Big data network data protection method and system based on edge computing

A technology for network data and protection systems, applied in the field of network security, which can solve problems such as heavy server load and system crashes

Active Publication Date: 2020-07-03
杭州灿八科技有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the amount of data is soaring. If all calculations are done on the server side, the server will be burdened and it will easily cause system crashes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data network data protection method and system based on edge computing
  • Big data network data protection method and system based on edge computing
  • Big data network data protection method and system based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Such as figure 1 As shown, this embodiment proposes an edge computing-based big data network data protection method, especially a method for encrypting private data such as user passwords, including:

[0086] S1. Determine the computing power level of the client based on the basic information of the client;

[0087] In the era of big data, the amount of user data is increasing rapidly. In order to overcome the problem of overloading the server in the server-based data protection method, the present invention performs part of the data protection calculation based on the client to effectively reduce the processing cost of the server. With the popularization of terminal devices and the development of the Internet of Things in the future, terminal devices are becoming more and more diverse, and the performance on the client side is getting stronger and stronger, which makes it possible to migrate some computing tasks from servers to mobile terminals. Therefore, the present...

Embodiment 2

[0139] Such as figure 2 As shown, this embodiment proposes a big data network data protection system based on edge computing, especially a system for encrypting private data such as user passwords, including:

[0140] A first determining module, configured to determine the computing capability level of the client based on the basic information of the client;

[0141] In the era of big data, the amount of user data is increasing rapidly. In order to overcome the problem of overloading the server in the server-based data protection method, the present invention performs part of the data protection calculation based on the client to effectively reduce the processing cost of the server. With the popularization of terminal devices and the development of the Internet of Things in the future, terminal devices are becoming more and more diverse, and the performance on the client side is getting stronger and stronger, which makes it possible to migrate some computing tasks from server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data network data protection method and system based on edge computing. The big data network data protection method comprises the steps of S1, determining a computing power level of a client; S2, determining the data encryption strength of this time; S3, judging whether the computing power level of the client can meet the encryption strength requirement or not, if yes, executing the step S4, and if not, executing the step S5; S4, slowly encrypting the plaintext password to obtain a first temporary password, and executing the step S8; S5, the application server selects a plurality of other connected clients, and sends the plaintext password, the salt and the encryption strength to the selected client; S6, slowly encrypting the plaintext password by the selectedclient to obtain a second temporary password; S7, the application server determines a first temporary password based on the plurality of received second temporary passwords; and S8, the server quickly encrypts the first temporary password to obtain an encrypted password, and stores the user name, the salt and the encrypted password. Effective balance between safety protection and calculation performance is achieved, and data safety is high.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data protection method and system for a big data network based on edge computing. Background technique [0002] With the widening application of computer network technology and the rapid development of global informatization, informatization content has been deeply penetrated in various fields. The background environment of big data has changed people's worldview. The era of big data is coming. Significantly changed people's lives and made people have a new view of the world, especially the application of computer network technology and effectively integrated data in the data age, which not only speeds up the speed of information processing, but also better and faster statistical acquisition got the information. With the popularization of computer technology, the problem of data security has become an increasingly prominent problem. [0003] The security of data such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0428H04L9/3228H04L2209/12
Inventor 胡俊
Owner 杭州灿八科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products