Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A way to achieve big data security

A technology of big data and big data platform, which is applied in data security transmission and big data field, can solve the problems of no big data system security system, inability to protect sensitive information and sensitive data of big data platform, and improve the security of big data , Improve the effect of the ability to defend against attacks

Active Publication Date: 2018-06-26
苏州比特信安科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Big data is playing an increasingly important role in today's social and economic development, but while big data is centrally processing and storing massive amounts of data, its security issues will also face increasing challenges
[0003] In terms of big data security protection, the conventional methods are to ensure the integrity of the system through traditional systems and components such as firewalls, VPNs, intrusion detection, and anti-virus. The biggest problem with these methods is to ensure system security from the perspective of network protocols and mode characteristics. , it is impossible to implement protection for sensitive information and sensitive data inside the big data platform, that is to say, there is no specific security system for big data systems so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A way to achieve big data security
  • A way to achieve big data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] A method for realizing big data security in a system that realizes big data security, upgrades the original mode of using software and network topology architecture for big data security protection to directly adopts hardware protection, and upgrades the protection level from the original software protection level to hardware The level of protection greatly improves the anti-attack capability of the big data platform, which can effectively improve the security of big data, including the following steps:

[0065] 1) After receiving a piece of data, the DFS client will access the local cache to see if there is a data encryption key for the data;

[0066] 2) After step 1), if the data has a data encryption key, then perform step 4); if the data does not have a data encryption key, then perform step 3);

[0067] 3) After step 1), if the data does not have a data encryption key, then perform the following steps:

[0068] 3-1) A key request will be formed and the key request...

Embodiment 2

[0074] This embodiment is further optimized on the basis of the above-mentioned embodiments, and further for better realizing the method of the present invention, the following setting mode is adopted in particular: the specific steps of the described step 3-2) are:

[0075] 3-2-1) The KMS server requests the production data encryption key from the big data security management board through the REST API interface of the interface board B;

[0076] 3-2-2) The REST API interface initiates a request for the production data encryption key to the second TPM security chip;

Embodiment 3

[0078] This embodiment is further optimized on the basis of any of the above-mentioned embodiments. Further, in order to better realize the method of the present invention, the specific steps of the step 3-3) are:

[0079] 3-3-1) The second TPM security chip generates a data encryption key and returns it to the DFS client;

[0080] 3-3-2) The DFS client caches the data encryption key obtained in step 3-3-1) in the local cache.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for realizing security of big data. The method comprises: a local cache will be accessed by a DFS for determining whether a data encryption key exists in data after the DFS client receives the data; if yes, acquiring a security file corresponding to the data with the data encryption key and transmitting a content into a safety function board of the bid data to perform security protection; if not, firstly requesting to generate the data encryption key; acquiring the security file corresponding to the data with the data encryption key by using a GetFileinfo; and transmitting the content of the security file into the safety function board of the big data to perform the security protection. According to the method for realizing security of the big data, a mode of performing security protection of the big data by using software and a network topology architecture is upgraded to directly use hardware protection; and a protection level is lifted to a hardware protection level from an original software protection level. Therefore, the capacity of a big data platform against an attack is greatly lifted and the security of the big data is effectively improved.

Description

technical field [0001] The invention relates to the technical fields of big data, data security transmission, etc., specifically, a method for realizing big data security. Background technique [0002] Big data is playing an increasingly important role in today's social and economic development, but while big data is centrally processing and storing massive amounts of data, its security issues will also face increasing challenges. [0003] In terms of big data security protection, the conventional methods are to ensure the integrity of the system through traditional systems and components such as firewalls, VPNs, intrusion detection, and anti-virus. The biggest problem with these methods is to ensure system security from the perspective of network protocols and mode characteristics. , it is impossible to protect sensitive information and sensitive data within the big data platform, that is to say, there is no specific security system for big data systems so far. Contents o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64
CPCG06F21/6218G06F21/6245G06F21/64
Inventor 吴鸿钟
Owner 苏州比特信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products