of data; when the data sending mode is the non-passthrough mode, the method also includes: the cloud platform receives the signature information corresponding to the first data from the management and control module.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the non-passthrough mode, wherein, under the non-passthrough module, the management and control module can determine the signature corresponding to the first data in the first available data pool. information, and sends the signature information corresponding to the first data to the cloud platform so that the cloud platform can verify the received first data based on the signature information in the first available data pool to avoid data tampering and improve security. sex.
  • the method when the data sending mode is the pass-through mode, the method further includes: the cloud platform receiving signature information of the first data from the management and control module.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the pass-through mode, wherein, under the pass-through module, the management and control module can send the signature information of the first data of the management and control module to the cloud platform, so that The cloud platform verifies the received first data based on the signature information of the management and control module to avoid data tampering, improve security, and simplify the operations of the management and control module and the cloud platform.
  • non-passthrough mode has higher data security requirements than pass-through mode.
  • the non-passthrough mode can also be replaced by other descriptions, such as high security mode, trust mode, enhanced verification mode, etc.;
  • the pass-through mode can also be replaced by other descriptions, such as low security mode, non-trust mode, etc. .
  • the fourth aspect of this application provides a cloud data processing method based on a cloud site.
  • the method is executed by the cloud site, or the method is executed by some components in the cloud site (such as a processor, a chip or a chip system, etc.), or , this method is implemented by logical modules or software that can realize all or part of the cloud site functions.
  • the method is described by taking the method being executed by the cloud site as an example.
  • the cloud site receives first information from the management and control module.
  • the first information includes a first available data pool.
  • the first available data pool is determined based on the configuration information of the user of the cloud service provided by the cloud site. data pool; the cloud site generates the first data based on the first available data pool; the cloud site sends the first data to the management and control module.
  • the cloud site receives the first available data pool from the management and control module, and after generating the first data based on the first available data pool, the cloud site sends the first data to the management and control module.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site. Therefore, in the process of the cloud site providing cloud services, the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services. Furthermore, the cloud site generates legal data based on the first available data pool indicated by the management and control module, thereby preventing the cloud site from generating and sending illegal data.
  • the first information includes the signature information of the cloud platform for the first available data pool, and/or the first information includes the signature information of the management and control module for the first available data pool. signature information.
  • the first information received by the cloud site may also be the signature information of the first available data pool by the cloud platform, and/or the first information includes the signature information of the management and control module on the first available data pool. , so that the cloud site can generate legal data based on the first available data pool that has been certified by the management and control module and/or the cloud platform, to prevent the cloud site from generating and sending illegal data, and to simplify subsequent operations of the management and control module.
  • the fifth aspect of this application provides a management and control module, including: a receiving unit, used to receive the first data from the cloud site, the management and control module is used to control the data sent by the cloud site to the cloud platform; a processing unit, Verifying the first data based on a first available data pool, where the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site; the sending unit is configured to When the processing unit determines that the first data passes the verification of the first available data pool, it sends the first data to the cloud platform.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, and N is positive integer;
  • the receiving unit It is also configured to receive a second available data pool from the cloud platform.
  • the second available data pool includes M sets of data, and each set of data in the M sets of data includes category information of the available data and value information of the available data, M is a positive integer greater than or equal to N;
  • the processing unit is also used to determine the first available data pool in the M group of data based on the configuration information;
  • the sending unit is also used to send the first information to the cloud platform,
  • the first information includes the first available data pool and the signature information of the management and control module on the first available data pool.
  • the sending unit is also configured to send first information to the cloud platform, where the first information includes the first available data pool and the control module's response to the first available data.
  • the signature information of the pool the receiving unit is also used to receive second information from the cloud platform, the second information includes the first available data pool and the cloud platform's signature information for the first available data pool, or, The second information includes the first available data pool and the cloud platform's signature information for the first information.
  • the configuration information includes at least one of an instruction to delete available data and an instruction to modify available data.
  • the sending unit is also configured to send the first data to the audit system.
  • the component modules of the management and control module can also be used to perform the steps performed in each possible implementation manner of the second aspect, and achieve corresponding technical effects.
  • the second aspect here No longer.
  • the sixth aspect of this application provides a cloud platform, including: a receiving unit, used to receive the first data from the management and control module; a processing unit, used to verify the first data based on the first available data pool, wherein, The first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site; the processing unit is also used to determine that the first data passes the verification of the first available data pool, Store the first data.
  • the cloud platform further includes a sending unit configured to send a second available data pool to the management and control module.
  • the second available data pool includes M groups of data, and the M groups Each set of data in the data includes category information of available data and value information of available data.
  • M is a positive integer greater than or equal to N.
  • the component modules of the cloud platform can also be used to perform the steps performed in each possible implementation manner of the third aspect, and achieve corresponding technical effects.
  • the third aspect here No longer.
  • a seventh aspect of this application provides a cloud site, including: a receiving unit, configured to receive first information from a management and control module, where the first information includes a first available data pool, and the first available data pool is based on the cloud site A data pool determined by the configuration information of the user of the provided cloud service; a processing unit configured to generate first data based on the first available data pool; and a sending unit configured to send the first data to the management and control module.
  • the component modules of the cloud site can also be used to perform the steps performed in each possible implementation manner of the fourth aspect, and achieve corresponding technical effects.
  • the fourth aspect here No longer.
  • An eighth aspect of the present application provides a management and control module, which includes a memory and a processor; the memory stores code, and the processor is configured to execute the code.
  • the management and control module executes the following steps: Methods in two aspects and their possible implementations.
  • a ninth aspect of the present application provides a cloud platform, which includes a memory and a processor; the memory stores code, and the processor is configured to execute the code.
  • the cloud platform executes the following steps: Methods in three aspects and their possible implementations.
  • a tenth aspect of this application provides a cloud site, characterized in that the cloud platform includes a memory and a processor; the memory stores code, the processor is configured to execute the code, and when the code is executed, the cloud The site performs the methods as described in the third aspect and possible implementations thereof.
  • An eleventh aspect of the present application provides a computer storage medium.
  • the computer storage medium stores a computer program.
  • the program When the program is executed by a computer, the computer implements as described in the second aspect or any of the possible implementation methods of the second aspect.
  • a twelfth aspect of the present application provides a computer program product.
  • the computer program product stores instructions.
  • the computer implements the second aspect or any of the possible implementation methods of the second aspect.
  • the first data sent by the cloud site to the cloud platform needs to be verified by the management and control module, that is, the management and control module verifies based on the first available data pool, and If the first data verification passes, the management and control module sends the first data to the cloud platform.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site. Therefore, in the process of the cloud site providing cloud services, the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both. Therefore, for the management and control module, the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform. The platform sends illegal data.
  • the cloud platform can verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform, and avoids illegal data stored by the cloud platform. data to improve the security of data stored on the cloud platform.
  • FIG. 1a is a schematic diagram of the cloud data processing system involved in this application.
  • FIG. 1b is a schematic diagram of cloud data processing involved in this application.
  • FIG. 2 is a schematic diagram of the cloud data processing system provided by this application.
  • FIG. 3 is another schematic diagram of the cloud data processing system provided by this application.
  • FIG. 4 is a schematic diagram of the cloud data processing method provided by this application.
  • FIG. 5 is a schematic diagram of cloud data interaction provided by this application.
  • FIG. 6 is another schematic diagram of the cloud data processing method provided by this application.
  • FIG. 7 is another schematic diagram of the cloud data processing method provided by this application.
  • FIG. 8 is another schematic diagram of the cloud data processing method provided by this application.
  • FIG. 9 is another schematic diagram of the cloud data processing method provided by this application.
  • FIG. 10 is another schematic diagram of the cloud data processing method provided by this application.
  • FIG 11 is a schematic diagram of the management and control module provided by this application.
  • Figure 12 is a schematic diagram of the cloud platform provided by this application.
  • FIG. 13 is a schematic diagram of the cloud site provided by this application.
  • FIG 14 is another schematic diagram of the management and control module provided by this application.
  • Figure 15 is another schematic diagram of the cloud platform provided by this application.
  • Figure 16 is another schematic diagram of the cloud site provided by this application.
  • pluricity means two or more than two.
  • “At least one of the following” or similar expressions refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • at least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple .
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same functions and effects.
  • words such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not limit the number and execution order.
  • words such as “exemplary” or “for example” are used to represent examples, illustrations or explanations. Any embodiment or design described as “exemplary” or “such as” in the embodiments of the application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as “exemplary” or “such as” is intended to present related concepts in a concrete manner for easier understanding.
  • cloud technology can deploy cloud services (usually including necessary hardware and/or software) to different physical locations. This approach can be called cloud site-based (or distributed cloud, distributed cloud site, etc.) implementation. cloud service.
  • cloud services can access cloud sites that are geographically close to the user (or deployed at the same location as the user) in order to obtain cloud services with low latency advantages.
  • the user of the cloud service will generate the user's local data in the cloud site.
  • the cloud technology provider is still responsible for the operation and maintenance management and control of the hardware and/or software corresponding to the cloud service.
  • the operation and maintenance data of the hardware and software corresponding to the cloud service (or (called management and control data, operation and maintenance control data, etc.) need to be reported to the cloud platform (or public cloud) so that the provider of the cloud technology can obtain the operation and maintenance data of the cloud site on the cloud platform.
  • the cloud site will report the operation and maintenance data generated by the cloud site to the cloud platform through the network, so that the cloud platform can implement the cloud site based on the obtained operation and maintenance data. management.
  • users of cloud services may have some applications that cannot be run directly on the cloud platform but need to be run in the cloud site.
  • These applications include but are not limited to:
  • Applications deployed by cloud service users to interface with industrial systems have very low latency requirements (for example, the latency requirement is less than 10 milliseconds or less);
  • this problem mainly includes how to ensure that the data does not leave the local area during the operation period and maintenance period, which will be introduced separately below.
  • the maintenance period that is, remote maintenance of the local data center.
  • the maintenance period it can be solved through data encryption and local storage of secret keys.
  • the operation period this problem is specifically manifested in that the local distributed cloud requires continuous operation. Maintenance requires continuous reporting of system monitoring data to the cloud platform.
  • an audit system in order to improve the trust of cloud service users in cloud services, an audit system can be added to the cloud site.
  • the audit system is used to conduct post-mortem audits of the data sent by the cloud site to the cloud platform.
  • the implementation of the audit system can be shown in Figure 1b.
  • the cloud site can include memory, network components, and auditing systems.
  • the memory will store local business data generated by the user of the cloud service and the operation and maintenance data of the cloud site.
  • the network components in the cloud site can send the operation and maintenance data in the memory to the operation and maintenance data management and control module of the cloud platform, so that the cloud platform can implement management based on the operation and maintenance data. Management and control of cloud platforms.
  • an audit system can also exist in the cloud site, which is used to audit the operation and maintenance data transmitted by network components.
  • local business data generated by the cloud site can be stored encrypted to increase data security.
  • the local business data generated by the cloud site needs to be uploaded to the cloud platform, through the execution process of arrow "2" in Figure 1b, the local business data can also be uploaded to the cloud site through the network component.
  • Virtual private cloud (VPC) service module in the cloud platform if the local business data generated by the cloud site needs to be uploaded to the cloud platform, through the execution process of arrow "2" in Figure 1b, the local business data can also be uploaded to the cloud site through the network component.
  • Virtual private cloud (VPC) service module in the cloud platform VPC
  • the data passing through the network component can be encrypted data
  • the encryption algorithm used for the encrypted data can be configured locally on the cloud site or provided by the cloud platform, which is not limited here.
  • the local business data generated by the cloud site may be the data that the cloud site mentioned above needs to reside locally.
  • the local business data can be stored encrypted in the memory to increase the security of the data
  • the local business data and operation and maintenance data in the cloud site share the memory, there is a possibility of mutual access to the data in the memory, and the operation and maintenance data may be accessed by each other.
  • Dimension data may be mixed with local business data.
  • the generation rules of operation and maintenance data are defined by the cloud platform, and the cloud site cannot know the specific semantics of the operation and maintenance data.
  • the audit system can obtain the data flow of the transmitted operation and maintenance data, the execution mechanism shown in Figure 1b cannot Prove whether local business data is mixed with operation and maintenance data. For this reason, the implementation method of adding an audit system as shown in Figure 1b above cannot effectively improve the trust of cloud service users in cloud services.
  • embodiments of the present application provide a cloud data processing system, method and related equipment, which are used to make the data sent by the cloud site to the cloud platform comply with the configuration requirements of the user of the cloud service provided by the cloud site, in order to Improve the trust of cloud service users in cloud services.
  • the cloud data processing system includes a cloud platform, a management and control module and a cloud site.
  • the management and control module is used to control the data sent by the cloud site to the cloud platform.
  • the cloud site will generate first data that needs to be reported to the cloud platform, and the cloud site will send the first data to the management and control module.
  • the management and control module After receiving the first data from the cloud site that needs to be reported to the cloud platform, the management and control module verifies the first data based on the first available data pool, and determines that the first data passes the first available data pool experience When authenticated, the first data is sent to the cloud platform; wherein the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the cloud platform After the cloud platform receives the first data from the management and control module, the cloud platform stores the first data.
  • the first data sent by the cloud site to the cloud platform needs to be verified by the management and control module, that is, the management and control module is based on the first available
  • the data pool performs verification, and if the first data verification passes, the management and control module sends the first data to the cloud platform.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services.
  • the cloud site may include one or more servers (or virtual machines, containers, etc.), as shown in Figure 2, and the management and control module may also be independently configured on the one or more servers (or virtual machines, containers, etc.) Other devices than other devices; or, as shown in Figure 3, the management and control module can be installed in one or more servers (or virtual machines, containers, etc.), which is not limited in this application.
  • the management and control module is used to control the data sent by the cloud site to the cloud platform.
  • the management and control module can also use other names, such as servers (or virtual machines, containers, etc.) used to provide management and control services, Management server (or management virtual machine, management container, etc.), watchdog (network watch dog, NWD), or other names. This application only uses this name as the management module as an example for explanation.
  • the management and control module is also configured to send first information to the cloud platform.
  • the first information includes the first available data pool and the signature information of the management and control module for the first available data pool.
  • the cloud platform is also used to send second information to the management and control module.
  • the second information includes the first available data pool and the signature information of the cloud platform for the first available data pool, or the second information includes The first available data pool and the cloud platform's signature information for the first information; the cloud platform is also used to verify the first data based on the first available data pool, and determine that the first data passes the After verification of the first available data pool, the first data is stored.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both. Therefore, for the management and control module, the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform. The platform sends illegal data.
  • the cloud platform can verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform, and avoids illegal data stored by the cloud platform. data to improve the security of data stored on the cloud platform.
  • the management and control module is also used to send the first information to the cloud site; the cloud site is also used to generate the first data based on the first available data pool.
  • the management and control module can also send the first information including the first available data pool and the signature information of the management and control module to the first available data pool to the cloud site, so that the cloud site can authenticate based on the management and control module.
  • the first available data pool generates legal data to prevent the cloud site from generating and sending illegal data to simplify subsequent operations of the management and control module.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, N is a positive integer; the management and control module, also used to get packages A second available data pool containing M sets of data, and determining the first available data pool in the M sets of data based on the configuration information; wherein each set of data in the M sets of data includes category information of available data and available data
  • the value information of M is a positive integer greater than or equal to N.
  • the management and control module can determine the first available data pool containing N sets of data in the second available data pool containing M sets of data based on the configuration information of the user of the cloud service provided by the cloud site, where M is greater than Or a positive integer equal to N. Therefore, the user of the cloud service is supported to customize the first available data pool in the management and control module for performing data verification based on the configuration information to ensure that subsequent data sent by the management and control module to the cloud platform meets the customized requirements.
  • the second available data pool obtained by the management and control module comes from the cloud platform, or the second available data pool obtained by the management and control module is data written by managers in the management and control module, or the management and control module obtains the data in other ways.
  • the second available data pool is not limited here.
  • the category information of the available data includes the category name of the available data, or the category information of the available data includes the index corresponding to the category name of the available data.
  • the value information of the available data may include the value range of the available data, or the value information of the available data may include the index corresponding to the value range of the available data.
  • the first available data pool also includes signature information corresponding to each group of data in the N groups of data, and the signature information includes the signature information of the management and control module for each group of data and/or The cloud platform's signature information for each set of data; the management and control module is also used to determine the signature information corresponding to the first data in the first available data pool when the data sending mode is non-passthrough mode, and provide the signature information to the first available data pool.
  • the cloud platform sends signature information corresponding to the first data.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the non-passthrough mode, wherein, under the non-passthrough module, the management and control module can determine the signature information corresponding to the first data in the first available data pool, The signature information corresponding to the first data is sent to the cloud platform so that the cloud platform can verify the received first data based on the signature information in the first available data pool to avoid data tampering and improve security.
  • the management and control module is also configured to send the signature information of the management and control module to the first data to the cloud platform when the data sending mode is the pass-through mode.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the pass-through mode, wherein, under the pass-through module, the management and control module can send the signature information of the first data of the management and control module to the cloud platform, so as to facilitate the The cloud platform verifies the first data received based on the signature information of the management and control module to avoid data tampering, improve security, and simplify the operations of the management and control module and the cloud platform.
  • non-passthrough mode has higher data security requirements than pass-through mode.
  • the non-passthrough mode can also be replaced by other descriptions, such as high security mode, trust mode, enhanced verification mode, etc.;
  • the pass-through mode can also be replaced by other descriptions, such as low security mode, non-trust mode, etc. .
  • the first available data pool also includes a sending strategy, which includes sending time and/or sending sequence; the management and control module is also configured to send the first available data pool to the cloud platform based on the sending strategy.
  • the first available data pool determined based on the configuration information of the user of the cloud service provided by the cloud site may include a sending policy, so that the management and control module can send the first data to the cloud platform based on the sending policy configured by the user. , in order to further enhance the trust of cloud service users in cloud services.
  • the system further includes an audit system; the management and control module is also configured to send the first data to the audit system, so that the audit system audits the first data.
  • the management and control module can also send the first data to the audit system, so that the user of the cloud service can audit the first data sent by the management and control module to the cloud platform based on the audit system (including implementation of audits or post-event audits, etc. ), in order to further enhance the trust of cloud service users in cloud services.
  • the method shown in Figure 4 is applied to a system including a cloud platform, a management and control module and a cloud site.
  • the method shown in Figure 4 takes the cloud platform, the management and control module and the cloud site as the execution subjects of the interactive representation as an example to illustrate the method, but this application does not limit the execution subjects of the interactive representation.
  • the cloud platform (or management and control module, or cloud site) in Figure 4 can also be a chip, chip system, or processor that supports the cloud platform (or management and control module, or cloud site) to implement the method, or can be a Logical modules or software that implement all or part of the cloud platform (or management and control module, or cloud site).
  • the cloud site sends the first data to the management and control module.
  • the cloud site when the cloud site provides cloud services, the cloud site generates the first data, and the cloud site sends the first data to the management and control module in step S401.
  • the management and control module verifies the first data based on the first available data pool.
  • the management and control module After the management and control module receives the first data in step S401, the management and control module verifies the first data based on the first available data pool in step S402.
  • the management and control module sends the first data to the cloud platform.
  • the management and control module when the management and control module verifies the first data based on the first available data pool in step S402 and the verification passes, the management and control module sends the first data to the cloud platform in step S403.
  • the management and control module is used in the cloud data processing system to control the data sent by the cloud site to the cloud platform.
  • the management and control device receives the first data from the cloud site in step S401, the management and control device based on the The first available data pool verifies the first data, and when it is determined in step S403 that the first data passes the verification of the first available data pool, the management and control module sends the first data to the cloud platform.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site.
  • the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services.
  • the cloud site may include one or more servers (or virtual machines, containers, etc.), and the management and control module may be provided in the one or more servers (or virtual machines, containers, etc.), or the management and control module may also Other devices other than the one or more servers (or virtual machines, containers, etc.) may be independently set up, and this application does not limit this.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, N is a positive integer; the management and control Before the module verifies the first data based on the first available data pool in step S402, the method also includes: the management and control module receives a second available data pool from the cloud platform, the second available data pool includes M sets of data , each group of data in the M groups of data includes Category information of available data and value information of available data, M is a positive integer greater than or equal to N; the management and control module determines the first available data pool in the M group of data based on the configuration information.
  • the management and control module can determine the first available data pool containing N sets of data in the second available data pool containing M sets of data based on the configuration information of the user of the cloud service provided by the cloud site, where M is greater than Or a positive integer equal to N. Therefore, the user of the cloud service is supported to customize the first available data pool in the management and control module for performing data verification based on the configuration information to ensure that subsequent data sent by the management and control module to the cloud platform meets the customized requirements.
  • the configuration information includes at least one of an instruction to delete available data and an instruction to modify available data.
  • the user of the cloud service can perform customized operations such as deletion and modification to ensure that the subsequent data sent by the management and control module to the cloud platform conforms to the requirements for this customized operation.
  • the first available data pool also includes the sending strategy, which includes sending time and/or sending order; the management and control module sending the first data to the cloud platform includes: the management and control module based on The sending strategy sends the first data to the cloud platform.
  • the first available data pool determined based on the configuration information of the user of the cloud service provided by the cloud site may include a sending policy, so that the management and control module can send the first data to the cloud platform based on the sending policy configured by the user. , in order to further enhance the trust of cloud service users in cloud services.
  • the second available data pool obtained by the management and control module can also be data written by managers in the management and control module, or data written by the management and control module.
  • the module obtains the second available data pool through other methods, which are not limited here.
  • the category information of the available data includes the category name of the available data, or the category information of the available data includes the index corresponding to the category name of the available data.
  • the value information of the available data may include the value range of the available data, or the value information of the available data may include the index corresponding to the value range of the available data.
  • the method further includes: the management and control module sending first information to the cloud platform, the first information including the first available data pool and the first information generated by the management and control module.
  • the signature information of the available data pool the management and control module receives the second information from the cloud platform, the second information includes the first available data pool and the signature information of the cloud platform for the first available data pool, or, the third The second information includes the first available data pool and the cloud platform's signature information for the first information.
  • the management and control module and the cloud platform can also exchange their signature information on the first available data pool respectively, so that both the management and control module and the cloud platform can obtain the first available data pool that has been dual-authenticated by both.
  • the management and control module can verify the data based on the first available data pool that has undergone dual authentication, so that the data sent by the management and control module to the cloud platform is legal data certified by the cloud platform, preventing the management and control module from sending data to the cloud platform.
  • the platform sends illegal data.
  • the cloud platform can subsequently verify the data based on the first available data pool that has been dual-certified, so that the data stored by the cloud platform is legal data certified by the cloud platform to avoid illegal storage by the cloud platform. data to improve the security of data stored on the cloud platform.
  • the method further includes: the management and control module sending first information to the cloud site, the first information including the first available data pool and the first available data pool by the management and control module. Signature information of the data pool.
  • the management and control module can also send the first information including the first available data pool and the signature information of the management and control module to the first available data pool to the cloud site, so that the cloud site can authenticate based on the management and control module.
  • the first available data pool generates legal data to prevent the cloud site from generating and sending illegal data to simplify subsequent operations of the management and control module.
  • the method further includes: the management and control module sending the first data to the audit system.
  • the management and control module can also send the first data to the audit system, so that the user of the cloud service can audit the first data sent by the management and control module to the cloud platform based on the audit system (including implementation of audits or post-event audits, etc. ), in order to further enhance the trust of cloud service users in cloud services.
  • the first available data pool also includes signature information corresponding to each group of data in the N groups of data, and the signature information includes the signature information of the management and control module for each group of data and/or The cloud platform's signature information for each set of data; when determining that the first data passes the verification of the first available data pool, the method also includes: when the data sending mode is a non-passthrough mode, the management and control module based on the The first available data pool determines the signature information corresponding to the first data; the management and control module sends the signature information corresponding to the first data to the cloud platform.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the non-passthrough mode, wherein, under the non-passthrough module, the management and control module can determine the signature information corresponding to the first data in the first available data pool, The signature information corresponding to the first data is sent to the cloud platform so that the cloud platform can verify the received first data based on the signature information in the first available data pool to avoid data tampering and improve security.
  • the method when it is determined that the first data passes the verification of the first available data pool, the method further includes: when the data sending mode is the pass-through mode, the management and control module sends the management and control module to the cloud platform.
  • the module s signature information for the first data.
  • the data sending unit of the management and control module that sends data to the cloud platform can support the pass-through mode, wherein, under the pass-through module, the management and control module can send the signature information of the first data of the management and control module to the cloud platform, so as to facilitate the The cloud platform verifies the first data received based on the signature information of the management and control module to avoid data tampering, improve security, and simplify the operations of the management and control module and the cloud platform.
  • non-passthrough mode has higher data security requirements than pass-through mode.
  • the non-passthrough mode can also be replaced by other descriptions, such as high security mode, trust mode, enhanced verification mode, etc.;
  • the pass-through mode can also be replaced by other descriptions, such as low security mode, non-trust mode, etc. .
  • the method further includes: after the cloud site receives the first available data pool from the management and control module and generates the first data based on the first available data pool, the cloud site sends The management and control module sends the first data.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site. Therefore, in the process of the cloud site providing cloud services, the first data sent by the cloud site to the cloud platform is data that has been verified by the management and control module, so that the data sent by the cloud site to the cloud platform is consistent with the use of cloud services provided by the cloud site. configuration requirements of other parties, in order to enhance the trust of cloud service users in cloud services. Furthermore, the cloud site generates legal data based on the first available data pool indicated by the management and control module, thereby preventing the cloud site from generating and sending illegal data.
  • the first information sent by the management and control module to the cloud site includes the signature information of the cloud platform for the first available data pool, and/or the first information sent by the management and control module to the cloud site includes the signature information of the first available data pool by the management and control module.
  • Signature information for available data pools includes the first information received by the cloud site may also be the signature information of the first available data pool by the cloud platform, And/or, the first information includes the signature information of the management and control module on the first available data pool, so that the cloud site generates legal data based on the first available data pool certified by the management and control module and/or the cloud platform to avoid The cloud site generates and sends illegal data to simplify subsequent operations of the control module.
  • the management and control module is used in the cloud data processing system to control the data sent by the cloud site to the cloud platform.
  • the cloud platform receives the first data from the management and control device, the cloud platform based on the first available data
  • the pool verifies the first data, and when it is determined that the first data passes the verification of the first available data pool, the cloud platform stores the first data.
  • the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site. Therefore, the first data stored by the cloud platform is data that has been verified by the cloud platform, so that the data stored by the cloud platform meets the configuration requirements of the user of the cloud service provided by the cloud site, in order to improve the user's understanding of the cloud service. Trust in cloud services.
  • the data stored on the cloud platform is legal data certified by the cloud platform, which prevents the cloud platform from storing illegal data and improves the security of the data stored on the cloud platform.
  • the cloud data processing system includes the following implementation process.
  • a new management and control data processing module is added to obtain the management and control data pool (the customer can be the user of the cloud services provided by the distributed cloud site) from NWD. That is, the first available data pool in the previous embodiment), and the transmission data (such as the first data in the previous embodiment) is generated according to the obtained management data pool.
  • the components included in the distributed cloud site can perform the implementation process in Table 1 below.
  • the metadata can be the first available data pool in the previous embodiment, and the data supported by the distributed cloud system can be the second available data pool in the previous embodiment. .
  • the scope of the tailored content generally cannot exceed the data collection supported by the distributed cloud system; if it exceeds the scope, separate approval in the Region is required.
  • the relationship between distributed cloud sites and NWD can be 1:N (N is a positive integer). Each distributed cloud site can pass N at the same time. One of the NWDs is connected to the Region.
  • the data to be sent may be the first data in the previous embodiment.
  • each piece of data to be sent may be signed, or each piece of data may not need to be signed, for example, a batch of data may be signed.
  • the distributed cloud site can also include the following modules:
  • the cloud edge management and control module is used to receive operating instructions from the cloud platform (or other devices) through the network module and complete relevant operations based on the operating instructions; and/or is used to send the generated management and control data to the NWD (or Send directly to the cloud platform).
  • Encryption component module which can be provided by the cloud service provider or built by the customer, is used to encrypt or decrypt the data transmitted by the network module.
  • Network module used to send and receive data.
  • Storage module used to store data.
  • NWD in the cloud data processing system, it can be deployed in the customer's IT system (or deployed independently outside the customer's IT system.
  • the separate deployment cloud site and NWD are co-deployed with the DC as an example).
  • the main functions include: defining/managing the data collection that can be sent, receiving data from the distributed cloud site and sending it to the audit system, and completing double authentication of data with the Region.
  • the components included in the NWD can perform the implementation process in Table 2 below.
  • the metadata may be the first available data pool in the previous embodiment, and the data supported by the distributed cloud system may be the second available data pool in the previous embodiment. .
  • the scope of the tailored content generally cannot exceed the data collection supported by the distributed cloud system; if it exceeds the scope, separate approval in the Region is required.
  • a standard control data processing module should be added to the existing public cloud management and control module in the Region to process standardized control data; a new control data pool management module should be added to the Region, with the main functions Including: at least one of data pool management, data dual authentication, data pool data query, and data pool index.
  • the components included in the Region can perform the implementation process in Table 3 below.
  • the metadata may be the first available data pool in the previous embodiment, and the data supported by the distributed cloud system may be the second available data pool in the previous embodiment. .
  • the scope of the tailored content generally cannot exceed the data collection supported by the distributed cloud system; if it exceeds the scope, separate approval in the Region is required.
  • each component can perform at least one of the following interactive processes.
  • the interaction between Region, NWD, and DC defines a standard interaction protocol, which is used to complete content interaction and authentication of the legally controlled data pool.
  • control data type, name, content
  • the control data (type, name, content) imported or configured on the NWD needs to be confirmed on the Region to ensure that no illegal data is sent from the NWD to the Region.
  • control data metadata unique control data name or name + content
  • efficient interaction process can also be achieved between NWD and Region through data indexing.
  • both distributed cloud sites and NWD belong to the customer's business system, and the interaction is completed through the customer's intranet.
  • the distributed cloud site obtains the legal control data pool from NWD and uses it to generate control data to be sent.
  • NWD can support bypass mode and directly forward the management and control data on the distributed cloud site to the public cloud on the premise of trusting the distributed cloud site management and control plane system (at the same time, real-time auditing can be performed).
  • NWD and audit system Specifically, the data on NWD is either data generated by NWD based on the control data pool, or standard data that can be identified by NWD. These data must be sent to the audit system for real-time and post-event auditing before being sent.
  • NWD and other customer safety components. Specifically, NWD can support only specific users to perform NWD settings through permission management, and can also connect with other permission management systems for SSO.
  • identity authentication can be performed between NWD and distributed cloud sites, and between NWD and cloud platforms.
  • the authentication mechanism adopts the traditional certificate mechanism. This part of the authentication process is a standard certificate authentication process.
  • Authentication, encryption and decryption are channel establishment processes and can be understood as the precursor to the foregoing embodiments.
  • the focus is on data interaction and authentication itself, while the interaction entity authentication and encrypted channel establishment can use standard processes and technologies in this field.
  • the implementation example shown in Figure 6 is an implementation example of the aforementioned "dual authentication" implementation.
  • the public cloud can also include a product data package publishing module, a product data package publishing module, a management and control data processing module, a public cloud management and control module in the public cloud, and a customer Internet data center (IDC).
  • the computer room includes NWD, cloud edge management and control module, and management and control data processing module, which can execute the implementation process shown in Figure 6.
  • 601.NWD requests the standard data pool from the product data package publishing module.
  • the product data package publishing module sends the standard data pool to NWD.
  • Cloud service users can customize the standard data pool and generate data signatures through NWDNWD to obtain the first available data pool.
  • control data processing module in the public cloud requests the standard data pool from the product data package publishing module.
  • the product data package publishing module sends the standard data pool to the control data processing module in the public cloud.
  • the management data processing module in the public cloud updates the local data pool and generates an index of available data (including categories and/or values).
  • NWD sends the first available data pool obtained in step S603 to the management and control data processing module in the public cloud.
  • control data processing module in the public cloud signs the first available data pool received in step 607 and updates the index.
  • the management and control data processing module in the public cloud sends the signed first available data pool in step S608 to the public cloud management and control module through internal interaction.
  • the public cloud management and control module performs local queue refresh after step 609 to confirm that the NWD has been processed based on the standard data pool to obtain the first available data pool.
  • the control data processing module in the public cloud sends the first available data pool containing the double signature and the updated index to the NWD.
  • NWD updates the local first available data pool obtained in step 603 based on the data received in step 610.
  • the cloud edge management and control module (timing or periodic) sends a synchronization request for the available data pool to the NWD.
  • NWD sends the first available data pool updated in step 611 to the cloud edge management and control module and the management and control data processing module in the customer IDC computer room respectively.
  • the control data processing module in the customer's IDC computer room records the updated first available data pool.
  • This source can be a standard data package released by the cloud platform manufacturer (that is, the cloud platform containing the product data package release module in Figure 6, It is used to represent the standard data source fields owned by its system issued from the cloud platform service provider during the initialization process.
  • the cloud platform and the dotted line box on the right in the figure need to obtain control data in the normal business process in order to manage the cloud software in the client computer room.
  • the management module is a module of the same cloud service provider. It is separated in Figure 6 to reflect that one module is responsible for publishing standard data sources, and the other module is responsible for managing the client computer room software after the user deploys the IDC computer room software and cloud platform services.
  • step 603 the customer cuts and customizes the published data package. Cutting can reduce the data content, and customization can modify some field contents.
  • the process shown in Figure 6 can ensure the transparency of interactions between cloud and edge and ensure that customers' local data residency can be proven.
  • customers are not required to tailor or customize data packages by default.
  • the implementation example shown in Figure 7 is an implementation example of the aforementioned "first data" sending and receiving process.
  • the customer IDC computer room includes a management and control data processing module, a cloud edge management and control module, NWD, and a customer audit system.
  • the public cloud includes a management and control data processing module and a public cloud management and control module. The implementation of each module is as shown in the following steps. .
  • NWD sends the interactive mode configuration information to the management and control data processing module in the customer's IDC computer room.
  • interaction modes in this embodiment include original data transmission mode, data index transmission mode, pass-through mode, non-pass-through mode, etc.
  • the 702.NWD sends the configuration information of the interactive mode to the public cloud management and control module in the public cloud.
  • the configuration information of the interaction mode can be set by the user of the cloud service.
  • control data processing module in the customer IDC computer room sets the data reporting mode based on the configuration information received in step 701.
  • the control data processing module in the customer IDC computer room generates data to be sent.
  • the data to be sent may be the first data in the previous embodiment.
  • the control data processing module in the customer IDC computer room processes the first data generated in step 704 based on the data reporting mode set in step 703, and obtains a data packet.
  • the management and control data processing module in the customer's IDC computer room sends the data packet obtained in step 705 to the cloud edge management and control module.
  • the cloud edge management and control module sends the data packet received in step 706 to the NWD.
  • NWD verifies the data packet received in step 707 according to the first available data pool.
  • NWD sends a data packet to the customer audit system.
  • step 708 the NWD sends a data packet to the management and control data processing module in the public cloud.
  • the management and control data processing module in the public cloud verifies the data packet received in step 710 based on the first available data pool.
  • step 711 If the verification in step 711 is passed, the management and control data processing module in the public cloud sends a data packet to the public cloud management and control module.
  • the public cloud management and control module stores and displays data packages.
  • customers can choose the interaction mode of sending data from distributed cloud sites to cloud platforms according to their own configuration, and at the same time use the audit system to prove the legality and compliance of the data sent.
  • customers use cloud services as This implementation process can improve the trust of cloud service users in the cloud services they use.
  • the update process can also be performed after the first available data pool is determined above.
  • the customer IDC computer room includes the cloud edge management and control module and NWD
  • the public cloud includes the management and control data processing module and the public cloud management and control module.
  • the implementation of each module is as shown in the following steps.
  • the public cloud management and control module sends an upgrade data packet to the NWD.
  • the upgrade data packet includes update information for the first available data pool.
  • the user of the cloud service can verify the upgrade data package through NWD.
  • step 802 If the verification in step 802 is passed, the NWD sends an upgrade data package to the cloud edge management and control module.
  • the cloud edge management and control module manages and controls local data based on the upgrade data package.
  • the data delivered by the management and control plane are generally upgrade packages and system configuration adjustment commands, and do not involve changes in the resident status of customer data during the customer delivery process. Therefore, efficiency is taken into account In this case, it is not necessary to deconstruct and ID all data to improve the efficiency of data interaction.
  • the quantitative relationship between distributed cloud sites and NWDs can be 1 to 1, or many to 1.
  • the following will be done through the example shown in Figure 9. The implementation process of the latter is described as an example.
  • the implementation example shown in Figure 9 is an implementation process of interaction between N (N is an integer greater than or equal to 2) cloud sites and the same NWD, that is, one NWD can be maintained and shared by multiple cloud sites.
  • the customer IDC computer room includes management data processing module 1, cloud edge management and control module 1, management data processing module N, cloud edge management and control module N, NWD, and the public cloud includes management and control data processing modules.
  • Each module Implementation is shown in the following steps.
  • NWD sends a docking authentication request message to the management and control data processing module of the public cloud.
  • the docking authentication request message in this embodiment may include the NWD certificate, user account information, etc.
  • the management and control data processing module of the public cloud authenticates the docking authentication request message received in step 901.
  • the management and control data processing module of the public cloud feeds back the certification results to NWD.
  • the authentication result in step 903 is authentication passed as an example for description.
  • NWD sends a request for the data pool to the managed data processing module of the public cloud.
  • the management and control data processing module of the public cloud authenticates the request for the data pool received in step 904.
  • step 906 If the authentication is passed in step 905, the management and control data processing module of the public cloud sends the first available data pool containing the double signature to the NWD.
  • the cloud edge management and control module 1 sends a docking authentication request message to the NWD.
  • the authentication result in step 909 is authentication passed as an example for description.
  • Cloud edge management and control module 1 sends a request for the data pool to NWD.
  • NWD sends the first available data pool received in step 906 to the cloud edge management and control module 1, so that the cloud edge management and control module 1 forwards the first available data pool to the management and control data processing module 1.
  • the management data processing module 1 updates the local data pool based on the first available data pool received in step 911.
  • Cloud edge management and control module N sends a docking authentication request message to NWD.
  • NWD sends the authentication result to the cloud edge management and control module N.
  • the authentication result in step 915 is authentication passed as an example for description.
  • Cloud edge management and control module N sends a request for the data pool to NWD.
  • NWD sends the first available data pool received in step 906 to the cloud edge management and control module N, so that the cloud edge management and control module N forwards the first available data pool to the management and control data processing module N.
  • the management data processing module N updates the local data pool based on the first available data pool received in step 917.
  • N cloud sites can configure the same NWD, so that one NWD can be maintained and shared by multiple cloud sites, saving NWD configuration and reducing the complexity of solution implementation.
  • the quantitative relationship between NWD and public cloud can be 1 to 1, or many to 1. The latter will be discussed below through the example shown in Figure 10
  • the implementation process is described as an example.
  • the implementation example shown in Figure 10 is an implementation process for the interaction between N (N is an integer greater than or equal to 2) NWDs and the public cloud. That is, the public cloud can configure N NWDs in a cloud site.
  • the customer IDC computer room includes NWD1, customer audit system 1, NWD N, and customer audit system N.
  • the public cloud includes a management and control data processing module and a public cloud management and control module. The implementation of each module is as shown in the following steps. .
  • NWD N sends a docking authentication request message to the management and control data processing module of the public cloud.
  • the docking authentication request message in this embodiment may include the NWD certificate, user account information, etc.
  • the management and control data processing module of the public cloud authenticates the docking authentication request message received in step 1001.
  • the management and control data processing module of the public cloud feeds back the certification results to NWD N.
  • the authentication result in step 1003 is authentication passed as an example for explanation.
  • NWD N sends the locally signed available data pool to the management and control data processing module of the public cloud.
  • the management and control data processing module of the public cloud authenticates the available data pool received in step 1004.
  • the management and control data processing module of the public cloud sends an available data pool containing dual signatures to the NWD N (for example, the available data pool containing dual signatures can be the first one in the previous embodiment). an available data pool).
  • the management and control data processing module of the public cloud sends the available data pool containing dual signatures to the public cloud management and control module.
  • the public cloud management and control module performs local queue refresh after step 1007 to confirm that the NWD N has used the available data pool containing dual signatures.
  • NWD 1 sends a docking authentication request message to the management and control data processing module of the public cloud.
  • the management and control data processing module of the public cloud authenticates the docking authentication request message received in step 1008.
  • the management and control data processing module of the public cloud feeds back the certification results to NWD 1.
  • the authentication result in step 1009 is authentication passed as an example for explanation.
  • NWD 1 sends the locally signed available data pool to the managed data processing module of the public cloud.
  • the management and control data processing module of the public cloud authenticates the available data pool received in step 1004.
  • the management data processing module of the public cloud merges the indexes of available data (including data categories and/or data values) contained in the available data pools of multiple NWDs.
  • the management and control data processing module of the public cloud sends an available data pool containing dual signatures to NWD 1 (for example, the available data pool containing dual signatures can be the first one in the previous embodiment). an available data pool).
  • the management and control data processing module of the public cloud sends the available data pool containing dual signatures to the public cloud management and control module.
  • the public cloud management and control module performs local queue refresh after step 1015 to confirm that the NWD N has used the available data pool containing dual signatures.
  • multiple NWDs can be configured in the same customer IDC computer room so that the available data in the same cloud site can be maintained through multiple NWDs to facilitate flexible deployment of the solution.
  • the management and control module includes a receiving unit 1101, a processing unit 1102 and a sending unit 1103.
  • the receiving unit 1101 is used to receive the first data from the cloud site, and the management and control module is used to control the data sent by the cloud site to the cloud platform;
  • the processing unit 1102 is used to process the first data based on the first available data pool. Verification is performed, wherein the first available data pool is a data pool determined based on the configuration information of the user of the cloud service provided by the cloud site;
  • the sending unit 1103 is configured to determine in the processing unit 1102 that the first data passes through the third When verifying an available data pool, send the first data to the cloud platform.
  • the first data pool includes N groups of data, each group of data in the N groups of data includes category information of available data and value information of available data, N is a positive integer;
  • the receiving Unit 1101 is also configured to receive a second available data pool from the cloud platform.
  • the second available data pool includes M sets of data. Each set of data in the M sets of data includes category information of the available data and access to the available data. Value information, M is a positive integer greater than or equal to N;
  • the processing unit 1102 is also used to determine the first available data pool in the M group of data based on the configuration information; the sending unit 1103. It is also used to send first information to the cloud platform, where the first information includes the first available data pool and the signature information of the management and control module for the first available data pool.
  • the sending unit 1103 is also configured to send first information to the cloud platform, where the first information includes the first available data pool and the signature of the management and control module on the first available data pool.
  • Information; the receiving unit 1101 is also configured to receive second information from the cloud platform, where the second information includes the first available data pool and the cloud platform's signature information for the first available data pool, or, the third The second information includes the first available data pool and the cloud platform's signature information for the first information.
  • the configuration information includes at least one of an instruction to delete available data and an instruction to modify available data.
  • the sending unit 1103 is also used to send the first data to the audit system.
  • the cloud platform includes a receiving unit 1201 and a processing unit 1202.
  • the receiving unit 1201 is used to receive the first data from the management and control module; the processing unit is used to verify the first data based on the first available data pool, wherein the first available data pool is based on the data provided by the cloud site.
  • a data pool determined by the configuration information of the user of the cloud service; the processing unit 1202 is also configured to store the first data when it is determined that the first data passes the verification of the first available data pool.
  • the cloud platform also includes a sending unit 1203, which is used to send a second available data pool to the management and control module.
  • the second available data pool includes M sets of data, and the M sets of data include Each set of data includes category information of available data and value information of available data.
  • M is a positive integer greater than or equal to N.
  • the cloud site includes a receiving unit 1301, a processing unit 1302 and a sending unit 1303.
  • the receiving unit 1301 is configured to receive first information from the management and control module.
  • the first information includes a first available data pool.
  • the first available data pool is data determined based on the configuration information of the user of the cloud service provided by the cloud site. pool;
  • the processing unit 1302 is used to generate the first data based on the first available data pool;
  • the sending unit 1303 is used to send the first data to the management and control module.
  • FIG 14 is another schematic structural diagram of the management and control module provided by the embodiment of the present application.
  • an embodiment of the management and control module may include one or more processors 1401, memory 1402, input and output interfaces 1403, wired or wireless network interfaces 1404, and power supply 1405.
  • Memory 1402 may be ephemeral storage or persistent storage. Furthermore, the processor 1401 can be configured to communicate with the memory 1402 and execute a series of instruction operations in the memory 1402 on the management module.
  • the processor 1401 can perform the operations performed by the management and control module in any of the foregoing embodiments, and the details will not be described again here.
  • the specific functional module division in the processor 1401 may be similar to the division of the receiving unit, processing unit, sending unit and other units described in FIG. 7 , and will not be described again here.
  • FIG 15 is another schematic structural diagram of a cloud platform provided by an embodiment of the present application.
  • one embodiment of the cloud platform may include one or more processors 1501, memory 1502, input and output interfaces 1503, wired or wireless network interfaces 1504, and power supply 1505.
  • Memory 1502 may be ephemeral storage or persistent storage. Furthermore, the processor 1501 may be configured to communicate with the memory 1502 and execute a series of instruction operations in the memory 1502 on the cloud platform.
  • the processor 1501 can perform the operations performed by the cloud platform in any of the foregoing embodiments, and the details will not be described again here.
  • the specific functional module division in the processor 1501 may be similar to the division of the receiving unit, processing unit, sending unit and other units described in FIG. 7 , and will not be described again here.
  • FIG 16 is another schematic structural diagram of a cloud site provided by an embodiment of the present application.
  • an embodiment of the cloud site may include one or more processors 1601, memory 1602, input and output interfaces 1603, wired or wireless network interfaces 1604, and power supply 1605.
  • Memory 1602 may be ephemeral storage or persistent storage. Furthermore, the processor 1601 may be configured to communicate with the memory 1602 and execute a series of instruction operations in the memory 1602 on the cloud site.
  • the processor 1601 can perform the operations performed by the cloud site in any of the foregoing embodiments, and details will not be described again here.
  • the specific functional module division in the processor 1601 may be similar to the division of the receiving unit, processing unit, sending unit and other units described in FIG. 7 , and will not be described again here.
  • Embodiments of the present application also relate to a computer storage medium that includes computer-readable instructions.
  • the computer When the computer-readable instructions are executed, the computer is enabled to implement the steps performed by the management and control module in any of the foregoing embodiments, or the computer is enabled to implement the steps.
  • the steps executed by the cloud platform in any of the foregoing embodiments, or the steps executed by the cloud site in any of the foregoing embodiments are caused by the computer.
  • Embodiments of the present application also relate to a computer program product containing instructions that, when run on a computer, enable the computer to implement the steps performed by the management and control module in any of the foregoing embodiments, or enable the computer to implement the steps of any of the foregoing embodiments.
  • the steps executed by the cloud platform, or the steps executed by the cloud site in any of the foregoing embodiments are caused by the computer.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the above integrated units can be implemented in the form of hardware or software functional units.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本申请提供了一种云数据处理系统、方法及相关设备,用于使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。该云数据处理系统包括云站点,云平台和管控模块;该云站点用于向管控模块发送该第一数据,该管控模块用于基于第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证时,向该云平台发送该第一数据;其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;该云平台用于在接收来自该管控模块的第一数据之后,该云平台存储该第一数据。

Description

一种云数据处理系统、方法及相关设备
本申请要求于2022年06月07日提交中国国家知识产权局,申请号为202210637384.2,发明名称为“管控数据双重认证的系统”的中国专利申请的优先权,并要求于2022年10月27日提交中国国家知识产权局,申请号为202211330225.4,发明名称为“一种云数据处理系统、方法及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及云技术领域,尤其涉及一种云数据处理系统、方法及相关设备。
背景技术
云技术的提供商可以将云服务(通常包括必要的硬件和/或软件)部署到不同的物理位置,这种方式可以称为基于云站点(或分布式云,分布式云站点等)实现的云服务。
目前,云服务的使用方可以通过接入与该使用方的地理位置相近(或与该使用方共位置部署)的云站点,以期获得具备低时延优势的云服务。并且,在基于云站点实现的云服务中,云服务的使用方将会在该云站点中产生该使用方的本地数据。
此外,在基于云站点实现的云服务中,该云服务对应的硬件和/或软件的运维管控仍然由云技术的提供商负责,换言之,云服务对应的硬件和软件的运维数据(或称管控数据,运维管控数据等)需要上报给云平台(或称公有云),以便于该云技术的提供商在云平台上获知云站点的运维数据。
然而,由于云服务的使用方在云站点中产生的本地数据很有可能涉及该使用方的业务信息(或者用户信息、用户数据等),导致该使用方并不期望该本地数据被该云站点之外的其它设备获知。为此,在云站点向云平台上报运维数据的过程中,如何使得云站点向云平台发送的运维数据符合该使用方的要求,是一个亟待解决的技术问题。
发明内容
本申请提供了一种云数据处理系统、方法及相关设备,用于使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
本申请第一方面提供了一种云数据处理系统,包括云站点,云平台和管控模块,该管控模块用于对该云站点向该云平台发送的数据进行管控。
该云站点在提供云服务的过程中,将会生成需要向云平台上报的第一数据,并且,该云站点向管控模块发送该第一数据。
该管控模块在接收来自云站点的需要向云平台上报的第一数据之后,该管控模块基于第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证时,向该云平台发送该第一数据;其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。
该云平台在接收来自该管控模块的第一数据之后,该云平台存储该第一数据。
基于上述技术方案,在云数据处理系统中的云站点提供云服务的过程中,云站点向云平台发送的第一数据需要经过该管控模块的验证,即该管控模块基于第一可用数据池进行验证,并在该第一数据验证通过的情况下,该管控模块向云平台发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
应理解,该云站点可以包括一个或多个服务器(或虚拟机、容器等),该管控模块可以设置于该一个或多个服务器(或虚拟机、容器等)中,或者,该管控模块也可以独立设置于该一个或多个服务器(或虚拟机、容器等)之外的其他设备,本申请对此不做限定。此外,该管控模块用于对该云站点向该云平台发送的数据进行管控的模块,该管控模块还可以使用其它的名称,例如用于提供管控服务的服务器(或虚拟机、容器等)、管控服务器(或管控虚拟机、管控容器等),看门狗(network watch dog,NWD),或者是其他的名称,本申请仅以该名称为管控模块为例进行说明。
在第一方面的一种可能的实现方式中,该管控模块,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该云平台,还用于向该管控模块发送第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息;该云平台,还用于基于该第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证之后,存储该第一数据。
基于上述技术方案,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在第一方面的一种可能的实现方式中,该管控模块,还用于向该云站点发送该第一信息;该云站点,还用于基于该第一可用数据池生成该第一数据。
基于上述技术方案,该管控模块还可以向云站点发送包含有该第一可用数据池以及该管控模块对该第一可用数据池的签名信息的第一信息,以便于该云站点基于经过管控模块的认证的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
在第一方面的一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该管控模块,还用于获取包含有M组数据的第二可用数据池,并基于该配置信息在该M组数据确定该第 一可用数据池;其中,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数。
基于上述技术方案,管控模块可以基于该云站点提供的云服务的使用方的配置信息在包含有M组数据的第二可用数据池确定包含有N组数据的第一可用数据池,其中,M为大于或等于N的正整数。从而,支持云服务的使用方基于该配置信息对管控模块中用于执行数据验证的第一可用数据池的定制,以确保后续管控模块向云平台发送的数据符合该定制的要求。
可选地,管控模块获取的第二可用数据池来自于云平台,或者,管控模块获取的第二可用数据池为管理人员在该管控模块写入的数据,或者是管控模块通过其他方式获取该第二可用数据池,此处不做限定。
可以理解的是,该可用数据的类别信息包括该可用数据的类别名称,或,该可用数据的类别信息包括该可用数据的类别名称对应的索引。类似地,该可用数据的取值信息可以包括该可用数据的取值范围,或该可用数据的取值信息包括该可用数据的取值范围对应的索引。
在第一方面的一种可能的实现方式中,该第一可用数据池还包括该N组数据中每一组数据对应的签名信息,该签名信息包括该管控模块对该每一组数据的签名信息和/或该云平台对该每一组数据的签名信息;该管控模块,还用于在数据发送模式为非直通模式时,在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持非直通模式,其中,在非直通模块下,该管控模块可以在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息,以便于该云平台基于该第一可用数据池中的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性。
在第一方面的一种可能的实现方式中,该管控模块,还用于在数据发送模式为直通模式时,向该云平台发送该管控模块对该第一数据的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持直通模式,其中,在直通模块下,该管控模块可以向该云平台发送该管控模块对该第一数据的签名信息,以便于该云平台基于该管控模块的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性的同时,可以简化管控模块和云平台的操作。
可以理解的是,非直通模式对数据安全性的要求高于直通模式对数据安全性的要求。其中,非直通模式也可以通过其它描述替换,例如,高安全性模式,信任模式,加强验证模式等;类似地,直通模式也可以通过其它描述替换,例如,低安全性模式,非信任模式等。
在第一方面的一种可能的实现方式中,该第一可用数据池还包括发送策略,该发送策略包括发送时间和/或发送顺序;该管控模块,还用于基于该发送策略向云平台发送该第一数据。
基于上述技术方案,基于该云站点提供的云服务的使用方的配置信息确定的第一可用 数据池开可以包括发送策略,以便于管控模块能够基于该使用方配置的发送策略向云平台发送第一数据,以期进一步提升云服务的使用方对云服务的信任度。
在第一方面的一种可能的实现方式中,该系统还包括审计系统;该管控模块,还用于向审计系统发送该第一数据,使得该审计系统对该第一数据进行审计。
基于上述技术方案,管控模块还可以向审计系统发送该第一数据,使得该云服务的使用方可以基于该审计系统对该管控模块向云平台发送的第一数据进行审计(包括实施审计或事后审计等),以期进一步提升云服务的使用方对云服务的信任度。
本申请第二方面提供了一种基于管控模块的云数据处理方法,该方法由管控模块执行,或者,该方法由管控模块中的部分组件(例如处理器、芯片或芯片系统等)执行,或者,该方法由能实现全部或部分管控模块功能的逻辑模块或软件实现。在第二方面及其可能的实现方式中,以该方法由管控模块执行为例进行描述,其中,管控模块可以为服务器,虚拟机,容器等设备。在该方法中,该管控模块接收来自云站点的第一数据,该管控模块用于对该云站点向云平台发送的数据进行管控;该管控模块基于第一可用数据池对该第一数据进行验证,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;在确定该第一数据通过该第一可用数据池的验证时,该管控模块向该云平台发送该第一数据。
基于上述技术方案,管控模块在云数据处理系统中用于对云站点向云平台发送的数据进行管控,该管控设备在接收来自云站点的第一数据之后,该管控设备基于第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证时,该管控模块向该云平台发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
应理解,该云站点可以包括一个或多个服务器(或虚拟机、容器等),该管控模块可以设置于该一个或多个服务器(或虚拟机、容器等)中,或者,该管控模块也可以独立设置于该一个或多个服务器(或虚拟机、容器等)之外的其他设备,本申请对此不做限定。此外,该管控模块用于对该云站点向该云平台发送的数据进行管控的模块,该管控模块还可以使用其它的名称,例如用于提供管控服务的服务器(或虚拟机、容器等)、管控服务器(或管控虚拟机、管控容器等),看门狗(network watch dog,NWD),或者是其他的名称,本申请仅以该名称为管控模块为例进行说明。
在第二方面的一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;在该管控模块基于第一可用数据池对该第一数据进行验证之前,该方法还包括:该管控模块接收来自该云平台的第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;该管控模块基于该配置信息在该M组数据确定该第一可用数据池。
基于上述技术方案,管控模块可以基于该云站点提供的云服务的使用方的配置信息在 包含有M组数据的第二可用数据池确定包含有N组数据的第一可用数据池,其中,M为大于或等于N的正整数。从而,支持云服务的使用方基于该配置信息对管控模块中用于执行数据验证的第一可用数据池的定制,以确保后续管控模块向云平台发送的数据符合该定制的要求。
在第二方面的一种可能的实现方式中,该配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。
基于上述技术方案,在管控模块获取的第二可用数据池来自于云平台的实现方式中,云服务的使用方可以通过删减、修改等定制化操作,以确保后续管控模块向云平台发送的数据符合该定制化操作的要求。
可选地,管控模块获取的第二可用数据池除了上述描述的来自于云平台之外,管控模块获取的第二可用数据池也可以为管理人员在该管控模块写入的数据,或者是管控模块通过其他方式获取该第二可用数据池,此处不做限定。
可以理解的是,该可用数据的类别信息包括该可用数据的类别名称,或,该可用数据的类别信息包括该可用数据的类别名称对应的索引。类似地,该可用数据的取值信息可以包括该可用数据的取值范围,或该可用数据的取值信息包括该可用数据的取值范围对应的索引。
在第二方面的一种可能的实现方式中,该方法还包括:该管控模块向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该管控模块接收来自该云平台的第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息。
基于上述技术方案,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台后续可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在第二方面的一种可能的实现方式中,该方法还包括:该管控模块向云站点发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息。
基于上述技术方案,该管控模块还可以向云站点发送包含有该第一可用数据池以及该管控模块对该第一可用数据池的签名信息的第一信息,以便于该云站点基于经过管控模块的认证的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
在第二方面的一种可能的实现方式中,在确定该第一数据通过该第一可用数据池的验证时,该方法还包括:该管控模块向审计系统发送该第一数据。
基于上述技术方案,管控模块还可以向审计系统发送该第一数据,使得该云服务的使 用方可以基于该审计系统对该管控模块向云平台发送的第一数据进行审计(包括实施审计或事后审计等),以期进一步提升云服务的使用方对云服务的信任度。
在第二方面的一种可能的实现方式中,该第一可用数据池还包括该发送策略,该发送策略包括发送时间和/或发送顺序;该管控模块向云平台发送该第一数据包括:该管控模块基于该发送策略向云平台发送该第一数据。
基于上述技术方案,基于该云站点提供的云服务的使用方的配置信息确定的第一可用数据池开可以包括发送策略,以便于管控模块能够基于该使用方配置的发送策略向云平台发送第一数据,以期进一步提升云服务的使用方对云服务的信任度。
在第二方面的一种可能的实现方式中,该第一可用数据池还包括该N组数据中每一组数据对应的签名信息,该签名信息包括该管控模块对该每一组数据的签名信息和/或该云平台对该每一组数据的签名信息;在确定该第一数据通过该第一可用数据池的验证时,该方法还包括:在数据发送模式为非直通模式时,该管控模块基于该第一可用数据池确定该第一数据对应的签名信息;该管控模块向该云平台发送该第一数据对应的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持非直通模式,其中,在非直通模块下,该管控模块可以在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息,以便于该云平台基于该第一可用数据池中的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性。
在第二方面的一种可能的实现方式中,在确定该第一数据通过该第一可用数据池的验证时,该方法还包括:在数据发送模式为直通模式时,该管控模块向该云平台发送该管控模块对该第一数据的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持直通模式,其中,在直通模块下,该管控模块可以向该云平台发送该管控模块对该第一数据的签名信息,以便于该云平台基于该管控模块的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性的同时,可以简化管控模块和云平台的操作。
可以理解的是,非直通模式对数据安全性的要求高于直通模式对数据安全性的要求。其中,非直通模式也可以通过其它描述替换,例如,高安全性模式,信任模式,加强验证模式等;类似地,直通模式也可以通过其它描述替换,例如,低安全性模式,非信任模式等。
本申请第三方面提供了一种基于云平台的云数据处理方法,该方法由云平台执行,或者,该方法由云平台中的部分组件(例如处理器、芯片或芯片系统等)执行,或者,该方法由能实现全部或部分云平台功能的逻辑模块或软件实现。在第三方面及其可能的实现方式中,以该方法由云平台执行为例进行描述。在该方法中,该云平台接收来自管控模块的第一数据;该云平台基于第一可用数据池对该第一数据进行校验,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;在确定该第一数据通过该第一可用数据池的验证时,该云平台存储该第一数据。
基于上述技术方案,管控模块在云数据处理系统中用于对云站点向云平台发送的数据进行管控,云平台接收来自管控设备的第一数据之后,该云平台基于第一可用数据池对该 第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证时,该云平台存储该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,云平台所存储的第一数据为经过该云平台验证通过的数据,使得云平台所存储的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。并且,云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在第三方面的一种可能的实现方式中,在该云平台基于第一可用数据池对该第一数据进行校验之前,该方法还包括:该云平台接收来自该管控模块的第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该云平台向该管控模块发送第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息。
基于上述技术方案,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台后续可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在第三方面的一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该方法还包括:该云平台向该管控模块发送第二可用数据池,使得该管控模块基于该第二可用数据池确定该第一可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为正整数。
基于上述技术方案,云平台可以向管控设备发送第二可用数据池,使得管控模块可以基于该云站点提供的云服务的使用方的配置信息在包含有M组数据的第二可用数据池确定包含有N组数据的第一可用数据池,其中,M为大于或等于N的正整数。从而,支持云服务的使用方基于该配置信息对管控模块中用于执行数据验证的第一可用数据池的定制,以确保后续管控模块向云平台发送的数据符合该定制的要求。
在第三方面的一种可能的实现方式中,该第一可用数据池还包括该N组数据中每一组数据对应的签名信息,该签名信息包括该管控模块对该每一组数据的签名信息和/或该云平台对该每一组数据的签名信息;在数据发送模式为非直通模式时,该方法还包括:该云平台接收来自该管控模块的该第一数据对应的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持非直通模式,其中,在非直通模块下,该管控模块可以在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息,以便于该云平台基于该第一可用数据池中的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性。
在第三方面的一种可能的实现方式中,在数据发送模式为直通模式时,该方法还包括:该云平台接收来自该管控模块的该管控模块对该第一数据的签名信息。
基于上述技术方案,管控模块向云平台发送数据的数据发送单元可以支持直通模式,其中,在直通模块下,该管控模块可以向该云平台发送该管控模块对该第一数据的签名信息,以便于该云平台基于该管控模块的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性的同时,可以简化管控模块和云平台的操作。
可以理解的是,非直通模式对数据安全性的要求高于直通模式对数据安全性的要求。其中,非直通模式也可以通过其它描述替换,例如,高安全性模式,信任模式,加强验证模式等;类似地,直通模式也可以通过其它描述替换,例如,低安全性模式,非信任模式等。
本申请第四方面提供了一种基于云站点的云数据处理方法,该方法由云站点执行,或者,该方法由云站点中的部分组件(例如处理器、芯片或芯片系统等)执行,或者,该方法由能实现全部或部分云站点功能的逻辑模块或软件实现。在第四方面及其可能的实现方式中,以该方法由云站点执行为例进行描述。在该方法中,该云站点接收来自管控模块的第一信息,该第一信息包括第一可用数据池,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;该云站点基于该第一可用数据池生成第一数据;该云站点向管控模块发送该第一数据。
基于上述技术方案,云站点接收来自管控模块的第一可用数据池,并基于该第一可用数据池生成第一数据之后,该云站点向该管控模块发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。并且,云站点基于经过管控模块所指示的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据。
在第四方面的一种可能的实现方式中,该第一信息包括云平台对该第一可用数据池的签名信息,和/或,该第一信息包括该管控模块对该第一可用数据池的签名信息。
基于上述技术方案,云站点所接收的第一信息还可以云平台对该第一可用数据池的签名信息,和/或,该第一信息包括该管控模块对该第一可用数据池的签名信息,以便于该云站点基于经过管控模块认证和/或云平台认证的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
本申请第五方面提供了一种管控模块,包括:接收单元,用于接收来自云站点的第一数据,该管控模块用于对该云站点向云平台发送的数据进行管控;处理单元,用于基于第一可用数据池对该第一数据进行验证,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;发送单元,用于在该处理单元确定该第一数据通过该第一可用数据池的验证时,向该云平台发送该第一数据。
在第五方面的一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该接收单元, 还用于接收来自该云平台的第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;该处理单元,还用于基于该配置信息在该M组数据确定该第一可用数据池;该发送单元,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息。
在第五方面的一种可能的实现方式中,该发送单元,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该接收单元,还用于接收来自该云平台的第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息。
在第五方面的一种可能的实现方式中,该配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。
在第五方面的一种可能的实现方式中,该发送单元,还用于向审计系统发送该第一数据。
本申请实施例第五方面中,管控模块的组成模块还可以用于执行第二方面的各个可能实现方式中所执行的步骤,并实现相应的技术效果,具体均可以参阅第二方面,此处不再赘述。
本申请第六方面提供了一种云平台,包括:接收单元,用于接收来自管控模块的第一数据;处理单元,用于基于第一可用数据池对该第一数据进行校验,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;该处理单元,还用于在确定该第一数据通过该第一可用数据池的验证时,存储该第一数据。
在第六方面的一种可能的实现方式中,该云平台还包括发送单元,该发送单元用于向管控模块发送第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数。
本申请实施例第六方面中,云平台的组成模块还可以用于执行第三方面的各个可能实现方式中所执行的步骤,并实现相应的技术效果,具体均可以参阅第三方面,此处不再赘述。
本申请第七方面提供了一种云站点,包括:接收单元,用于接收来自管控模块的第一信息,该第一信息包括第一可用数据池,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;处理单元,用于基于该第一可用数据池生成第一数据;发送单元,用于向管控模块发送该第一数据。
本申请实施例第七方面中,云站点的组成模块还可以用于执行第四方面的各个可能实现方式中所执行的步骤,并实现相应的技术效果,具体均可以参阅第四方面,此处不再赘述。
本申请第八方面提供了一种管控模块,该管控模块包括存储器和处理器;该存储器存储有代码,该处理器被配置为执行该代码,当该代码被执行时,该管控模块执行如第二方面及其可能的实现方式中的方法。
本申请第九方面提供了一种云平台,该云平台包括存储器和处理器;该存储器存储有代码,该处理器被配置为执行该代码,当该代码被执行时,该云平台执行如第三方面及其可能的实现方式中的方法。
本申请第十方面提供了一种云站点,其特征在于,该云平台包括存储器和处理器;该存储器存储有代码,该处理器被配置为执行该代码,当该代码被执行时,该云站点执行如第三方面及其可能的实现方式中的方法。
本申请第十一方面提供了一种计算机存储介质,计算机存储介质存储有计算机程序,该程序由计算机执行时,使得计算机实施如第二方面或第二方面中任意一种可能的实现方式所述的方法,或,使得计算机实施如第三方面或第三方面中任意一种可能的实现方式所述的方法,或,使得计算机实施如第四方面或第四方面中任意一种可能的实现方式所述的方法。
本申请第十二方面提供了一种计算机程序产品,计算机程序产品存储有指令,所述指令在由计算机执行时,使得计算机实施如第二方面或第二方面中任意一种可能的实现方式所述的方法,或,使得计算机实施如第三方面或第三方面中任意一种可能的实现方式所述的方法,或,使得计算机实施如第四方面或第四方面中任意一种可能的实现方式所述的方法。
从以上技术方案可以看出,在云站点提供云服务的过程中,云站点向云平台发送的第一数据需要经过该管控模块的验证,即该管控模块基于第一可用数据池进行验证,并在该第一数据验证通过的情况下,该管控模块向云平台发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
在一些实现方式中,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
附图说明
图1a为本申请涉及的云数据处理系统的一个示意图;
图1b为本申请涉及的云数据处理的一个示意图;
图2为本申请提供的云数据处理系统的一个示意图;
图3为本申请提供的云数据处理系统的另一个示意图;
图4为本申请提供的云数据处理方法的一个示意图;
图5为本申请提供的云数据交互的一个示意图;
图6为本申请提供的云数据处理方法的另一个示意图;
图7为本申请提供的云数据处理方法的另一个示意图;
图8为本申请提供的云数据处理方法的另一个示意图;
图9为本申请提供的云数据处理方法的另一个示意图;
图10为本申请提供的云数据处理方法的另一个示意图;
图11为本申请提供的管控模块的一个示意图;
图12为本申请提供的云平台的一个示意图;
图13为本申请提供的云站点的一个示意图;
图14为本申请提供的管控模块的另一个示意图;
图15为本申请提供的云平台的另一个示意图;
图16为本申请提供的云站点的另一个示意图。
具体实施方式
本申请中,除特殊说明外,各个实施例之间相同或相似的部分可以互相参考。在本申请中各个实施例、以及各实施例中的各个实施方式/实施方法/实现方法中,如果没有特殊说明以及逻辑冲突,不同的实施例之间、以及各实施例中的各个实施方式/实施方法/实现方法之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例、以及各实施例中的各个实施方式/实施方法/实现方法中的技术特征根据其内在的逻辑关系可以组合形成新的实施例、实施方式、实施方法、或实现方法。以下该的本申请实施方式并不构成对本申请保护范围的限定。
可以理解,本申请实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,比如其当前所基于的方案,而独立实施,解决相应的技术问题,达到相应的效果,也可以在某些场景下,依据需求与其他特征进行结合。相应的,本申请实施例中给出的装置也可以相应的实现这些特征或功能,在此不予赘述。
在本申请的描述中,除非另有说明,"多个"是指两个或多于两个。"以下至少一项(个)"或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了"第一"、"第二"等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解"第一"、"第二"等字样并不对数量和执行次序进行限定,并且"第一"、"第二"等字样也并不限定一定不同。同时,在本申请实施例中,"示例性的"或者"例如"等词用于表示作例子、例证或说明。本申请实施例中被描述为"示例性的"或者"例如"的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用"示例性的"或者"例如"等词旨在以具体方式呈现相关概念,便于理解。
为便于理解本申请实施例提供的方法,下面将对本申请实施例提供的方法的系统架构进行说明。可理解的,本申请实施例描述的系统架构是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定。
云技术的提供商可以将云服务(通常包括必要的硬件和/或软件)部署到不同的物理位置,这种方式可以称为基于云站点(或分布式云,分布式云站点等)实现的云服务。
目前,云服务的使用方可以通过接入与该使用方的地理位置相近(或与该使用方共位置部署)的云站点,以期获得具备低时延优势的云服务。并且,在基于云站点实现的云服务中,云服务的使用方将会在该云站点中产生该使用方的本地数据。
此外,在基于云站点实现的云服务中,该云服务对应的硬件和/或软件的运维管控仍然由云技术的提供商负责,换言之,云服务对应的硬件和软件的运维数据(或称管控数据,运维管控数据等)需要上报给云平台(或称公有云),以便于该云技术的提供商在云平台上获知云站点的运维数据。如图1a所示,云站点在提供云服务的过程中,将会通过网络将该云站点产生的运维数据向云平台上报,以便于该云平台基于所获取的运维数据实现对云站点的管理。
在云化演进的过程中,云服务的使用方有可能存在部分应用不能直接放到云平台上运行而需要在云站点中运行,这部分应用包括但不限于:
1.云服务的使用方部署的与工业系统对接的应用,延迟要求很低(例如该延迟要求低于10毫秒或以下);
2.有法律或者法规要求数据不能离开本地网络要求本地数据驻留;
3.云服务的使用方部署的和本地互联网技术(internet technology,IT)系统交互频繁,导致通过云端实现的访问效率很低;
4.云服务的使用方部署的各个分支机构距离很远,需要统一管控,但又因效率问题无法统一上云。
在上述需要需要在云站点运行的应用中,将会产生需要在云站点驻留的本地业务数据,若这部分本地业务数据数据涉及该使用方的业务信息(或者用户信息、用户数据等),导致该使用方并不期望该本地业务数据被该云站点之外的其它设备获知。换言之,云服务的使用方不希望将该部分本地业务数据上传至云平台。
为此,如何确保云服务的使用方的本地业务数据不会被作为运维数据向云平台上报,是一个亟待解决的问题。其中,该问题主要包括如何保证数据不会在运行期和维修期离开本地,下面将分别介绍。
运行期,即混合云的场景下,正常运行过程中,用户数据中心有应用,同时有一部分部署在共有云上。在运行期间,由于公有云要收集一些运行监控数据,该问题具体表现为如何保证收集过程中不会把用户不能上公有云的数据发给公有云。
维修期,即远程进行本地数据中心维修,对于维修期来说,可以通过数据加密和秘钥本地存储来解决,对于运行期来说,该问题具体表现为因本地的分布式云需要持续的运维,也需要持续的把系统的监控数据上报给云平台。
然而,由于云服务的使用方在云站点中产生的本地数据很有可能涉及该使用方的业务信息(或者用户信息、用户数据等),导致该使用方并不期望该本地数据被该云站点之外的其它设备获知。为此,在云站点向云平台上报运维数据的过程中,如何使得云站点向云平台发送的运维数据符合该使用方的要求,是一个亟待解决的技术问题。
一种可能的实现方式中,为了提升云服务的使用方对云服务的信任度,可以在云站点中增加审计系统,该审计系统用于对云站点向云平台发送的数据进行事后审计。示例性的,该审计系统的实现可以如图1b所示。
在图1b中,云站点可以包括内存,网络部件以及审计系统。其中,云站点在提供云服务的过程中,该内存将会存储云服务的使用方产生的本地业务数据以及云站点的运维数据。通过图1b中的箭头“1”的执行过程,云站点中的网络部件可以将内存中的运维数据发送至云平台的运维数据的管控模块,以便于云平台基于该运维数据实现对云平台的管控。并且,云站点中还可以存在审计系统,该审计系统用于对网络部件所传输的运维数据进行审计。
可选地,在图1b中,云站点产生的本地业务数据可以为加密存储,以增加数据的安全性。
可选地,在图1b中,若云站点产生的本地业务数据需要上传至云平台的情况下,通过图1b中的箭头“2”的执行过程,该本地业务数据也可以通过网络部件上传至云平台中的虚拟私有云(vitural pravate cloud,VPC)服务模块。
可选地,通过该网络部件的数据可以为加密数据,该加密数据所使用的加密算法可以是云站点本地配置,也可以是云平台提供,此处不做限定。
在图1b所示架构,云站点产生的本地业务数据有可能是上文提及的云站点需要在本地驻留的数据。其中,虽然本地业务数据可以是在该内存中加密存储的方式以增加数据的安全性,但是,由于云站点中本地业务数据和运维数据共享内存,导致内存中数据存在互访的可能,运维数据中可能会混入本地业务数据。而运维数据的生成规则是云平台定义的,云站点并无法获知该运维数据的具体语义,审计系统虽然能够获取传输的运维数据的数据流,但是图1b所示的执行机制中无法证明运维数据中是否混入本地业务数据。为此,上述图1b所示增加审计系统的实现方式并无法有效地提升云服务的使用方对云服务的信任度。
为了解决上述问题,本申请实施例提供了一种云数据处理系统、方法及相关设备,用于使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。下面将结合附图对本申请提供的实施例进行详细描述。
请参阅图2,为本申请提供的云数据处理系统的一个实现示意图,该云数据处理系统包括云平台,管控模块和云站点。其中,该管控模块用于对该云站点向该云平台发送的数据进行管控。
该云站点在提供云服务的过程中,将会生成需要向云平台上报的第一数据,并且,该云站点向管控模块发送该第一数据。
该管控模块在接收来自云站点的需要向云平台上报的第一数据之后,该管控模块基于第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验 证时,向该云平台发送该第一数据;其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。
该云平台在接收来自该管控模块的第一数据之后,该云平台存储该第一数据。
基于图2所示技术方案,在云数据处理系统中的云站点提供云服务的过程中,云站点向云平台发送的第一数据需要经过该管控模块的验证,即该管控模块基于第一可用数据池进行验证,并在该第一数据验证通过的情况下,该管控模块向云平台发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
应理解,该云站点可以包括一个或多个服务器(或虚拟机、容器等),如图2所示,该管控模块也可以独立设置于该一个或多个服务器(或虚拟机、容器等)之外的其他设备;或者,如图3所示,该管控模块可以设置于该一个或多个服务器(或虚拟机、容器等)中,本申请对此不做限定。此外,该管控模块用于对该云站点向该云平台发送的数据进行管控的模块,该管控模块还可以使用其它的名称,例如用于提供管控服务的服务器(或虚拟机、容器等)、管控服务器(或管控虚拟机、管控容器等),看门狗(network watch dog,NWD),或者是其他的名称,本申请仅以该名称为管控模块为例进行说明。
在一种可能的实现方式中,该管控模块,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该云平台,还用于向该管控模块发送第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息;该云平台,还用于基于该第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证之后,存储该第一数据。具体地,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在一种可能的实现方式中,该管控模块,还用于向该云站点发送该第一信息;该云站点,还用于基于该第一可用数据池生成该第一数据。具体地,该管控模块还可以向云站点发送包含有该第一可用数据池以及该管控模块对该第一可用数据池的签名信息的第一信息,以便于该云站点基于经过管控模块的认证的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
在一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该管控模块,还用于获取包 含有M组数据的第二可用数据池,并基于该配置信息在该M组数据确定该第一可用数据池;其中,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数。具体地,管控模块可以基于该云站点提供的云服务的使用方的配置信息在包含有M组数据的第二可用数据池确定包含有N组数据的第一可用数据池,其中,M为大于或等于N的正整数。从而,支持云服务的使用方基于该配置信息对管控模块中用于执行数据验证的第一可用数据池的定制,以确保后续管控模块向云平台发送的数据符合该定制的要求。
可选地,管控模块获取的第二可用数据池来自于云平台,或者,管控模块获取的第二可用数据池为管理人员在该管控模块写入的数据,或者是管控模块通过其他方式获取该第二可用数据池,此处不做限定。
可以理解的是,该可用数据的类别信息包括该可用数据的类别名称,或,该可用数据的类别信息包括该可用数据的类别名称对应的索引。类似地,该可用数据的取值信息可以包括该可用数据的取值范围,或该可用数据的取值信息包括该可用数据的取值范围对应的索引。
在一种可能的实现方式中,该第一可用数据池还包括该N组数据中每一组数据对应的签名信息,该签名信息包括该管控模块对该每一组数据的签名信息和/或该云平台对该每一组数据的签名信息;该管控模块,还用于在数据发送模式为非直通模式时,在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息。具体地,管控模块向云平台发送数据的数据发送单元可以支持非直通模式,其中,在非直通模块下,该管控模块可以在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息,以便于该云平台基于该第一可用数据池中的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性。
在一种可能的实现方式中,该管控模块,还用于在数据发送模式为直通模式时,向该云平台发送该管控模块对该第一数据的签名信息。具体地,管控模块向云平台发送数据的数据发送单元可以支持直通模式,其中,在直通模块下,该管控模块可以向该云平台发送该管控模块对该第一数据的签名信息,以便于该云平台基于该管控模块的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性的同时,可以简化管控模块和云平台的操作。
可以理解的是,非直通模式对数据安全性的要求高于直通模式对数据安全性的要求。其中,非直通模式也可以通过其它描述替换,例如,高安全性模式,信任模式,加强验证模式等;类似地,直通模式也可以通过其它描述替换,例如,低安全性模式,非信任模式等。
在一种可能的实现方式中,该第一可用数据池还包括发送策略,该发送策略包括发送时间和/或发送顺序;该管控模块,还用于基于该发送策略向云平台发送该第一数据。具体地,基于该云站点提供的云服务的使用方的配置信息确定的第一可用数据池开可以包括发送策略,以便于管控模块能够基于该使用方配置的发送策略向云平台发送第一数据,以期进一步提升云服务的使用方对云服务的信任度。
在一种可能的实现方式中,该系统还包括审计系统;该管控模块,还用于向审计系统发送该第一数据,使得该审计系统对该第一数据进行审计。具体地,管控模块还可以向审计系统发送该第一数据,使得该云服务的使用方可以基于该审计系统对该管控模块向云平台发送的第一数据进行审计(包括实施审计或事后审计等),以期进一步提升云服务的使用方对云服务的信任度。
上面对本申请提供的云数据处理系统进行了描述,下面将结合图4所示实现过程,对本申请提供的云数据处理方法进行介绍。请参阅图4,为本申请提供的云数据处理方法的一个实现示意图,该方法包括如下步骤。
需要说明的是,图4所示方法应用于包含有云平台,管控模块以及云站点的系统中。图4所示方法以云平台,管控模块以及云站点作为该交互示意的执行主体为例来示意该方法,但本申请并不限制该交互示意的执行主体。例如,图4中的云平台(或管控模块,或云站点)也可以是支持该云平台(或管控模块,或云站点)实现该方法的芯片、芯片系统、或处理器,还可以是能实现全部或部分云平台(或管控模块,或云站点)的逻辑模块或软件。
S401.云站点向管控模块发送第一数据。
本实施例中,云站点在提供云服务的过程中,该云站点生成第一数据,并且,该云站点在步骤S401中向管控模块发送第一数据。
S402.管控模块基于第一可用数据池对第一数据进行验证。
本实施例中,管控模块在步骤S401中接收第一数据之后,该管控模块在步骤S402中基于第一可用数据池对第一数据进行验证。
S403.管控模块向云平台发送第一数据。
本实施例中,管控模块在步骤S402中基于第一可用数据池对第一数据进行验证且验证通过的情况下,该管控模块在步骤S403中向云平台发送第一数据。
具体地,管控模块在云数据处理系统中用于对云站点向云平台发送的数据进行管控,该管控设备在步骤S401中接收来自云站点的第一数据之后,该管控设备在步骤S402中基于第一可用数据池对该第一数据进行验证,并在步骤S403中确定该第一数据通过该第一可用数据池的验证时,该管控模块向该云平台发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。
应理解,该云站点可以包括一个或多个服务器(或虚拟机、容器等),该管控模块可以设置于该一个或多个服务器(或虚拟机、容器等)中,或者,该管控模块也可以独立设置于该一个或多个服务器(或虚拟机、容器等)之外的其他设备,本申请对此不做限定。
在一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该管控模块在步骤S402中基于第一可用数据池对该第一数据进行验证之前,该方法还包括:该管控模块接收来自该云平台的第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括 可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;该管控模块基于该配置信息在该M组数据确定该第一可用数据池。具体地,管控模块可以基于该云站点提供的云服务的使用方的配置信息在包含有M组数据的第二可用数据池确定包含有N组数据的第一可用数据池,其中,M为大于或等于N的正整数。从而,支持云服务的使用方基于该配置信息对管控模块中用于执行数据验证的第一可用数据池的定制,以确保后续管控模块向云平台发送的数据符合该定制的要求。
在一种可能的实现方式中,该配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。具体地,在管控模块获取的第二可用数据池来自于云平台的实现方式中,云服务的使用方可以通过删减、修改等定制化操作,以确保后续管控模块向云平台发送的数据符合该定制化操作的要求。
在一种可能的实现方式中,该第一可用数据池还包括该发送策略,该发送策略包括发送时间和/或发送顺序;该管控模块向云平台发送该第一数据包括:该管控模块基于该发送策略向云平台发送该第一数据。具体地,基于该云站点提供的云服务的使用方的配置信息确定的第一可用数据池开可以包括发送策略,以便于管控模块能够基于该使用方配置的发送策略向云平台发送第一数据,以期进一步提升云服务的使用方对云服务的信任度。
可选地,管控模块获取的第二可用数据池除了上述描述的来自于云平台之外,管控模块获取的第二可用数据池也可以为管理人员在该管控模块写入的数据,或者是管控模块通过其他方式获取该第二可用数据池,此处不做限定。
可以理解的是,该可用数据的类别信息包括该可用数据的类别名称,或,该可用数据的类别信息包括该可用数据的类别名称对应的索引。类似地,该可用数据的取值信息可以包括该可用数据的取值范围,或该可用数据的取值信息包括该可用数据的取值范围对应的索引。
在一种可能的实现方式中,在步骤S403之前,该方法还包括:该管控模块向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该管控模块接收来自该云平台的第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息。具体地,管控模块和云平台还可以分别交互两者对第一可用数据池的签名信息,以便于管控模块和云平台均可以得到经过两者进行双认证的第一可用数据池。从而,对于管控模块而言,管控模块可以基于经过双认证的第一可用数据池对数据进行验证,使得管控模块向云平台发送的数据为经过云平台认证的合法数据,避免该管控模块向云平台发送不合法的数据。相应的,对于云平台而言,云平台后续可以基于经过双认证的第一可用数据池对数据进行验证,使得该云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
在一种可能的实现方式中,在步骤S403之前,该方法还包括:该管控模块向云站点发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息。具体地,该管控模块还可以向云站点发送包含有该第一可用数据池以及该管控模块对该第一可用数据池的签名信息的第一信息,以便于该云站点基于经过管控模块的认证 的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
在一种可能的实现方式中,管控模块在步骤S402中确定该第一数据通过该第一可用数据池的验证时,该方法还包括:该管控模块向审计系统发送该第一数据。具体地,管控模块还可以向审计系统发送该第一数据,使得该云服务的使用方可以基于该审计系统对该管控模块向云平台发送的第一数据进行审计(包括实施审计或事后审计等),以期进一步提升云服务的使用方对云服务的信任度。
在一种可能的实现方式中,该第一可用数据池还包括该N组数据中每一组数据对应的签名信息,该签名信息包括该管控模块对该每一组数据的签名信息和/或该云平台对该每一组数据的签名信息;在确定该第一数据通过该第一可用数据池的验证时,该方法还包括:在数据发送模式为非直通模式时,该管控模块基于该第一可用数据池确定该第一数据对应的签名信息;该管控模块向该云平台发送该第一数据对应的签名信息。具体地,管控模块向云平台发送数据的数据发送单元可以支持非直通模式,其中,在非直通模块下,该管控模块可以在该第一可用数据池中确定该第一数据对应的签名信息,并向该云平台发送该第一数据对应的签名信息,以便于该云平台基于该第一可用数据池中的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性。
在一种可能的实现方式中,在确定该第一数据通过该第一可用数据池的验证时,该方法还包括:在数据发送模式为直通模式时,该管控模块向该云平台发送该管控模块对该第一数据的签名信息。具体地,管控模块向云平台发送数据的数据发送单元可以支持直通模式,其中,在直通模块下,该管控模块可以向该云平台发送该管控模块对该第一数据的签名信息,以便于该云平台基于该管控模块的签名信息对所接收的第一数据进行验证,避免数据被篡改,提升安全性的同时,可以简化管控模块和云平台的操作。
可以理解的是,非直通模式对数据安全性的要求高于直通模式对数据安全性的要求。其中,非直通模式也可以通过其它描述替换,例如,高安全性模式,信任模式,加强验证模式等;类似地,直通模式也可以通过其它描述替换,例如,低安全性模式,非信任模式等。
在一种可能的实现方式中,在步骤S401之前,该方法还包括:云站点接收来自管控模块的第一可用数据池,并基于该第一可用数据池生成第一数据之后,该云站点向该管控模块发送该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,在云站点提供云服务的过程中,云站点向云平台发送的第一数据为经过管控模块验证通过的数据,使得云站点向云平台发送的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。并且,云站点基于经过管控模块所指示的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据。
可选地,管控模块向云站点发送的第一信息包括云平台对该第一可用数据池的签名信息,和/或,管控模块向云站点发送的第一信息包括该管控模块对该第一可用数据池的签名信息。具体地,云站点所接收的第一信息还可以云平台对该第一可用数据池的签名信息, 和/或,该第一信息包括该管控模块对该第一可用数据池的签名信息,以便于该云站点基于经过管控模块认证和/或云平台认证的第一可用数据池生成合法数据,避免该云站点生成并发送不合法的数据,以简化管控模块的后续操作。
基于图4所示技术方案,管控模块在云数据处理系统中用于对云站点向云平台发送的数据进行管控,云平台接收来自管控设备的第一数据之后,该云平台基于第一可用数据池对该第一数据进行验证,并在确定该第一数据通过该第一可用数据池的验证时,该云平台存储该第一数据。其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池。从而,云平台所存储的第一数据为经过该云平台验证通过的数据,使得云平台所存储的数据符合该云站点提供的云服务的使用方的配置要求,以期提升云服务的使用方对云服务的信任度。并且,云平台存储的数据为经过云平台认证的合法数据,避免云平台存储不合法的数据,以提升云平台所存储的数据的安全性。
作为一种实现示例,下面将以图5所示示例,以管控模块的名称为NWD,云平台为公有云(Region),云站点为分布式云站点且部署于数据中心(data center,DC)为例,对上述云数据处理系统的实现过程进行示例性说明。如图5所示,该云数据处理系统包括如下实现过程。
对于云数据处理系统中的分布式云站点而言,新增管控数据处理模块,用于从NWD获取客户(该客户可以为分布式云站点提供的云服务的使用方)定义的管控数据池(即前文实施例中的第一可用数据池),并根据获取到的管控数据池来生成发送数据(例如前文实施例中的第一数据)。示例性的,该分布式云站点所包含的部件可以执行下述表1的实现过程。
表1
可以理解的是,在表1的数据池的实现过程中,元数据可以为前文实施例中的第一可用数据池,分布式云系统支持的数据可以为前文实施例中的第二可用数据池。
可选地,在表1的数据池的实现过程中,裁剪后内容的范围一般不能超出分布式云系统支持的数据集合;如果超出范围,需要Region上单独进行审批。
可以理解的是,在表1的数据池管理的实现过程中,该实现过程主要用于更新从NWD同步的数据变更。其中,分布式云站点一般不能主动变更数据池中的元数据。
可以理解的是,在表1中数据池同步的实现过程中,分布式云站点和NWD之间可以是1:N(N为正整数)的关系,每个分布式云站点同一时刻可以通过N个NWD中的某一个NWD连接到Region。
可选地,在表1的管控数据生成的实现过程中,待发送数据可以为前文实施例中的第一数据。
可选地,该管控数据生成过程中,可以对每一条待发送数据进行签名,也可以不需要每一条数据都进行签名,例如对一批数据进行签名。
可选地,如图5所示,分布式云站点还可以包括如下模块:
云边管控模块,用于通过网络模块接收云平台(或者其它设备)的操作指令,并基于该操作指令完成相关操作;和/或,用于通过网络模块将生成的管控数据发送至NWD(或直接发送至云平台)。
加密部件模块,该模块可以是云服务提供商提供或者客户自建,用于对网络模块所传输的数据进行加密或解密。
网络模块,用于收发数据。
存储模块,用于存储数据。
对于云数据处理系统中的NWD而言,可以部署在客户IT系统中(或者独立部署在客户的IT系统之外,图示中以分部署云站点与NWD共部署与DC为例进行说明),主要功能包括:定义/管理可以发送的数据集合,从分布式云站点收到数据发送给审计系统,和Region之间完成数据双认证。示例性的,该NWD所包含的部件可以执行下述表2的实现过程。
表2

可以理解的是,在表2的数据池的实现过程中,元数据可以为前文实施例中的第一可用数据池,分布式云系统支持的数据可以为前文实施例中的第二可用数据池。
可选地,在表2的数据池的实现过程中,裁剪后内容的范围一般不能超出分布式云系统支持的数据集合;如果超出范围,需要Region上单独进行审批。
对于云数据处理系统中的Region而言,Region上当前已有的公有云管控模块上要增加标准管控数据处理模块,用于处理标准化的管控数据;Region上新增管控数据池管理模块,主要功能包括:数据池管理,数据双认证,数据池数据查询,数据池索引中的至少一项。示例性的,Region所包含的部件可以执行下述表3的实现过程。
表3

可以理解的是,在表3的数据池的实现过程中,元数据可以为前文实施例中的第一可用数据池,分布式云系统支持的数据可以为前文实施例中的第二可用数据池。
可选地,在表3的数据池的实现过程中,裁剪后内容的范围一般不能超出分布式云系统支持的数据集合;如果超出范围,需要Region上单独进行审批。
由上述表1至表3所示部件可知,各个部件之间可以执行下述至少一项交互过程。
1、Region和NWD、分布式云站点之间。
具体地,Region、NWD、DC之间的交互定义标准的交互协议,用于完成合法管控数据池的内容交互和认证。
2、Region和NWD之间。具体地,NWD上导入或者配置的管控数据(类型、名称、内容)需要在Region上完成确认,确保不会有非法数据从NWD上发送到Region。
可选地,Region和NWD之间是多对多的关系,但Region和NWD上的管控数据元数据(唯一的管控数据名称或者名称+内容)唯一。此外,NWD和Region之间也可以通过数据的索引来实现高效的交互过程。
3、分布式云站点和NWD之间。具体地,分布式云站点和NWD都归属于客户业务系统,通过客户内网完成交互。此外,分布式云站点从NWD上获取合法的管控数据池用于生成待发送的管控数据。
可选地,NWD可以支持旁路模式,在信任分布式云站点管控面系统的前提下直接将分布式云站点上的管控数据转发给公有云(同时可以进行实时审计)。
4、NWD和审计系统。具体地,通过NWD上的数据要么是NWD根据管控数据池生成的数据,要么是NWD可以识别的标准数据,这些数据在发送之前要发送给审计系统用于实时和事后审计。
5、NWD和客户其他安全部件。具体地,NWD通过权限管理可以支持只有特定的用户能够进行NWD设置,也可以和其他权限管理系统进行SSO对接。
6、分布式云站点和Region之间。具体地,分布式云站点和Region之间没有直接连通的管控通道,所有数据必须经过NWD处理后才能到Region上。
可选地,在NWD和分布式云站点之间,NWD和云平台之间可以进行身份认证,认证的机制采用传统的证书机制,此部分认证流程是标准的证书认证流程。认证和加解密是通道建立过程,可以理解为前述实施例的前置。此外,在上述实施例中,聚焦数据交互和认证本身,而交互实体认证和加密通道建立可以使用本领域标准的流程和技术。
下面将结合更多的附图对图5所示各个模块的执行流程进行示例性描述。
如图6所示实现示例,为前述“双认证”实现的一个实现示例。
在图6所示示例中,公有云还可以包括产品数据包发布模块,共有云中的产品数据包发布模块、管控数据处理模块、公有云管控模块,以及客户互联网数据中心(internet data center,IDC)机房中包括NWD、云边管控模块、管控数据处理模块可以执行图6所示实现过程。
601.NWD向产品数据包发布模块请求标准数据池。
可以理解的是,本实施例涉及的标准数据池即为前文实施例中的第二可用数据池。
602.产品数据包发布模块向NWD发送标准数据池。
603.云服务的使用方可以通过NWDNWD对标准数据池进行客户化定制并生成数据签名,以得到第一可用数据池。
604.公有云中的管控数据处理模块向产品数据包发布模块请求标准数据池。
605.产品数据包发布模块向公有云中的管控数据处理模块发送标准数据池。
606.公有云中的管控数据处理模块更新本地的数据池,并生成可用数据(包括类别和/或取值)的索引。
607.NWD将步骤S603中得到的第一可用数据池发送给公有云中的管控数据处理模块。
608.公有云中的管控数据处理模块对步骤607中接收的第一可用数据池进行签名,并更新索引。
609.公有云中的管控数据处理模块通过内部交互,向公有云管控模块发送步骤S608中的签名后的第一可用数据池。
可选地,公有云管控模块在步骤609之后执行本地的队列刷新,以明确该NWD已基于标准数据池进行处理得到第一可用数据池。
610.公有云中的管控数据处理模块向NWD发送包含有双签名以及更新后的索引的第一可用数据池。
611.NWD基于步骤610接收的数据更新本地在步骤603得到的第一可用数据池。
612.云边管控模块(定时或周期)向NWD发送可用数据池的同步请求。
613和614.NWD将步骤611更新后的第一可用数据池分别向云边管控模块以及客户IDC机房中的管控数据处理模块发送。
615.客户IDC机房中的管控数据处理模块记录更新后的第一可用数据池。
由图6所示实现过程可知,数据初始化过程中,需要有一个标准的数据源,这个来源可以是云平台厂商发布的标准数据包(即图6中包含有产品数据包发布模块的云平台,用于代表初始化的过程中,从云平台服务商下发其系统所拥有的标准数据源字段,该云平台和图中右边虚线框正常业务过程中为了管理客户机房的云软件而需要获取管控数据的管理模块是同一个云服务商的模块,在图6中分开画是为了体现一个模块负责发布标准数据源,一个模块是用户部署了IDC机房软件和云平台服务后,要进行客户机房软件管理的数据管理模块是有差别的),客户在步骤603根据发布的数据包进行裁剪及定制,其中裁剪可以减少数据内容,定制可以修改部分字段内容。通过图6所示流程可以保证云边之间交互的透明性,确保客户的本地数据驻留可以被证明。
可选地,默认情况下客户并不需要对数据包进行裁剪和定制。
如图7所示实现示例,为前述“第一数据”收发过程的一个实现示例。
在图7所示示例中,客户IDC机房包括管控数据处理模块、云边管控模块、NWD、客户审计系统,公有云包括管控数据处理模块、公有云管控模块,各个模块的实现如下述步骤所示。
701.NWD向客户IDC机房中的管控数据处理模块发送交互模式的配置信息。
可以理解的是,本实施例中的交互模式包括数据原文传输模式,数据索引传输模式,直通模式,非直通模式等。
702.NWD向公有云中的公有云管控模块发送交互模式的配置信息。其中,该交互模式的配置信息可以为云服务的使用方设置的。
703.客户IDC机房中的管控数据处理模块基于步骤701所接收的配置信息设置数据上报模式。
704.客户IDC机房中的管控数据处理模块生成待发送数据,该待发送数据可以为前文实施例中的第一数据。
705.客户IDC机房中的管控数据处理模块基于步骤703所设置的数据上报模式对步骤704生成的第一数据进行处理,得到数据包。
706.客户IDC机房中的管控数据处理模块向云边管控模块发送步骤705得到的数据包。
707.云边管控模块向NWD发送在步骤706接收的数据包。
708.NWD根据第一可用数据池对步骤707接收的数据包进行验证。
709.在步骤708中验证通过的情况下,NWD向客户审计系统发送数据包。
710.在步骤708中验证通过的情况下,NWD向公有云中的管控数据处理模块发送数据包。
711.公有云中的管控数据处理模块基于第一可用数据池对步骤710接收的数据包进行验证。
712.在步骤711中验证通过的情况下,公有云中的管控数据处理模块向公有云管控模块发送数据包。
713.公有云管控模块对数据包进行存储以及展示等。
由图7所示示例可知,客户可以根据自身的配置选择从分布式云站点到云平台发送数据的交互模式,同时通过审计系统来证明发送数据的合法合规,其中,客户作为云服务的使用方,该实现过程可以提升云服务的使用方对所使用的云服务的信任度。
如图8所示实现示例,在前文第一可用数据池确定之后还可以执行更新过程。
在图8所示实现示例中,客户IDC机房包括云边管控模块、NWD,公有云包括管控数据处理模块、公有云管控模块,各个模块的实现如下述步骤所示。
801.公有云管控模块向NWD发送升级数据包,该升级数据包包括对第一可用数据池的更新信息。
802.云服务的使用方可以通过NWD对升级数据包进行验证。
803.在步骤802中通过验证的情况下,NWD向云边管控模块发送升级数据包。
804.云边管控模块基于升级数据包对本地的数据进行管控。
由图8所示实现示例可知,管控面下发数据一般是升级包及系统的配置调整命令,并不涉及客户下发过程中并不涉及客户客户数据的驻留状态变更,因此再兼顾效率的情况下,并不需要对所有数据进行解构和ID化,以提升数据交互效率。
在一种可能的实现方式中,在图5所示示例中,分布式云站点与NWD之间的数量关系可以是1比1,也可以是多比1,下面将通过图9所示示例对后者的实现过程进行示例性描述。
如图9所示实现示例,为N(N为大于或等于2的整数)个云站点与同一NWD的交互的一个实现过程,即通过一个NWD可以维护被多个云站点所共享使用。
在图9所示实现示例中,客户IDC机房包括管控数据处理模块1、云边管控模块1、管控数据处理模块N、云边管控模块N、NWD,公有云包括管控数据处理模块,各个模块的实现如下述步骤所示。
901.NWD向公有云的管控数据处理模块发送对接认证请求消息。
可选地,本实施例中的对接认证请求消息可以包括NWD的证书,用户账号信息等。
902.公有云的管控数据处理模块对步骤901接收的对接认证请求消息进行认证。
903.公有云的管控数据处理模块向NWD反馈认证结果。
可选地,在本实施例中,以步骤903中的认证结果为认证通过为例进行说明。
904.NWD向公有云的管控数据处理模块发送对数据池的请求。
905.公有云的管控数据处理模块对步骤904接收的对数据池的请求进行认证。
906.在步骤905通过认证的情况下,公有云的管控数据处理模块向NWD发送包含有双签名的第一可用数据池。
907.云边管控模块1向NWD发送对接认证请求消息。
908.NWD对步骤907接收的对接认证请求消息进行认证。
909.NWD向云边管控模块1发送认证结果。
可选地,在本实施例中,以步骤909中的认证结果为认证通过为例进行说明。
910.云边管控模块1向NWD发送对数据池的请求。
911.NWD向云边管控模块1发送在步骤906中接收的第一可用数据池,以便于云边管控模块1向管控数据处理模块1转发该第一可用数据池。
912.管控数据处理模块1基于步骤911接收的第一可用数据池更新本地的数据池。
913.云边管控模块N向NWD发送对接认证请求消息。
914.NWD对步骤913接收的对接认证请求消息进行认证。
915.NWD向云边管控模块N发送认证结果。
可选地,在本实施例中,以步骤915中的认证结果为认证通过为例进行说明。
916.云边管控模块N向NWD发送对数据池的请求。
917.NWD向云边管控模块N发送在步骤906中接收的第一可用数据池,以便于云边管控模块N向管控数据处理模块N转发该第一可用数据池。
918.管控数据处理模块N基于步骤917接收的第一可用数据池更新本地的数据池。
由图9所示实现示例可知,N个云站点可以配置同一NWD,以便于通过一个NWD可以维护被多个云站点所共享使用,节省NWD的配置,降低方案实现的复杂度。
在一种可能的实现方式中,在图5所示示例中,NWD与公有云之间的数量关系可以是1比1,也可以是多比1,下面将通过图10所示示例对后者的实现过程进行示例性描述。
如图10所示实现示例,为N(N为大于或等于2的整数)个NWD与公有云的交互的一个实现过程,即公有云可以在一个云站点中配置N个NWD。
在图10所示实现示例中,客户IDC机房包括NWD1、客户审计系统1、NWD N、客户审计系统N,公有云包括管控数据处理模块以及公有云管控模块,各个模块的实现如下述步骤所示。
1001.NWD N向公有云的管控数据处理模块发送对接认证请求消息。
可选地,本实施例中的对接认证请求消息可以包括NWD的证书,用户账号信息等。
1002.公有云的管控数据处理模块对步骤1001接收的对接认证请求消息进行认证。
1003.公有云的管控数据处理模块向NWD N反馈认证结果。
可选地,在本实施例中,以步骤1003中的认证结果为认证通过为例进行说明。
1004.NWD N向公有云的管控数据处理模块发送经过本地签名后的可用数据池。
1005.公有云的管控数据处理模块对步骤1004接收的可用数据池进行认证。
1006.在步骤1005通过认证的情况下,公有云的管控数据处理模块向NWD N发送包含有双签名的可用数据池(例如,该包含有双签名的可用数据池可以为前文实施例中的第一可用数据池)。
1007.公有云的管控数据处理模块向公有云管控模块发送包含有双签名的可用数据池。
可选地,公有云管控模块在步骤1007之后执行本地的队列刷新,以明确该NWD N已使用该包含有双签名的可用数据池。
1008.NWD 1向公有云的管控数据处理模块发送对接认证请求消息。
1009.公有云的管控数据处理模块对步骤1008接收的对接认证请求消息进行认证。
1010.公有云的管控数据处理模块向NWD 1反馈认证结果。
可选地,在本实施例中,以步骤1009中的认证结果为认证通过为例进行说明。
1011.NWD 1向公有云的管控数据处理模块发送经过本地签名后的可用数据池。
1012.公有云的管控数据处理模块对步骤1004接收的可用数据池进行认证。
1013.在步骤1012通过认证的情况下,公有云的管控数据处理模块对多个NWD的可用数据池所包含的可用数据的索引(包括数据类别和/或数据取值)进行归并。
1014.在步骤1012通过认证的情况下,公有云的管控数据处理模块向NWD 1发送包含有双签名的可用数据池(例如,该包含有双签名的可用数据池可以为前文实施例中的第一可用数据池)。
1015.公有云的管控数据处理模块向公有云管控模块发送包含有双签名的可用数据池。
可选地,公有云管控模块在步骤1015之后执行本地的队列刷新,以明确该NWD N已使用该包含有双签名的可用数据池。
由图10所示实现示例可知,在同一客户IDC机房中,可以配置多个NWD,以便于通过多个NWD可以维护同一云站点中的可用数据,以便于方案的灵活部署。
上面从系统以及方法的角度对本申请进行描述,下面将基于更多的附图对本申请提供的管控模块,云平台和云站点进行介绍。
请参阅图11,为本申请提供的管控模块的一个实现示意图,该管控模块包括接收单元1101,处理单元1102以及发送单元1103。接收单元1101,用于接收来自云站点的第一数据,该管控模块用于对该云站点向云平台发送的数据进行管控;处理单元1102,用于基于第一可用数据池对该第一数据进行验证,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;发送单元1103,用于在该处理单元1102确定该第一数据通过该第一可用数据池的验证时,向该云平台发送该第一数据。
在一种可能的实现方式中,该第一数据池包括N组数据,该N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;该接收单元1101,还用于接收来自该云平台的第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;该处理单元1102,还用于基于该配置信息在该M组数据确定该第一可用数据池;该发送单元 1103,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息。
在一种可能的实现方式中,该发送单元1103,还用于向该云平台发送第一信息,该第一信息包括该第一可用数据池以及该管控模块对该第一可用数据池的签名信息;该接收单元1101,还用于接收来自该云平台的第二信息,该第二信息包括该第一可用数据池以及该云平台对该第一可用数据池的签名信息,或,该第二信息包括该第一可用数据池以及该云平台对该第一信息的签名信息。
在一种可能的实现方式中,该配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。
在一种可能的实现方式中,该发送单元1103,还用于向审计系统发送该第一数据。
需要说明的是,上述管控模块中各单元之间的信息交互、实现过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参考本申请实施例前述所示的方法实施例中的叙述,此处不再赘述。
请参阅图12,为本申请提供的云平台的一个实现示意图,该云平台包括接收单元1201以及处理单元1202。接收单元1201,用于接收来自管控模块的第一数据;处理单元,用于基于第一可用数据池对该第一数据进行校验,其中,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;该处理单元1202,还用于在确定该第一数据通过该第一可用数据池的验证时,存储该第一数据。
在一种可能的实现方式中,该云平台还包括发送单元1203,该发送单元用于向管控模块发送第二可用数据池,该第二可用数据池包括M组数据,该M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数。
需要说明的是,上述云平台中各单元之间的信息交互、实现过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参考本申请实施例前述所示的方法实施例中的叙述,此处不再赘述。
请参阅图13,为本申请提供的云站点的一个实现示意图,该云站点包括接收单元1301,处理单元1302以及发送单元1303。接收单元1301,用于接收来自管控模块的第一信息,该第一信息包括第一可用数据池,该第一可用数据池为基于该云站点提供的云服务的使用方的配置信息确定的数据池;处理单元1302,用于基于该第一可用数据池生成第一数据;发送单元1303,用于向管控模块发送该第一数据。
需要说明的是,上述云站点中各单元之间的信息交互、实现过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参考本申请实施例前述所示的方法实施例中的叙述,此处不再赘述。
图14为本申请实施例提供的管控模块的另一结构示意图。如图14所示,管控模块的一个实施例可以包括一个或一个以上处理器1401,存储器1402,输入输出接口1403,有线或无线网络接口1404,电源1405。
存储器1402可以是短暂存储或持久存储。更进一步地,处理器1401可以配置为与存储器1402通信,在管控模块上执行存储器1402中的一系列指令操作。
本实施例中,处理器1401可以执行前述任一实施例中管控模块所执行的操作,具体此处不再赘述。
本实施例中,处理器1401中的具体功能模块划分可以与前述图7中所描述的接收单元,处理单元和发送单元等单元的划分方式类似,此处不再赘述。
图15为本申请实施例提供的云平台的另一结构示意图。如图15所示,云平台的一个实施例可以包括一个或一个以上处理器1501,存储器1502,输入输出接口1503,有线或无线网络接口1504,电源1505。
存储器1502可以是短暂存储或持久存储。更进一步地,处理器1501可以配置为与存储器1502通信,在云平台上执行存储器1502中的一系列指令操作。
本实施例中,处理器1501可以执行前述任一实施例中云平台所执行的操作,具体此处不再赘述。
本实施例中,处理器1501中的具体功能模块划分可以与前述图7中所描述的接收单元,处理单元和发送单元等单元的划分方式类似,此处不再赘述。
图16为本申请实施例提供的云站点的另一结构示意图。如图16所示,云站点的一个实施例可以包括一个或一个以上处理器1601,存储器1602,输入输出接口1603,有线或无线网络接口1604,电源1605。
存储器1602可以是短暂存储或持久存储。更进一步地,处理器1601可以配置为与存储器1602通信,在云站点上执行存储器1602中的一系列指令操作。
本实施例中,处理器1601可以执行前述任一实施例中云站点所执行的操作,具体此处不再赘述。
本实施例中,处理器1601中的具体功能模块划分可以与前述图7中所描述的接收单元,处理单元和发送单元等单元的划分方式类似,此处不再赘述。
本申请实施例还涉及一种计算机存储介质,包括计算机可读指令,当所述计算机可读指令被执行时,使得计算机实现前述任一实施例中管控模块所执行的步骤,或,使得计算机实现前述任一实施例中云平台所执行的步骤,或,使得计算机实现前述任一实施例中云站点所执行的步骤。
本申请实施例还涉及一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机实现前述任一实施例中管控模块所执行的步骤,或,使得计算机实现前述任一实施例中云平台所执行的步骤,或,使得计算机实现前述任一实施例中云站点所执行的步骤。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (27)

  1. 一种云数据处理系统,其特征在于,包括云站点,云平台和管控模块,所述管控模块用于对所述云站点向所述云平台发送的数据进行管控;
    所述云站点,用于生成第一数据,并向管控模块发送所述第一数据;
    所述管控模块,用于基于第一可用数据池对所述第一数据进行验证,并在确定所述第一数据通过所述第一可用数据池的验证时,向所述云平台发送所述第一数据;其中,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    所述云平台,用于存储所述第一数据。
  2. 根据权利要求1所述的系统,其特征在于,
    所述管控模块,还用于向所述云平台发送第一信息,所述第一信息包括所述第一可用数据池以及所述管控模块对所述第一可用数据池的签名信息;
    所述云平台,还用于向所述管控模块发送第二信息,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一可用数据池的签名信息,或,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一信息的签名信息;
    所述云平台,还用于基于所述第一可用数据池对所述第一数据进行验证,并在确定所述第一数据通过所述第一可用数据池的验证之后,存储所述第一数据。
  3. 根据权利要求2所述的系统,其特征在于,
    所述管控模块,还用于向所述云站点发送所述第一信息;
    所述云站点,还用于基于所述第一可用数据池生成所述第一数据。
  4. 根据权利要求1至3任一项所述的系统,其特征在于,所述第一数据池包括N组数据,所述N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;
    所述管控模块,还用于获取包含有M组数据的第二可用数据池,并基于所述配置信息在所述M组数据确定所述第一可用数据池;其中,所述M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数。
  5. 根据权利要求1至4任一项所述的系统,其特征在于,所述第一可用数据池还包括所述N组数据中每一组数据对应的签名信息,所述签名信息包括所述管控模块对所述每一组数据的签名信息和/或所述云平台对所述每一组数据的签名信息;
    所述管控模块,还用于在数据发送模式为非直通模式时,在所述第一可用数据池中确定所述第一数据对应的签名信息,并向所述云平台发送所述第一数据对应的签名信息。
  6. 根据权利要求1至4任一项所述的系统,其特征在于,
    所述管控模块,还用于在数据发送模式为直通模式时,向所述云平台发送所述管控模 块对所述第一数据的签名信息。
  7. 根据权利要求1至6任一项所述的系统,其特征在于,所述第一可用数据池还包括发送策略,所述发送策略包括发送时间和/或发送顺序;
    所述管控模块,还用于基于所述发送策略向云平台发送所述第一数据。
  8. 根据权利要求1至7任一项所述的系统,其特征在于,所述系统还包括审计系统;
    所述管控模块,还用于向审计系统发送所述第一数据,使得所述审计系统对所述第一数据进行审计。
  9. 一种基于管控模块的云数据处理方法,其特征在于,包括:
    所述管控模块接收来自云站点的第一数据,所述管控模块用于对所述云站点向云平台发送的数据进行管控;
    所述管控模块基于第一可用数据池对所述第一数据进行验证,其中,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    在确定所述第一数据通过所述第一可用数据池的验证时,所述管控模块向所述云平台发送所述第一数据。
  10. 根据权利要求9所述的方法,其特征在于,所述第一数据池包括N组数据,所述N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;
    在所述管控模块基于第一可用数据池对所述第一数据进行验证之前,所述方法还包括:
    所述管控模块接收来自所述云平台的第二可用数据池,所述第二可用数据池包括M组数据,所述M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;
    所述管控模块基于所述配置信息在所述M组数据确定所述第一可用数据池。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    所述管控模块向所述云平台发送第一信息,所述第一信息包括所述第一可用数据池以及所述管控模块对所述第一可用数据池的签名信息;
    所述管控模块接收来自所述云平台的第二信息,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一可用数据池的签名信息,或,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一信息的签名信息。
  12. 根据权利要求10或11所述的方法,其特征在于,所述配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。
  13. 根据权利要求9至12任一项所述的方法,其特征在于,所述方法还包括:
    所述管控模块向审计系统发送所述第一数据。
  14. 一种基于云平台的云数据处理方法,其特征在于,包括:
    所述云平台接收来自管控模块的第一数据;
    所述云平台基于第一可用数据池对所述第一数据进行校验,其中,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    在确定所述第一数据通过所述第一可用数据池的验证时,所述云平台存储所述第一数据。
  15. 一种基于云站点的云数据处理方法,其特征在于,包括:
    所述云站点接收来自管控模块的第一信息,所述第一信息包括第一可用数据池,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    所述云站点基于所述第一可用数据池生成第一数据;
    所述云站点向管控模块发送所述第一数据。
  16. 一种管控模块,其特征在于,包括:
    接收单元,用于接收来自云站点的第一数据,所述管控模块用于对所述云站点向云平台发送的数据进行管控;
    处理单元,用于基于第一可用数据池对所述第一数据进行验证,其中,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    发送单元,用于在所述处理单元确定所述第一数据通过所述第一可用数据池的验证时,向所述云平台发送所述第一数据。
  17. 根据权利要求16所述的管控模块,其特征在于,所述第一数据池包括N组数据,所述N组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,N为正整数;
    所述接收单元,还用于接收来自所述云平台的第二可用数据池,所述第二可用数据池包括M组数据,所述M组数据中的每一组数据包括可用数据的类别信息以及可用数据的取值信息,M为大于或等于N的正整数;
    所述处理单元,还用于基于所述配置信息在所述M组数据确定所述第一可用数据池。
  18. 根据权利要求17所述的管控模块,其特征在于,
    所述发送单元,还用于向所述云平台发送第一信息,所述第一信息包括所述第一可用数据池以及所述管控模块对所述第一可用数据池的签名信息;
    所述接收单元,还用于接收来自所述云平台的第二信息,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一可用数据池的签名信息,或,所述第二信息包括所述第一可用数据池以及所述云平台对所述第一信息的签名信息。
  19. 根据权利要求17或18所述的管控模块,其特征在于,所述配置信息包括删减可用数据的指令,修改可用数据的指令中的至少一项。
  20. 根据权利要求16至19任一项所述的管控模块,其特征在于,
    所述发送单元,还用于向审计系统发送所述第一数据。
  21. 一种云平台,其特征在于,包括:
    接收单元,用于接收来自管控模块的第一数据;
    处理单元,用于基于第一可用数据池对所述第一数据进行校验,其中,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    所述处理单元,还用于在确定所述第一数据通过所述第一可用数据池的验证时,存储所述第一数据。
  22. 一种云站点,其特征在于,包括:
    接收单元,用于接收来自管控模块的第一信息,所述第一信息包括第一可用数据池,所述第一可用数据池为基于所述云站点提供的云服务的使用方的配置信息确定的数据池;
    处理单元,用于基于所述第一可用数据池生成第一数据;
    发送单元,用于向管控模块发送所述第一数据。
  23. 一种管控模块,其特征在于,所述管控模块包括存储器和处理器;
    所述存储器存储有代码,所述处理器被配置为执行所述代码,当所述代码被执行时,所述管控模块执行如权利要求9至13任一项所述的方法。
  24. 一种云平台,其特征在于,所述云平台包括存储器和处理器;
    所述存储器存储有代码,所述处理器被配置为执行所述代码,当所述代码被执行时,所述云平台执行如权利要求14所述的方法。
  25. 一种云站点,其特征在于,所述云站点包括存储器和处理器;
    所述存储器存储有代码,所述处理器被配置为执行所述代码,当所述代码被执行时,所述云站点执行如权利要求15所述的方法。
  26. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有计算机程序,该程序由计算机执行时,使得所述计算机实施权利要求9至15任一项所述的方法。
  27. 一种计算机程序产品,其特征在于,所述计算机程序产品存储有指令,所述指令在由计算机执行时,使得所述计算机实施权利要求9至15任一项所述的方法。
PCT/CN2023/098616 2022-06-07 2023-06-06 一种云数据处理系统、方法及相关设备 WO2023236952A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210637384 2022-06-07
CN202210637384.2 2022-06-07
CN202211330225.4 2022-10-27
CN202211330225.4A CN117240462A (zh) 2022-06-07 2022-10-27 一种云数据处理系统、方法及相关设备

Publications (1)

Publication Number Publication Date
WO2023236952A1 true WO2023236952A1 (zh) 2023-12-14

Family

ID=89084997

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/098616 WO2023236952A1 (zh) 2022-06-07 2023-06-06 一种云数据处理系统、方法及相关设备

Country Status (2)

Country Link
CN (1) CN117240462A (zh)
WO (1) WO2023236952A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150281233A1 (en) * 2014-03-26 2015-10-01 Rockwell Automation Technologies, Inc. Device authentication to facilitate secure cloud management of industrial data
CN105027494A (zh) * 2013-03-14 2015-11-04 英特尔公司 公共云中的受信任的数据处理
CN106161507A (zh) * 2015-03-31 2016-11-23 天津铂创国茂电子科技发展有限公司 基于云分支服务器的数据更新方法
CN106712992A (zh) * 2015-11-16 2017-05-24 中兴通讯股份有限公司 一种云管理方法和系统
US20190206231A1 (en) * 2017-12-28 2019-07-04 Tionesta, Llc Method and system for monitoring an object using a hub-cloud platform
WO2020207371A1 (zh) * 2019-04-08 2020-10-15 阿里巴巴集团控股有限公司 数据处理系统和方法、装置以及电子设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105027494A (zh) * 2013-03-14 2015-11-04 英特尔公司 公共云中的受信任的数据处理
US20150281233A1 (en) * 2014-03-26 2015-10-01 Rockwell Automation Technologies, Inc. Device authentication to facilitate secure cloud management of industrial data
CN106161507A (zh) * 2015-03-31 2016-11-23 天津铂创国茂电子科技发展有限公司 基于云分支服务器的数据更新方法
CN106712992A (zh) * 2015-11-16 2017-05-24 中兴通讯股份有限公司 一种云管理方法和系统
US20190206231A1 (en) * 2017-12-28 2019-07-04 Tionesta, Llc Method and system for monitoring an object using a hub-cloud platform
WO2020207371A1 (zh) * 2019-04-08 2020-10-15 阿里巴巴集团控股有限公司 数据处理系统和方法、装置以及电子设备

Also Published As

Publication number Publication date
CN117240462A (zh) 2023-12-15

Similar Documents

Publication Publication Date Title
CN110572398B (zh) 区块链网络的管控方法、装置、设备及存储介质
CN112422532B (zh) 业务通信方法、系统、装置及电子设备
WO2020143470A1 (zh) 发放数字证书的方法、数字证书颁发中心和介质
EP1233636B1 (en) System and method for over the air configuration security
CN101317417B (zh) 多核心系统的网络接入控制方法及系统
JP4993733B2 (ja) 暗号クライアント装置、暗号パッケージ配信システム、暗号コンテナ配信システム及び暗号管理サーバ装置
CN109104281A (zh) 令牌化硬件安全模块
CN201194396Y (zh) 基于透明代理网关的安全网关平台
CN110489996B (zh) 一种数据库数据安全管理方法及系统
US20190342143A1 (en) Autonomous management of resources by an administrative node network
WO2021139338A1 (zh) 一种数据访问权限验证方法、装置、计算机设备及存储介质
WO2022001683A1 (en) Database access control service in networks
CA2654740C (en) System and method for shared resource owner based access control
CN112287364A (zh) 数据共享方法、装置、系统、介质及电子设备
CN113486082B (zh) 一种基于区块链的外包数据访问控制系统
US20230412368A1 (en) Enabling using external tenant master keys
WO2023236952A1 (zh) 一种云数据处理系统、方法及相关设备
WO2022193494A1 (zh) 权限控制方法及服务器、终端、存储介质和计算机程序
CN115906117A (zh) 一种基于区块链交易可信应用实现方法
CN113259436B (zh) 网络请求的处理方法和装置
CN111970253B (zh) Pep的配置方法、装置、电子设备和存储介质
CN114372245A (zh) 基于区块链的物联网终端认证方法、系统、设备及介质
TWM617427U (zh) 具隱私保護的風險資訊交換系統
US20200374315A1 (en) Policy management system to provide authorization information via distributed data store
CN111464311A (zh) 一种机固多节点一体授权管理的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23819117

Country of ref document: EP

Kind code of ref document: A1