CN118381664B - Real-time data processing method and system and computer readable storage medium thereof - Google Patents
Real-time data processing method and system and computer readable storage medium thereof Download PDFInfo
- Publication number
- CN118381664B CN118381664B CN202410806752.0A CN202410806752A CN118381664B CN 118381664 B CN118381664 B CN 118381664B CN 202410806752 A CN202410806752 A CN 202410806752A CN 118381664 B CN118381664 B CN 118381664B
- Authority
- CN
- China
- Prior art keywords
- time
- real
- data
- time data
- data packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 7
- 230000005540 biological transmission Effects 0.000 claims abstract description 101
- 238000012545 processing Methods 0.000 claims abstract description 53
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 48
- 238000012795 verification Methods 0.000 claims abstract description 31
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000001360 synchronised effect Effects 0.000 claims abstract description 14
- 230000035945 sensitivity Effects 0.000 claims description 34
- 230000004888 barrier function Effects 0.000 claims description 16
- 238000004458 analytical method Methods 0.000 claims description 13
- 238000013496 data integrity verification Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 4
- 238000012163 sequencing technique Methods 0.000 claims description 4
- 230000002457 bidirectional effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 15
- 230000004044 response Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000005457 optimization Methods 0.000 description 3
- 238000000540 analysis of variance Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012300 Sequence Analysis Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012854 evaluation process Methods 0.000 description 1
- 238000012417 linear regression Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000013179 statistical model Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data processing, in particular to a real-time data processing method and system and a computer readable storage medium thereof, wherein the method comprises the following steps: and (3) distributing a time stamp to each real-time data packet based on the time signal of the global synchronous clock, and generating a time stamp of the real-time data by comparing and calculating the global standard time and the real-time data transmission time. In the invention, the security key is dynamically adjusted through an encryption algorithm, personalized security configuration is carried out aiming at the sending time of each data packet, customized protection measures are provided for confidential and public data, the security of processing the confidential data is improved, the integrity of the data and the identity verification of both sides in the transmission process are further ensured by utilizing the hash message authentication code, the risk of tampering the data is reduced, the data processing efficiency is optimized, a safer and more efficient processing framework is provided for real-time data processing, and the quality and the speed of data stream processing are obviously improved.
Description
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and a system for processing real-time data, and a computer readable storage medium.
Background
The technical field of data processing is a key branch in information technology, relates to a technology and a system for collecting, analyzing, processing and responding data from various sources, and aims to improve the processing efficiency and the response speed of a data stream so as to support various real-time applications, such as online transaction processing, a real-time monitoring system, an automatic control system and a scene requiring rapid data feedback.
The method for processing the real-time data refers to a technical means capable of receiving, processing and feeding back the data in real time, and is mainly used for reducing delay of data processing, so that quick decision support, instant information updating and efficient control are realized. By real-time processing, the data can be analyzed and responded immediately after it is generated, which is important to ensure continuity and efficiency of operation, particularly in fields such as financial services, emergency response, and real-time communication.
The existing real-time data processing method focuses on a batch processing mode, is worry about the application scene with high time sensitivity of processing requirements, and traditional data security measures are static and cannot be adjusted according to the real-time fluidity and sensitivity of the data, so that protection measures are invalid when the network attack is faced. In the transmission delay and security verification process of the data packet in the network, an effective dynamic adjustment mechanism is lacked, so that the data is not protected enough in a high-risk environment. For example, in an emergency response system, due to the lack of the capability of adjusting a data transmission path in real time, key information cannot be processed in time, so that response measures are delayed, the overall efficiency is reduced, the safety risk is increased, the trust of enterprises and institutions on key data processing is affected, the defects of the prior art in the aspects of real-time data processing, dynamic safety adjustment and network optimization are limited, and the application effect and reliability under a high-requirement scene are limited.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a real-time data processing method, a system and a computer readable storage medium thereof.
In order to achieve the above purpose, the present invention adopts the following technical scheme, and a method for processing real-time data, comprising the following steps:
s1: based on the time signal of the global synchronous clock, distributing a time stamp for each real-time data packet, and generating a time stamp of real-time data by comparing and calculating global standard time and real-time data transmission time;
S2: based on the time mark of the real-time data, analyzing the rule of the sending time of the real-time data, comparing the time difference between real-time data packets, and dynamically adjusting the safety key of the real-time data to obtain a key updating instruction;
S3: based on the key updating instruction, evaluating the content sensitivity of the real-time data packet, encrypting the confidential data and the public data by utilizing an encryption algorithm, and generating an encryption configuration file;
S4: based on the encryption configuration file, the security of the real-time data in transmission is enhanced, the integrity of the data is verified through a hash message authentication code, two-way identity authentication is implemented, the identities of a data sender and a data receiver are verified, and a real-time data transmission security result is generated;
S5: based on the real-time data transmission safety result, the safety of the real-time data in transmission is evaluated, the data flow direction and the processing nodes are adjusted, the network delay is optimized, the data playback is avoided, and the optimized network configuration is generated.
As a further scheme of the invention, the time stamp of the real-time data comprises a time stamp, a comparison result of global standard time and data sending time and a time deviation value, the key updating instruction comprises a dynamically adjusted encryption key parameter, a security level and an updating frequency, the encryption configuration file comprises an encryption algorithm type, a target data type and encryption parameter settings of multiple types of data, the real-time data transmission security result comprises an integrity verification state of a data packet, information of bidirectional identity verification and an execution state of a security protocol, and the optimized network configuration comprises new routing of a data flow, adjustment of node processing capacity and updating of network delay and data replay defensive measures.
As a further aspect of the present invention, the step of generating the time stamp of the real-time data by comparing and calculating the global standard time and the real-time data transmission time by assigning a time stamp to each real-time data packet based on the time signal of the global synchronous clock is specifically:
S101: recording the receiving time of each real-time data packet based on the time signal of the global synchronous clock, and calculating the difference between the receiving time and the global standard time to generate a time deviation record;
s102: based on the time deviation record, carrying out time analysis and record on each real-time data packet, comparing the global standard time and the real-time receiving time, adjusting the time stamp of each data packet, and obtaining a corrected time stamp;
S103: and based on the corrected time stamp, carrying out time sequence arrangement on the real-time data packet, analyzing the regularity and periodicity of the real-time data packet through sequencing and comparison, and establishing the time stamp of the real-time data.
As a further scheme of the present invention, based on the time stamp of the real-time data, a rule of the real-time data transmission time is analyzed, a time difference between real-time data packets is compared, a security key of the real-time data is dynamically adjusted, and a key update instruction is obtained specifically by:
s201: based on the time marks of the real-time data, counting the sending time point of each data packet, calculating and comparing the time difference between the data packets, and generating a time interval record;
S202: based on the time interval record, analyzing the time deviation of real-time data transmission, adjusting the target receiving time of each real-time data packet, identifying key real-time data packets, and creating an adjusted time deviation mode;
s203: and based on the adjusted time deviation mode, adjusting the frequency and the intensity of the key by utilizing the safety parameters, updating the safety key of each real-time data packet according to the sending time, and establishing a key updating instruction.
As a further scheme of the invention, based on the key updating instruction, the content sensitivity of the real-time data packet is evaluated, and the confidential data and the public data are encrypted by utilizing an encryption algorithm, so that the step of generating an encryption configuration file comprises the following steps:
S301: based on the key updating instruction, evaluating the sensitivity of the real-time data packet content, setting differentiated security level parameters according to the characteristics of the data content, marking the data content as a key security level if the data content comprises sensitive information, and generating a sensitivity rating table;
S302: based on the sensitivity rating table, if the real-time data is marked as a key security level, applying target encryption, and if the real-time data is marked as a low security level, applying standard encryption to generate an encrypted real-time data set;
S303: based on the encrypted real-time data set, the encryption algorithm and key information of each data packet are recorded, and an encryption configuration file is generated by analyzing and comparing encryption differences of the real-time data packet and the historical data packet.
As a further scheme of the invention, based on the encryption configuration file, the security of the real-time data in transmission is enhanced, the integrity of the data is verified through a hash message authentication code, and two-way identity authentication is implemented, the identities of a data sender and a data receiver are verified, and the step of generating a real-time data transmission security result is specifically as follows:
S401: based on the encryption configuration file, applying a hash function to each real-time data packet, if the real-time data packet is encrypted, calculating a hash value of the real-time data, analyzing and recording key real-time data packets, and generating a data integrity verification record;
s402: based on the data integrity verification record, if the data integrity verification record shows that the real-time data is not adjusted, comparing the authentication information of the real-time data sender and the authentication information of the real-time data receiver, and creating an identity verification state record;
S403: based on the identity verification state record, using a secure socket layer protocol, if the identity verification of a real-time data sender and a receiver passes, verifying the safety of real-time data transmission, evaluating and quantifying the grading of the safety of the real-time data, carrying out the safety priority ordering of the real-time data, and establishing a real-time data transmission safety result;
the formula of the secure socket layer protocol is as follows:
;
wherein S is the security score of the real-time data, P is the encryption level of the data packet, L is the length of the transmitted data, C is the duration of connection, T is the transmission rate of the data packet, and W is the weight coefficient.
As a further scheme of the present invention, based on the real-time data transmission security result, the security of the real-time data in the transmission is evaluated, the data flow direction and the processing node are adjusted, the network delay is optimized, the data playback is avoided, and the steps for generating the optimized network configuration are specifically as follows:
s501: based on the real-time data transmission safety result, analyzing the safety barrier of the real-time data packet in transmission, including unmatched hash value and identity verification failure, checking the safety loophole in the real-time data stream, and creating a safety barrier record;
S502: based on the security barrier record, selecting an optimal path of a real-time data packet flow direction, adjusting a real-time data packet processing node to avoid the security barrier, defining a routing strategy for each data flow, and generating a real-time data flow direction adjustment scheme;
S503: based on the real-time data flow direction adjustment scheme, network delay and real-time data transmission efficiency are optimized, a flow path of real-time data is monitored, real-time data packets are adjusted and processed in real time aiming at security threat of the flow path, and optimized network configuration is established.
A real-time data processing system for performing a method of processing real-time data, the system comprising:
the time stamp module records the sending and receiving time of the real-time data packet based on the time signal of the global synchronous clock, and compares the sending and receiving time with the global standard time to generate a time deviation record;
The time analysis module analyzes and records the sending and receiving time of the real-time data packet based on the time deviation record, adjusts the time stamp to match the global standard time, and establishes a time stamp of the real-time data;
Based on the time mark of the real-time data, the security key module counts the time interval of the real-time data packet transmission, adjusts the update frequency and intensity of the security key and creates a key update instruction;
The sensitivity rating module evaluates the sensitivity of the content of the real-time data packet based on the key updating instruction, encrypts the real-time data packet by using an encryption algorithm, and generates an encryption configuration file;
the data integrity module applies a differential-level encryption strategy to the real-time data packet based on the encryption configuration file, verifies the integrity of the real-time data and generates a real-time data transmission safety result;
And the network adjustment module evaluates the safety of the real-time data transmission based on the real-time data transmission safety result, analyzes the path of the real-time data transmission and establishes the optimized network configuration.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a method of processing real-time data as described above.
Compared with the prior art, the invention has the advantages and positive effects that:
In the invention, the security of the data in the transmission process is further enhanced by dynamically adjusting the security key through an encryption algorithm, personalized security configuration is allowed for the sending time of each data packet, potential security threat can be more effectively resisted, sensitivity of the data packet is evaluated, encryption level is adjusted according to information, customized protection measures are provided for confidential and public data, security of processing the confidential data is improved, resource use is optimized, two-way identity authentication and hash message authentication codes are implemented to further ensure the integrity of the data and identity authentication of both parties in the transmission process, risk of data tampering is reduced, network delay is effectively reduced, data processing efficiency is optimized, response speed is improved, management capability of security holes existing in the data stream is enhanced, a safer and more efficient processing framework is provided for real-time data processing, and quality and speed of data stream processing are remarkably improved.
Drawings
FIG. 1 is a schematic workflow diagram of the present invention;
FIG. 2 is a S1 refinement flowchart of the present invention;
FIG. 3 is a S2 refinement flowchart of the present invention;
FIG. 4 is a S3 refinement flowchart of the present invention;
FIG. 5 is a S4 refinement flowchart of the present invention;
FIG. 6 is a S5 refinement flowchart of the present invention;
fig. 7 is a flow chart of the system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate description of the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Example 1
Referring to fig. 1, the present invention provides a technical solution, a method for processing real-time data, including the following steps:
s1: based on the time signal of the global synchronous clock, distributing a time stamp for each real-time data packet, and acquiring the time stamp of the real-time data by calculating the difference value between the data transmission time and the global standard time, including time synchronization and time difference;
S2: based on the time mark of the real-time data, analyzing the rule of the real-time data sending time, comparing the time difference between the differentiated data packets according to the time mark, dynamically adjusting the safety key of the real-time data, and generating a key updating instruction by referring to the time difference and the frequency of the real-time data packets;
S3: based on the key updating instruction, evaluating the content sensitivity of the real-time data packet, classifying the data according to the sensitivity, encrypting the data, including applying differential-level encryption measures to confidential data and non-confidential data, and establishing an encryption configuration file;
S4: based on the encryption configuration file, optimizing the transmission safety of the real-time data, checking the data integrity by adopting a hash message authentication code, verifying the identities of a data sender and a data receiver, and constructing a real-time data transmission safety result;
S5: based on the real-time data transmission safety result, the transmission safety of the real-time data is evaluated, the data flow and the processing nodes are adjusted, the application of the network delay optimization and the data replay avoidance strategy is included, and the optimized network configuration is generated.
The time mark of the real-time data comprises a time stamp, a comparison result of global standard time and data sending time and a time deviation value, the key updating instruction comprises a dynamically adjusted encryption key parameter, a security level and an updating frequency, the encryption configuration file comprises an encryption algorithm type, a target data type and encryption parameter setting of multiple types of data, the real-time data transmission security result comprises an integrity verification state of a data packet, information of bidirectional identity verification and an execution state of a security protocol, and the optimized network configuration comprises a new route of a data flow, adjustment of node processing capacity and updating of network delay and data replay defenses.
Referring to fig. 2, a time stamp is allocated to each real-time data packet based on a time signal of a global synchronization clock, and the steps of generating a time stamp of real-time data by comparing and calculating a global standard time and a real-time data transmission time are specifically as follows:
s101: recording the receiving time of each real-time data packet based on the time signal of the global synchronous clock, and calculating the difference value between the receiving time and the global standard time to generate the execution flow of the time deviation record as follows;
S101, based on time signals of a global synchronous clock, recording the receiving time of each real-time data packet by adopting a time difference analysis method, calculating the difference between the receiving time and global standard time by utilizing a linear regression algorithm, wherein the algorithm is obtained by constructing a statistical model of time sequence data, parameters including slope and intercept and estimating the parameters from the time synchronous signal data by a least square method.
S102: based on the time deviation record, carrying out time analysis and record on each real-time data packet, comparing the global standard time and the real-time receiving time, adjusting the time stamp of each data packet, and obtaining the execution flow of the corrected time stamp as follows;
s102, based on time deviation record, the sub-step utilizes dynamic time correction technology to conduct time analysis and record on each real-time data packet, an interpolation algorithm is used for correcting time stamps, the time stamps of the data packets are specifically adjusted by calculating deviation from global standard time, key parameters in the interpolation algorithm comprise receiving time of the data packets and time stamps of front and rear time points, the algorithm calculates corrected time stamps through a linear interpolation formula, the time stamps of each data packet are ensured to be consistent with the global standard time, and the corrected time stamps are obtained.
S103: based on the corrected time stamp, time sequence arrangement is carried out on the real-time data packet, and the rule and the periodicity of the real-time data packet are analyzed through sequencing and comparison, so that the execution flow of the time stamp of the real-time data is established as follows;
s103, based on corrected time stamps, the sub-steps adopt a time sequence analysis method to conduct time sequence arrangement on real-time data packets, a merging and sorting algorithm is used for sorting and comparing, the time stamps of the data packets are analyzed to identify the regularity and periodicity of the data packets, the merging and sorting algorithm decomposes the data packets into smaller sequences in the sorting process and is combined into a complete ordered list, key parameters of the algorithm comprise the time stamp of each data packet and comparison logic between the time stamps, time sorting of large-scale data packets is effectively processed, and the time stamp of real-time data is established.
Referring to fig. 3, based on the time stamp of the real-time data, the rule of the real-time data transmission time is analyzed, the time difference between the real-time data packets is compared, the security key of the real-time data is dynamically adjusted, and the step of obtaining the key update instruction is specifically as follows:
S201: based on the time mark of the real-time data, counting the sending time point of each data packet, calculating and comparing the time difference between the data packets, and generating the execution flow of the time interval record as follows;
The S201 substep is based on the time marks of real-time data, the sending time point of each data packet is counted by adopting a statistical analysis method, the time difference between the data packets is calculated by using a differential algorithm, the differential algorithm obtains the time interval by subtracting the time marks of two continuous data packets, key parameters involved in the algorithm comprise the time marks of the data packets and a calculated result array, the method ensures accurate record of the time interval, each time difference is stored in the time interval record array, and the time interval record is generated.
S202: based on the time interval record, analyzing the time deviation of real-time data transmission, adjusting the target receiving time of each real-time data packet, identifying key real-time data packets, and creating an execution flow of an adjusted time deviation mode as follows;
S202, analyzing time deviation of real-time data transmission by using an analysis of variance method based on time interval record, wherein the analysis of variance method identifies key real-time data packets with time deviation larger than a certain threshold value by calculating average value and standard deviation of time interval, the threshold value is set to be twice standard deviation of the average value of time interval, specific values of parameters are dynamically calculated based on actual data, target receiving time of each real-time data packet is adjusted, influence of time deviation on system performance is reduced, and an adjusted time deviation mode is created.
S203: based on the adjusted time deviation mode, adjusting the frequency and intensity of the key by utilizing the safety parameters, updating the safety key of each real-time data packet according to the sending time, and establishing an execution flow of a key updating instruction as follows;
S203, based on the adjusted time deviation mode, the sub-step adopts a dynamic key management technology, the frequency and the intensity of a key are adjusted by utilizing a safety parameter, the key management technology updates the key according to the sending time of each real-time data packet, a key updating algorithm comprises dynamic selection of key length and encryption intensity, the key updating frequency is adjusted according to the change of the time deviation mode, a new key is distributed for each data packet in the key updating process, the safe transmission of data is ensured, the new key is generated according to the requirement through a key generator, the key length is unequal from 256 bits to 512 bits, and the key updating instruction is established according to the sensitivity degree and the transmission distance of the data packet.
Referring to fig. 4, based on the key update instruction, the content sensitivity of the real-time data packet is evaluated, and the confidential data and the public data are encrypted by using an encryption algorithm, so as to generate an encryption configuration file specifically including:
S301: based on the key updating instruction, evaluating the sensitivity of the real-time data packet content, setting differentiated security level parameters according to the characteristics of the data content, marking the data content as a key security level if the data content comprises sensitive information, and generating an execution flow of a sensitivity rating table as follows;
S301, based on a key updating instruction, evaluating the sensitivity of real-time data packet contents by adopting a data classification technology, wherein the data classification technology identifies sensitive information in the data contents through a content analysis algorithm such as pattern matching, the sensitive information identifies personal identity information, financial data and geographic position information, differential security level parameters are set according to the characteristics of the data contents, key parameters in the algorithm comprise a sensitive vocabulary list and a matching threshold, the matching threshold is set to be more than 50% of the matching degree of the data packet contents and the sensitive vocabulary list, if the data contents comprise the sensitive information, the data packets are marked as key security levels, and the evaluation result of each data packet is stored in a sensitivity rating table to generate a sensitivity rating table.
S302: based on the sensitivity rating table, if the real-time data is marked as a key security level, applying target encryption, and if the real-time data is marked as a low security level, applying standard encryption, and generating an encrypted real-time data set, wherein the execution flow is as follows;
S302, based on a sensitivity rating table, a conditional branch encryption technology is adopted, encryption algorithms with different intensities are applied according to the security level of a data packet, if the real-time data is marked as a key security level, target encryption such as AES-256 is applied, if the real-time data is marked as a low security level, standard encryption such as AES-128 is applied, the selection of the encryption algorithm is dynamically determined based on the security level parameters, the key length and the encryption algorithm are directly determined by the sensitivity rating of the data packet, the high confidentiality of sensitive information and the efficient processing of non-sensitive information are ensured, and an encrypted real-time data set is generated.
S303: based on the encrypted real-time data set, recording the encryption algorithm and key information of each data packet, and generating an encryption configuration file by analyzing and comparing the encryption difference between the real-time data packet and the historical data packet, wherein the execution flow is as follows;
S303, based on the encrypted real-time data set, the encryption algorithm and key information of each data packet are recorded by using a key record management technology, technical operations comprise recording of encryption algorithm names, key lengths and key actual values, comparing encryption algorithm and key configuration differences of the real-time data packet and the historical data packet by using a historical data comparison analysis technology, executing by database query and data matching, and key parameters comprise data packet identifiers and encryption algorithm versions, ensuring continuity of encryption strategies and tracking of security updates and generating an encryption configuration file.
Referring to fig. 5, based on the encrypted configuration file, the security of the real-time data in transmission is enhanced, the integrity of the data is verified through the hash message authentication code, and two-way identity authentication is implemented, so as to verify the identities of the data sender and the data receiver, and the step of generating the real-time data transmission security result specifically includes:
S401: based on the encryption configuration file, applying a hash function to each real-time data packet, if the real-time data packet is encrypted, calculating a hash value of the real-time data, analyzing and recording key real-time data packets, and generating an execution flow of a data integrity verification record as follows;
S401 substep applies a hash function to each real-time data packet based on the encryption configuration file by adopting a secure hash algorithm (SHA-256), the operation comprises calculating a hash value for the encrypted real-time data packet, the calculation process involves converting the data packet content into a hash value with a fixed length by the SHA-256 algorithm, ensuring the irreversibility and uniqueness of the data, key parameters in the algorithm operation are the data packet content and the algorithm itself, no external parameters are involved, the calculated hash value is used for subsequent data integrity analysis, the key real-time data packet is specially marked, the hash value of the data packet is recorded, and the data integrity verification record is generated for verifying whether the data packet is tampered in the transmission process in the future.
S402: based on the data integrity verification record, if the data integrity verification record shows that the real-time data is not adjusted, comparing the authentication information of the real-time data sender and the authentication information of the real-time data receiver, and creating an execution flow of the identity verification state record is as follows;
S402, based on the data integrity verification record, if the record shows that the real-time data is not adjusted, namely the hash value is consistent with that before transmission, an identity verification comparison program is executed, authentication information of a real-time data sender and authentication information of a receiver are compared, the verification program uses a digital signature technology, whether signatures are matched or not is confirmed through decrypting public key information of the sender, key parameters comprise a public key, the digital signature and a verification key of the receiver, an identity verification state record is created through a comparison result, the identity matching condition of the sender and the receiver is confirmed, and the identity verification state record is created.
S403: based on the identity verification state record, using a secure socket layer protocol, if the identity verification of a real-time data sender and a receiver passes, verifying the safety of real-time data transmission, evaluating and quantifying the grading of the safety of the real-time data, carrying out the safety priority sequencing of the real-time data, and establishing an execution flow of a real-time data transmission safety result as follows;
S403, based on the identity verification state record, verifying the identity verification results of the sender and the receiver of the real-time data by adopting a Secure Socket Layer (SSL), if the verification is passed, further evaluating the safety of the real-time data transmission, wherein an encryption transmission safety grading system is used in the evaluation process, the system calculates safety grading according to the sensitivity, transmission encryption strength and the identity verification result of the data, the grading algorithm relates to a plurality of evaluation indexes including encryption algorithm strength, the integrity of the identity verification and the sensitivity level of the data, and the safety priority ordering of the real-time data is carried out according to the grading result, so that the high-risk data is ensured to obtain priority protection, and the real-time data transmission safety result is established.
The formula of the secure socket layer protocol is as follows:
;
Wherein S is the security score of the real-time data, P is the encryption level of the data packet, L is the length of the transmitted data, C is the duration of connection, T is the transmission rate of the data packet, and W is the weight coefficient;
The execution flow is as follows:
The encryption level P of the data packet is evaluated, the encryption algorithm is represented by the intensity, for example, the AES-256 algorithm is higher, the transmission length L of data is measured, the total byte number of the data packet in the transmission process is referred, the duration C of connection is recorded, the durability of data transmission and the stability on a network are reflected, the transmission rate T of the data packet is calculated, the data quantity transmitted per second is represented, the data security during high-speed transmission is evaluated by increasing parameters, the weight coefficient W is determined by analyzing the historical data transmission security event, the coefficient is adjusted according to the security influence degree of different encryption levels, data length, connection time and transmission rate, the data security score S is calculated, and the comprehensive security in the data transmission process is reflected.
Referring to fig. 6, based on the real-time data transmission security result, the steps of evaluating the security of real-time data in transmission, adjusting data flow direction and processing nodes, optimizing network delay and avoiding data playback, and generating an optimized network configuration are specifically as follows:
S501: based on a real-time data transmission safety result, analyzing safety barriers of real-time data packets in transmission, including unmatched hash values and identity verification failures, checking safety holes in real-time data streams, and creating an execution flow of a safety barrier record as follows;
S501, analyzing security barriers of real-time data packets in transmission by adopting a data packet analysis technology based on real-time data transmission security results, refining and checking hash values and identity verification results of the data packets, identifying unmatched hash values and instances of identity verification failure, comparing the hash value of each data packet with an expected hash value, simultaneously verifying validity of a digital signature, ensuring data integrity and authenticity of a sender, and identifying and recording security vulnerabilities and potential risks in data streams according to analysis results, and creating security barrier records.
S502: based on the security barrier record, selecting an optimal path of the real-time data packet flow direction, adjusting a real-time data packet processing node to avoid the security barrier, defining a routing strategy for each data flow, and generating an execution flow of a real-time data flow direction adjustment scheme as follows;
The S502 substep is based on the security barrier record, an optimal path of a real-time data packet flow is selected by using a network routing algorithm, the algorithm dynamically adjusts processing nodes of the data packet based on the security level and the network condition of the data packet so as to avoid the identified security barrier, the network routing algorithm comprises shortest path priority and load balancing strategies, key parameters comprise the network state of the nodes, the security level and the predefined network topology of the data packet, the most suitable routing strategy is defined for each data stream according to the parameters, the security and the efficiency of data transmission are ensured, and a real-time data flow direction adjusting scheme is generated.
S503: based on a real-time data flow direction adjustment scheme, network delay and real-time data transmission efficiency are optimized, a flow path of real-time data is monitored, real-time data packets are adjusted and processed in real time aiming at security threat of the flow path, and an execution flow of optimized network configuration is established as follows;
The step S503 is based on a real-time data flow direction adjustment scheme, a network optimization technology is adopted to optimize network delay and real-time data transmission efficiency, a flow path of real-time data is monitored and adjusted, real-time adjustment and processing are carried out on security threats of the identified flow path according to real-time monitoring data, key parameters comprise network delay data, transmission rate and security logs, the technology ensures smooth transmission of data flows in a network and minimizes potential security risks, and the optimized network configuration is established by adjusting routing and network configuration and responding to network state changes in real time.
Referring to fig. 7, a real-time data processing system is configured to execute a real-time data processing method, where the system includes:
the time stamp module records the sending and receiving time of the real-time data packet based on the time signal of the global synchronous clock, and compares the sending and receiving time with the global standard time to generate a time deviation record;
The time analysis module is used for analyzing and recording the sending and receiving time of the real-time data packet based on the time deviation record, adjusting the time stamp to match the global standard time and establishing a time stamp of the real-time data;
The security key module counts the time interval of sending the real-time data packet based on the time mark of the real-time data, adjusts the update frequency and the intensity of the security key, and creates a key update instruction by referring to the values of the sending frequency and the time interval of the real-time data packet;
The sensitivity rating module evaluates the sensitivity of the content of the real-time data packet based on the key updating instruction, encrypts the real-time data packet by using an encryption algorithm, sorts the sensitivity of the real-time data packet, optimizes the safety and the processing efficiency of the real-time data, and generates an encryption configuration file;
the data integrity module applies a differential-level encryption strategy to the real-time data packet based on the encryption configuration file, verifies the integrity of the real-time data, and generates a real-time data transmission safety result by utilizing the hash message authentication code;
the network adjustment module evaluates the security of the real-time data transmission based on the real-time data transmission security result, analyzes the path of the real-time data transmission, evaluates and quantifies the security score of the data transmission, optimizes the network efficiency and the security of the data transmission, and establishes the optimized network configuration.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a method of processing real-time data as described above.
The present invention is not limited to the above embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent changes and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure.
Claims (4)
1. A method for processing real-time data, comprising the steps of:
Based on the time signal of the global synchronous clock, distributing a time stamp for each real-time data packet, and generating a time stamp of real-time data by comparing and calculating global standard time and real-time data transmission time;
based on the time mark of the real-time data, analyzing the rule of the sending time of the real-time data, comparing the time difference between real-time data packets, and dynamically adjusting the safety key of the real-time data to obtain a key updating instruction;
Based on the key updating instruction, evaluating the content sensitivity of the real-time data packet, encrypting the confidential data and the public data by utilizing an encryption algorithm, and generating an encryption configuration file;
Based on the encryption configuration file, the security of the real-time data in transmission is enhanced, the integrity of the data is verified through a hash message authentication code, two-way identity authentication is implemented, the identities of a data sender and a data receiver are verified, and a real-time data transmission security result is generated;
based on the real-time data transmission safety result, evaluating the safety of the real-time data in transmission, adjusting the data flow direction and the processing nodes, optimizing the network delay and avoiding the data replay, and generating the optimized network configuration;
The time mark of the real-time data comprises a time stamp, a comparison result of global standard time and data sending time and a time deviation value, the key updating instruction comprises a dynamically adjusted encryption key parameter, a security level and an updating frequency, the encryption configuration file comprises an encryption algorithm type, a target data type and encryption parameter settings of multiple types of data, the real-time data transmission security result comprises an integrity verification state of a data packet, information of bidirectional identity verification and an execution state of a security protocol, and the optimized network configuration comprises new routing of a data flow, adjustment of node processing capacity and updating of network delay and data replay defensive measures;
The method comprises the steps of distributing a time stamp to each real-time data packet based on a time signal of a global synchronous clock, and generating the time stamp of real-time data by comparing and calculating global standard time and real-time data transmission time, wherein the steps are as follows:
Recording the receiving time of each real-time data packet based on the time signal of the global synchronous clock, and calculating the difference between the receiving time and the global standard time to generate a time deviation record;
Based on the time deviation record, carrying out time analysis and record on each real-time data packet, comparing the global standard time and the real-time receiving time, adjusting the time stamp of each data packet, and obtaining a corrected time stamp;
based on the corrected time stamp, performing time sequence arrangement on the real-time data packet, analyzing the regularity and periodicity of the real-time data packet through sequencing and comparison, and establishing a time stamp of the real-time data;
Based on the time mark of the real-time data, analyzing the rule of the sending time of the real-time data, comparing the time difference between real-time data packets, and dynamically adjusting the safety key of the real-time data, wherein the step of obtaining the key updating instruction comprises the following specific steps:
based on the time marks of the real-time data, counting the sending time point of each data packet, calculating and comparing the time difference between the data packets, and generating a time interval record;
Based on the time interval record, analyzing the time deviation of real-time data transmission, adjusting the target receiving time of each real-time data packet, identifying key real-time data packets, and creating an adjusted time deviation mode;
based on the adjusted time deviation mode, adjusting the frequency and intensity of the secret key by utilizing the safety parameters, updating the safety secret key of each real-time data packet according to the sending time, and establishing a secret key updating instruction;
Based on the key updating instruction, evaluating the content sensitivity of the real-time data packet, encrypting the confidential data and the public data by using an encryption algorithm, and generating an encryption configuration file specifically comprises the following steps:
based on the key updating instruction, evaluating the sensitivity of the real-time data packet content, setting differentiated security level parameters according to the characteristics of the data content, marking the data content as a key security level if the data content comprises sensitive information, and generating a sensitivity rating table;
Based on the sensitivity rating table, if the real-time data is marked as a key security level, applying target encryption, and if the real-time data is marked as a low security level, applying standard encryption to generate an encrypted real-time data set;
Based on the encrypted real-time data set, recording an encryption algorithm and key information of each data packet, and generating an encryption configuration file by analyzing and comparing encryption differences of the real-time data packet and the historical data packet;
Based on the encryption configuration file, the security of the real-time data in transmission is enhanced, the integrity of the data is verified through a hash message authentication code, and two-way identity authentication is implemented, the identities of a data sender and a data receiver are verified, and the step of generating a real-time data transmission security result is specifically as follows:
Based on the encryption configuration file, applying a hash function to each real-time data packet, if the real-time data packet is encrypted, calculating a hash value of the real-time data, analyzing and recording key real-time data packets, and generating a data integrity verification record;
Based on the data integrity verification record, if the data integrity verification record shows that the real-time data is not adjusted, comparing the authentication information of the real-time data sender and the authentication information of the real-time data receiver, and creating an identity verification state record;
Based on the identity verification state record, using a secure socket layer protocol, if the identity verification of a real-time data sender and a receiver passes, verifying the safety of real-time data transmission, evaluating and quantifying the grading of the safety of the real-time data, carrying out the safety priority ordering of the real-time data, and establishing a real-time data transmission safety result;
the formula of the secure socket layer protocol is as follows:
;
wherein S is the security score of the real-time data, P is the encryption level of the data packet, L is the length of the transmitted data, C is the duration of connection, T is the transmission rate of the data packet, and W is the weight coefficient.
2. The method for processing real-time data according to claim 1, wherein the steps of evaluating the security of real-time data in transmission, adjusting data flow direction and processing nodes, optimizing network delay and circumventing data playback, and generating an optimized network configuration based on the real-time data transmission security result are specifically as follows:
Based on the real-time data transmission safety result, analyzing the safety barrier of the real-time data packet in transmission, including unmatched hash value and identity verification failure, checking the safety loophole in the real-time data stream, and creating a safety barrier record;
Based on the security barrier record, selecting an optimal path of a real-time data packet flow direction, adjusting a real-time data packet processing node to avoid the security barrier, defining a routing strategy for each data flow, and generating a real-time data flow direction adjustment scheme;
based on the real-time data flow direction adjustment scheme, network delay and real-time data transmission efficiency are optimized, a flow path of real-time data is monitored, real-time data packets are adjusted and processed in real time aiming at security threat of the flow path, and optimized network configuration is established.
3. A real-time data processing system, wherein the real-time data processing system is configured to perform a real-time data processing method according to any one of claims 1 to 2, the system comprising:
the time stamp module records the sending and receiving time of the real-time data packet based on the time signal of the global synchronous clock, and compares the sending and receiving time with the global standard time to generate a time deviation record;
The time analysis module analyzes and records the sending and receiving time of the real-time data packet based on the time deviation record, adjusts the time stamp to match the global standard time, and establishes a time stamp of the real-time data;
Based on the time mark of the real-time data, the security key module counts the time interval of the real-time data packet transmission, adjusts the update frequency and intensity of the security key and creates a key update instruction;
The sensitivity rating module evaluates the sensitivity of the content of the real-time data packet based on the key updating instruction, encrypts the real-time data packet by using an encryption algorithm, and generates an encryption configuration file;
the data integrity module applies a differential-level encryption strategy to the real-time data packet based on the encryption configuration file, verifies the integrity of the real-time data and generates a real-time data transmission safety result;
And the network adjustment module evaluates the safety of the real-time data transmission based on the real-time data transmission safety result, analyzes the path of the real-time data transmission and establishes the optimized network configuration.
4. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of a method of processing real-time data according to any one of claims 1 to 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410806752.0A CN118381664B (en) | 2024-06-21 | 2024-06-21 | Real-time data processing method and system and computer readable storage medium thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410806752.0A CN118381664B (en) | 2024-06-21 | 2024-06-21 | Real-time data processing method and system and computer readable storage medium thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118381664A CN118381664A (en) | 2024-07-23 |
CN118381664B true CN118381664B (en) | 2024-08-16 |
Family
ID=91904246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410806752.0A Active CN118381664B (en) | 2024-06-21 | 2024-06-21 | Real-time data processing method and system and computer readable storage medium thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118381664B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118568754A (en) * | 2024-07-31 | 2024-08-30 | 浙江大学 | High-credibility learning resource safe sharing method and device based on big data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117238458A (en) * | 2023-09-14 | 2023-12-15 | 广东省第二人民医院(广东省卫生应急医院) | Critical care cross-mechanism collaboration platform system based on cloud computing |
CN118075029A (en) * | 2024-04-19 | 2024-05-24 | 深圳市国硕宏电子有限公司 | Cloud computing electronic information secure storage system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11282017B2 (en) * | 2015-07-11 | 2022-03-22 | RiskRecon Inc. | Systems and methods for monitoring information security effectiveness |
US20240163261A1 (en) * | 2015-10-28 | 2024-05-16 | Qomplx Llc | Dynamic authentication attack detection and enforcement at network, application, and host level |
-
2024
- 2024-06-21 CN CN202410806752.0A patent/CN118381664B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117238458A (en) * | 2023-09-14 | 2023-12-15 | 广东省第二人民医院(广东省卫生应急医院) | Critical care cross-mechanism collaboration platform system based on cloud computing |
CN118075029A (en) * | 2024-04-19 | 2024-05-24 | 深圳市国硕宏电子有限公司 | Cloud computing electronic information secure storage system |
Also Published As
Publication number | Publication date |
---|---|
CN118381664A (en) | 2024-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs | |
Pourvahab et al. | An efficient forensics architecture in software-defined networking-IoT using blockchain technology | |
US11729186B2 (en) | Blockchain architecture for computer security applications | |
Kolokotronis et al. | On blockchain architectures for trust-based collaborative intrusion detection | |
US8166122B2 (en) | Method and apparatus for generating a figure of merit for use in transmission of messages in a multi-level secure environment | |
EP2321779B1 (en) | Collecting anonymous and traceable telemetry | |
CN110677234B (en) | Privacy protection method and system based on homomorphic encryption blockchain | |
CN118381664B (en) | Real-time data processing method and system and computer readable storage medium thereof | |
Sateesh et al. | State-of-the-art VANET trust models: Challenges and recommendations | |
Mengidis et al. | Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities | |
CN114139203A (en) | Block chain-based heterogeneous identity alliance risk assessment system and method and terminal | |
Rafati Niya et al. | Architectures for Blockchain‐IoT Integration | |
Ayobi et al. | A lightweight blockchain-based trust model for smart vehicles in vanets | |
Parmar et al. | Privacy-preserving authentication scheme for vanets using blockchain technology | |
Lam et al. | Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs | |
Xiao et al. | GlobalView: building global view with log files in a distributed/networked system for accountability | |
Lee et al. | A privacy-preserving interdomain audit framework | |
Al-Zubaidie et al. | Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors | |
Liu et al. | A trust chain assessment method based on blockchain for SDN network nodes | |
Mashima et al. | Enhancing demand response signal verification in automated demand response systems | |
Asadzadeh Kaljahi et al. | TSSL: improving SSL/TLS protocol by trust model | |
Latah et al. | CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication | |
Rahalkar et al. | SoK: Content Moderation Schemes in End-to-End Encrypted Systems | |
Aftab et al. | Towards a distributed ledger based verifiable trusted protocol for VANET | |
Zhang et al. | RuleChain: A Novel Intrusion Rules Distribution Method Based on Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |