Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security and protection monitoring big data processing method and system based on cloud computing

A technology of big data processing and security monitoring, which is applied in the direction of digital transmission system, transmission system, closed-circuit television system, etc., can solve the problems of potential safety hazards, difficulty in resisting DDOS attacks, and insufficient security, so as to improve security, eliminate potential safety hazards, The effect of guaranteeing processing efficiency

Active Publication Date: 2017-12-12
广州宏和网络科技有限公司
View PDF4 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, Hadoop-based cloud computing technology has been successfully applied in the field of security monitoring big data, which has greatly improved the processing efficiency of security monitoring big data, but its essence is a distributed processing method, which is difficult to resist DDOS attacks (distributed denial of service attack), not secure enough
In addition, in the field of security monitoring, most of the security monitoring big data comes from distributed IoT nodes (such as camera nodes, etc.), and the current distributed IoT nodes are also difficult to resist DDOS attacks, and there are also security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection monitoring big data processing method and system based on cloud computing
  • Security and protection monitoring big data processing method and system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] Aiming at the defect that the existing security monitoring big data processing method cannot meet the requirements of high processing efficiency and safety at the same time, the present invention proposes a new security monitoring big data processing method and system.

[0084] Such as figure 1 As shown, the security monitoring big data processing method specifically includes the following steps:

[0085] (1) Obtain security monitoring data of IoT nodes.

[0086] Among them, the Internet of Things node of the present invention is provided with cameras, audio collection equipment, positioning devices, etc., in locations such as communities and arterial roads to conveniently obtain data such as video monitoring data, audio monitoring data, and location positioning data. In addition, the security monitoring data also includes the paid monitoring service request data of each IoT node, which is used to request the paid monitoring service from the paid monitoring service provider.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security and protection monitoring big data processing method and system based on cloud computing. The method comprises the following steps: obtaining security and protection monitoring data of an Internet of Things node; dividing the obtained security and protection monitoring data into first security and protection monitoring data and second security and protection monitoring data according to a set security threshold; sending the first security and protection monitoring data to a block chain platform for data processing; and sending the second security and protection monitoring data to a cloud platform for data processing. According to the security and protection monitoring big data processing method and system, the second security and protection monitoring data with relatively low security requirements are sent to the cloud platform for data processing, thereby ensuring the security and protection monitoring big data processing efficiency; meanwhile the first security and protection monitoring data with relatively high security requirements are sent to the block chain platform for data processing, and DDOS attack is defended by the features of openness, transparency and non-tempering of the block chain technology, thereby eliminating the potential safety hazards caused by the DDOS attack to the cloud platform and the distributed Internet of Things nodes, and being securer. The security and protection monitoring big data processing method and system can be widely used in the field of security and protection.

Description

Technical field [0001] The invention relates to the field of security, in particular to a cloud computing-based security monitoring big data processing method and system. Background technique [0002] In the field of security, the issue of information islands is very prominent. In a city, there are both camera monitoring equipment installed by the public security department and camera monitoring equipment installed by various units. The monitoring data generated by these devices or systems is difficult to achieve interconnection and intercommunication, resulting in the phenomenon of information islands, "you can only see the trees but not the forest." In recent years, the construction of smart cities with cloud computing and the Internet of Things as the core put forward the concept of big security, trying to integrate these isolated monitoring information, so as to achieve networking and sharing. However, the huge amount of security monitoring data causes huge consumption of c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/26H04N7/18
CPCH04L43/16H04L63/0428H04L63/0815H04L63/0861H04L63/1458H04L63/1466H04L67/10H04L67/125H04N7/18
Inventor 付翠萍
Owner 广州宏和网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products