A data security protection method and device in a big data cloud environment

A data security and big data technology, applied in the field of network security, can solve problems such as data error correction, and achieve the effect of ensuring confidentiality and integrity

Active Publication Date: 2020-11-10
BEIJING EASTERN PRISM TECH CORP LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the protection technology for data security in the big data cloud environment mainly adopts the cyclic redundancy check technology. Its advantage is that the technology is mature, and its disadvantage is that it can only correct data errors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security protection method and device in a big data cloud environment
  • A data security protection method and device in a big data cloud environment
  • A data security protection method and device in a big data cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] see figure 1 and 2 A method for protecting data security in a big data cloud environment provided by the present invention, comprising the following steps:

[0079] A. The process in the process running node safely writes the big data in the data storage node;

[0080] B. The process in the process running node safely reads the big data in the data storage node;

[0081] C. Process security creation and migration in a process running node to another process running node;

[0082] Such as image 3 As shown, the step A includes:

[0083] A1. The process in the process running node is to store data slices, calculate the authentication code of the data slices, and perform out-of-order processing;

[0084] A2. The process in the process running node sends the processed file containing the out-of-sequence data slice and its authentication code to the data storage node;

[0085] A3. The process in the process running node applies for an encryption key to the information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security protection method and device in a big data cloud environment. The method includes: dividing devices in the big data cloud environment into data storage nodes, data management nodes, process running nodes, process management nodes and Information security nodes, data storage nodes store out-of-order data files, data management nodes realize the mapping of file names, data piece serial numbers and authentication codes, process running nodes run various business processes to process big data, process management nodes store process information, Realize process scheduling and authentication, and information security nodes generate and store public key certificates. Utilizing the present invention, a large data security protection system can be constructed from data fragmentation, data fragment disorder, authentication code, and process authentication, which can ensure the confidentiality and integrity of data and the authenticity of processes, and effectively prevent theft and tampering Hacking of data, fake process.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data security protection method and device in a big data cloud environment. Background technique [0002] With the rapid development of cloud computing and big data technology, the big data cloud environment can not only provide high-performance parallel data processing, but also provide massive data storage. The big data cloud environment is increasingly storing government, enterprise and personal information. , the value of big data has been paid more and more attention by people. Through big data mining, the management, operation or behavior patterns of governments, enterprises and individuals can be revealed. The importance of big data cloud environment is becoming more and more significant. More and more hackers will Black hands reach out to the big data cloud environment, steal and tamper with data, conduct network fraud through social engineering, and fake websi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
CPCH04L9/0838H04L9/3263H04L63/062H04L63/0823H04L63/102H04L63/123H04L67/10H04L67/563
Inventor 何华张洁何中天
Owner BEIJING EASTERN PRISM TECH CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products