A big data network data protection method and system based on edge computing

A network data and edge computing technology, applied in the field of network security, can solve problems such as heavy server burden, large computing resource consumption, system crash, etc.

Active Publication Date: 2020-10-02
杭州灿八科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above-mentioned network data protection methods can greatly improve data security, but the amount of calculation and processing is large when encrypting data, which requires a large amount of computing resources
In addition, the amount of data is soaring. If all calculations are done on the server side, the server will be burdened and it will easily cause system crashes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A big data network data protection method and system based on edge computing
  • A big data network data protection method and system based on edge computing
  • A big data network data protection method and system based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Such as figure 1 As shown, this embodiment proposes an edge computing-based big data network data protection method, especially a method for encrypting private data such as user passwords, including:

[0086] S1. Determine the computing power level of the client based on the basic information of the client;

[0087] In the era of big data, the amount of user data is increasing rapidly. In order to overcome the problem of overloading the server in the server-based data protection method, the present invention performs part of the data protection calculation based on the client to effectively reduce the processing cost of the server. With the popularization of terminal devices and the development of the Internet of Things in the future, terminal devices are becoming more and more diverse, and the performance on the client side is getting stronger and stronger, which makes it possible to migrate some computing tasks from servers to mobile terminals. Therefore, the present...

Embodiment 2

[0139] Such as figure 2 As shown, this embodiment proposes a big data network data protection system based on edge computing, especially a system for encrypting private data such as user passwords, including:

[0140] A first determining module, configured to determine the computing capability level of the client based on the basic information of the client;

[0141] In the era of big data, the amount of user data is increasing rapidly. In order to overcome the problem of overloading the server in the server-based data protection method, the present invention performs part of the data protection calculation based on the client to effectively reduce the processing cost of the server. With the popularization of terminal devices and the development of the Internet of Things in the future, terminal devices are becoming more and more diverse, and the performance on the client side is getting stronger and stronger, which makes it possible to migrate some computing tasks from server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data network data protection method and system based on edge computing, including: S1, determining the computing power level of the client; S2, determining the data encryption strength; S3, judging whether the computing power level of the client can meet Encryption strength requirements, if yes, execute step S4, if not, execute step S5; S4, slowly encrypt the plaintext password to obtain the first temporary password, execute step S8; S5, the application server selects multiple other connected clients, and sends the plaintext The password, salt, and encryption strength are sent to the selected client; S6, the selected client slowly encrypts the plaintext password to obtain the second temporary password; S7, the application server determines the first temporary password based on the received multiple second temporary passwords; S8. The server fast-encrypts the first temporary password to obtain an encrypted password, and saves the user name, salt, and the encrypted password. The invention realizes an effective balance between security protection and computing performance, and has high data security.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data protection method and system for a big data network based on edge computing. Background technique [0002] With the widening application of computer network technology and the rapid development of global informatization, informatization content has been deeply penetrated in various fields. The background environment of big data has changed people's worldview. The era of big data is coming. Significantly changed people's lives and made people have a new view of the world, especially the application of computer network technology and effectively integrated data in the data age, which not only speeds up the speed of information processing, but also better and faster statistical acquisition got the information. With the popularization of computer technology, the problem of data security has become an increasingly prominent problem. [0003] The security of data such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0428H04L9/3228H04L2209/12
Inventor 胡俊
Owner 杭州灿八科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products