nav emailalert searchbtn searchbox tablepage yinyongbenwen piczone journalimg journalInfo journalinfonormal searchdiv searchzone qikanlogo popupnotification paper paperNew
2025, 05, v.36 37-42
“云计算+大中台”数据安全防护方法研究
基金项目(Foundation): 安徽省自然科学研究重点项目“基于大数据实训平台一体化安全管理研究”(KJ2021A1478)
邮箱(Email):
DOI:
摘要:

针对传统数据安全防护方法不足,提出基于国密算法的“云计算+大中台”防护方案。该方案融合智能体决策模型认证身份,确保合法访问。数据采用分组加密与复合变换强化加密效果。引入中央授权机构生成密钥与策略,结合密钥管理,实现双重防护。实验验证,该方法在抵御恶意攻击上表现卓越,远超常规方法。尤其在恶意节点密集环境下,通过多次迭代防护,数据传输的全局信任值显著提升,从0.58跃升至0.83,彰显了其高效、稳定的防护能力,为云计算及大中台数据安全提供了坚实保障。

Abstract:

Aiming at the shortcomings of traditional data security protection methods,a cloud computing+large and medium-sized platform protection scheme based on national security algorithms is proposed. This solution integrates intelligent decision-making models to authenticate identities and ensure legitimate access. The data is encrypted using group encryption and composite transformation to enhance the encryption effect. Introducing a central authorization agency to generate keys and policies, combined with key management, to achieve dual protection.Experimental verification shows that this method performs excellently in resisting malicious attacks,far exceeding conventional methods. Especially in environments with dense malicious nodes,through multiple iterations of protection,the global trust value of data transmission has significantly increased,jumping from 0. 58 to 0. 83,demonstrating its efficient and stable protection capabilities,providing a solid guarantee for cloud computing and data security in large and medium-sized platforms.

参考文献

[1]陈辉定.基于计算机网络技术的网络信息安全防护体系构建[J].现代雷达,2023,45(2):101-103.

[2]王栋,张显,李达,等.基于分布式异常检测的电网区块链安全防护方案[J].计算机应用,2023,43(S1):139-146.

[3] Jia R,Ni X,Shao X,et al. Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection[J]. Wireless Personal Communications,2023,3(7):1-17.

[4] Anusha Linda Kostka J E,S. Vinila Jinny. Data Security and Privacy Protection in Cloud Computing:A Review[J]. Intelligence in Big Data Technologies—Beyond the Hype,2020,26(7):253-257.

[5]陆永辉,芦振辉,王军伟.量子身份认证技术在档案信息系统安全防护中的应用[J].浙江档案,2022(10):26-28.

[6]于成丽,张阳,贾世杰.云环境中数据安全威胁与防护关键技术研究[J].信息网络安全,2022,22(7):55-63.

[7]彭婧,尹立夫,王洲,等.电力数据脱敏安全防护体系[J].计算机应用,2022,42(S1):191-194.

[8]杨杰,郭逸豪,郭创新,等.考虑模型与数据双重驱动的电力信息物理系统动态安全防护研究综述[J].电力系统保护与控制,2022,50(7):176-187.

[9]陈祥国,尚凡,宋君强.嵌入式系统安全防护方案比较与应用案例分析[J].计算机工程与科学,2022,44(3):417-426.

[10]吴克河,程瑞,姜啸晨,等.基于SDP的电力物联网安全防护方案[J].信息网络安全,2022,22(2):32-38.

[11]宋涛,李秀华,李辉,等.大数据时代下车联网安全加密认证技术研究综述[J].计算机科学,2022,49(4):340-353.

[12]陈晓刚.冶金工业控制系统计算机网络安全防护技术研究[J].湿法冶金,2021,40(6):527-532.

[13]王海,曾飞,杨雄.基于区块链的配电物联网数据安全防护方法[J].电力工程技术,2021,40(5):47-53.

[14]罗鸿轩,金鑫,钱斌,等.基于区块链的台区智能终端与智能电表安全防护方法[J].南方电网技术,2021,15(4):50-58.

[15]苏盛,汪干,刘亮,等.电力物联网终端安全防护研究综述[J].高电压技术,2022,48(2):513-525.

基本信息:

中图分类号:TP309.2

引用信息:

[1]程广振.“云计算+大中台”数据安全防护方法研究[J].陇东学院学报,2025,36(05):37-42.

基金信息:

安徽省自然科学研究重点项目“基于大数据实训平台一体化安全管理研究”(KJ2021A1478)

检 索 高级检索