CN-118827129-B - Data detection method, device, system, storage medium and computer program product
Abstract
The application discloses a data detection method which is applied to a computing power resource scheduling management node and comprises the steps of determining a first computing power node, a second computing power node and a third computing power node which have association relation with first data identification information based on a first pollution detection request if the first pollution detection request sent by a pollution detection node is received, wherein the first pollution detection request is used for requesting pollution detection of first encrypted data corresponding to the first data identification information, sending the first pollution detection request, the first node identification information of the first computing power node and the second node identification information of the second computing power node to the third computing power node, the third computing power node is used for executing pollution detection operation, the safety performance of the first computing power node is lower than or equal to that of the third computing power node, and the safety performance of the third computing power node is lower than or equal to that of the second computing power node. The application also discloses a data detection device, a system, a storage medium and a computer program product.
Inventors
- ZHANG XINYUE
- GUO SIXU
- GENG HUIZHENG
- SU LI
- YANG XIAOMEI
Assignees
- 中国移动通信有限公司研究院
- 中国移动通信集团有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20240403
Claims (19)
- 1. A method of data detection, the method being applied to a computing resource scheduling management node, the method comprising: If a first pollution detection request sent by a pollution detection node is received, determining a first power calculation node, a second power calculation node and a third power calculation node which have association relation with first data identification information based on the first pollution detection request, wherein the first pollution detection request is used for requesting pollution detection on first encrypted data corresponding to the first data identification information; The pollution detection method comprises the steps of sending the first pollution detection request, first node identification information for identifying the first computing power node and second node identification information for identifying the second computing power node to the third computing power node, wherein the third computing power node is used for executing pollution detection operation corresponding to the first pollution detection request, the safety performance of the first computing power node is lower than or equal to that of the third computing power node, and the safety performance of the third computing power node is lower than or equal to that of the second computing power node; if a first pollution detection request sent by a pollution detection node is received, determining a first computing node, a second computing node and a third computing node with an association relationship with first data identification information based on the first pollution detection request, including: if the first pollution detection request is received, determining a first computing node for storing first encrypted data corresponding to the first data identification information and a second computing node for obtaining the first encrypted data through encryption processing; performing resource scheduling management based on the first pollution detection request, and distributing the corresponding third computing power node for the first data identification information; And if the second computing node does not comprise authentication information for performing authentication processing on the first encrypted data, sending the authentication information to the second computing node so that the second computing node can execute response operation for responding to the second pollution detection request sent by the third computing node based on the authentication information.
- 2. The method according to claim 1, wherein the determining the first, second and third computing nodes having an association with the first data identification information based on the first pollution detection request if the first pollution detection request sent by the pollution detection node is received includes: If the first pollution detection request is received, determining a first power node for storing first encrypted data corresponding to the first data identification information; and performing resource scheduling management based on the first pollution detection request, and distributing the corresponding second computing power node and third computing power node for the first data identification information.
- 3. The method according to any of claims 1 to 2, wherein the first, second and third force nodes belong to three different nodes, or the first, second and third force nodes belong to two different nodes, any two of which are one node, or the first, second and third force nodes belong to one node.
- 4. A method of data detection, the method being applied to a third computing node, the method comprising: receiving a first pollution detection request sent by a computing power resource scheduling management node, first node identification information for identifying the first computing power node and second node identification information for identifying the second computing power node, wherein the first pollution detection request is used for requesting pollution detection on first encrypted data corresponding to the first data identification information; generating a second pollution detection request based on the first data identification information, wherein the second pollution detection request is used for requesting a pollution detection token corresponding to the first data identification information; Sending the second pollution detection request to a second computing node corresponding to the second node identification information; Receiving a pollution detection token sent by the second computing node, wherein the pollution detection token is generated by the second computing node based on the second pollution detection request; The pollution inquiry request comprising the pollution detection token is sent to the first computing node, wherein the pollution inquiry request is used for acquiring pollution detection data which is stored in the first computing node and is related to first encrypted data; Receiving the pollution detection data sent by the first computing node; performing pollution detection based on the pollution detection data to obtain a pollution detection result; And sending the pollution detection result to a pollution detection node.
- 5. The method of claim 4, wherein generating a second pollution detection request based on the first data identification information comprises: Acquiring a time stamp; Generating signature information for the first data identification information, the timestamp and the third node identification information by adopting a preset signature mode; generating the second contamination detection request comprising the signature information.
- 6. The method according to claim 4 or 5, wherein the performing pollution detection based on the pollution detection data to obtain a pollution detection result comprises: decrypting the pollution detection data by adopting authentication information to obtain data to be analyzed, a data index and a pollution evaluation threshold; calculating a pollution evaluation value corresponding to the data to be analyzed based on the data to be analyzed and the data index; And obtaining the pollution detection result based on the pollution evaluation value and the pollution evaluation threshold.
- 7. The method of claim 6, wherein the data index comprises a set of expected and variance corresponding to the data to be analyzed.
- 8. A method of data detection, the method being applied to a second computing node, the method comprising: receiving a second pollution detection request sent by a third computing node, wherein the second pollution detection request is used for requesting a pollution detection token corresponding to the first data identification information; Performing authentication processing on the second pollution detection request to obtain an authentication result; If the authentication result indicates that the authentication is passed, generating the pollution detection token based on the second pollution detection request; Transmitting the pollution detection token to the third computing node; if data to be stored, which is sent by a computing power resource scheduling management node, is received, encryption processing is carried out on the data to be stored by adopting authentication information to obtain first encrypted data, wherein the data to be stored is sent to the computing power resource scheduling management node by a data providing node; And sending the first encrypted data to a first computing power node, wherein the first computing power node is indicated by the computing power resource scheduling management node.
- 9. The method of claim 8, wherein authenticating the second contamination detection request to obtain an authentication result comprises: And carrying out signature authentication on the signature information included in the second pollution detection request to obtain an authentication result.
- 10. The method of claim 9, wherein generating the pollution detection token based on the second pollution detection request if the authentication result indicates authentication pass comprises: And if the authentication result indicates that the authentication is passed, generating the pollution detection token based on the first data identification information included in the signature information.
- 11. The method of claim 8, wherein the method further comprises: And receiving authentication information which is sent by the computing power resource scheduling management node and has an association relation with the first data identification information.
- 12. The method of claim 8, wherein the method further comprises: classifying the data to be stored to obtain n types of data to be analyzed and data identification information of each type of data to be analyzed; calculating the expected and variance of each type of data to be analyzed; Based on the data identification information, the expectation and the variance of each type of the data to be analyzed, establishing and obtaining a data index corresponding to each type of the data to be analyzed; And encrypting the data index by adopting the authentication information to obtain an encryption index.
- 13. The method according to claim 12, wherein the method further comprises: Determining a pollution evaluation threshold corresponding to each type of data to be analyzed based on each type of data to be analyzed; And obtaining a pollution verification dictionary based on the data identification information of the n-class data to be analyzed and the pollution evaluation threshold value.
- 14. The first data detection device is characterized in that the device is applied to a computing resource scheduling management node, and comprises a first determination unit and a first sending unit, wherein: The first determining unit is configured to determine, if a first pollution detection request sent by a pollution detection node is received, a first power node, a second power node and a third power node that have an association relationship with first data identification information based on the first pollution detection request, where the first pollution detection request is used to request pollution detection on first encrypted data corresponding to the first data identification information; The first sending unit is configured to send the first pollution detection request, first node identification information for identifying the first computing node, and second node identification information for identifying the second computing node to the third computing node, where the third computing node is configured to perform a pollution detection operation corresponding to the first pollution detection request, and the security performance of the first computing node is lower than or equal to the security performance of the third computing node, and the security performance of the third computing node is lower than or equal to the security performance of the second computing node; The first determining unit is specifically configured to implement the following steps: if the first pollution detection request is received, determining a first computing node for storing first encrypted data corresponding to the first data identification information and a second computing node for obtaining the first encrypted data through encryption processing; performing resource scheduling management based on the first pollution detection request, and distributing the corresponding third computing power node for the first data identification information; The first sending unit is further configured to send the authentication information to the second computing node if the second computing node does not include authentication information for performing authentication processing on the first encrypted data, so that the second computing node performs a response operation for responding to the second pollution detection request sent by the third computing node based on the authentication information.
- 15. The second data detection device is characterized in that the device is applied to a third computing node and comprises a first receiving unit, a first generating unit, a second sending unit and a detection unit, wherein: The first receiving unit is used for receiving a first pollution detection request sent by the computing power resource scheduling management node, first node identification information used for identifying the first computing power node and second node identification information used for identifying the second computing power node, wherein the first pollution detection request is used for requesting to carry out pollution detection on first encrypted data corresponding to the first data identification information; The first generation unit is used for generating a second pollution detection request based on the first data identification information, wherein the second pollution detection request is used for requesting a pollution detection token corresponding to the first data identification information; the second sending unit is configured to send the second pollution detection request to a second computing node corresponding to the second node identification information; the first receiving unit is further configured to receive a pollution detection token sent by the second computing node, where the pollution detection token is generated by the second computing node based on the second pollution detection request; The second sending unit is further configured to send a pollution query request including the pollution detection token to the first computing node, where the pollution query request is used to obtain pollution detection data related to first encrypted data stored in the first computing node; The first receiving unit is further configured to receive the pollution detection data sent by the first computing node; The detection unit is used for carrying out pollution detection based on the pollution detection data to obtain a pollution detection result; the second sending unit is configured to send the pollution detection result to a pollution detection node.
- 16. A third data detection device is characterized in that the device is applied to a second computing node and comprises a second receiving unit, an authentication unit, a second generating unit, a third sending unit and an encryption unit, wherein: The second receiving unit is used for receiving a second pollution detection request sent by a third computing node, wherein the second pollution detection request is used for requesting a pollution detection token corresponding to the first data identification information; the authentication unit is used for performing authentication processing on the second pollution detection request to obtain an authentication result; the second generating unit is configured to generate the pollution detection token based on the second pollution detection request if the authentication result indicates that the authentication is passed; The third sending unit is configured to send the pollution detection token to the third computing node; The encryption unit is used for encrypting the data to be stored by adopting authentication information to obtain first encrypted data if the data to be stored sent by the computing power resource scheduling management node is received, wherein the data to be stored is sent to the computing power resource scheduling management node by the data providing node; the third sending unit is further configured to send the first encrypted data to a first computing power node, where the first computing power node is indicated by the computing power resource scheduling management node.
- 17. The data detection system is characterized by comprising a computing power resource scheduling management node and at least one computing power node, wherein: The computing power resource scheduling management node is used for determining and obtaining a first computing power node, a second computing power node and a third computing power node from at least one computing power node, and realizing the steps of the data detection method according to any one of claims 1 to 3; The second computing node for implementing the steps of the data detection method according to any one of claims 8 to 13; The third computing node being configured to implement the steps of the data detection method according to any one of claims 4 to 7.
- 18. A storage medium having stored thereon a data detection program which, when executed, is adapted to carry out the steps of the data detection method according to any one of claims 1 to 3, claims 4 to 7, or claims 8 to 13.
- 19. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the data detection method according to any one of claims 1 to 3, claims 4 to 7, or claims 8 to 13.
Description
Data detection method, device, system, storage medium and computer program product Technical Field The present application relates to the field of distributed storage, and in particular, to a data detection method, apparatus, system, storage medium, and computer program product. Background In order to more efficiently utilize massive distributed computing resources at the network edge and promote the deep fusion and cooperative processing of the distributed edge computing and the network, an implementation scheme of a computing network is provided at present, and when the implementation scheme is implemented, the distributed computing nodes are interconnected and comprehensively scheduled, and the network architecture and the protocol are correspondingly improved, so that the optimization and the efficient utilization of the network and the computing resources are realized. At present, with the rapid development and application of the power network, on the premise of ensuring that data privacy in the power network realizes data security, effective detection of contaminated data in the power network becomes a technical problem to be solved currently. Content of the application In order to solve the technical problems, the application provides a data detection method, a device, a system, a storage medium and a computer program product, solves the problem that the existing computing network does not reliably and effectively pollute the data with privacy, provides a data detection method, realizes the effective comprehensive detection of the polluted data of the privacy data, can detect various forms of data, and has universal applicability. The technical scheme of the application is realized as follows: The application provides a data detection method, which is applied to a computing power resource scheduling management node, and comprises the following steps: If a first pollution detection request sent by a pollution detection node is received, determining a first power calculation node, a second power calculation node and a third power calculation node which have association relation with first data identification information based on the first pollution detection request, wherein the first pollution detection request is used for requesting pollution detection on first encrypted data corresponding to the first data identification information; The pollution detection method comprises the steps of sending the first pollution detection request, first node identification information for identifying the first computing power node and second node identification information for identifying the second computing power node to the third computing power node, wherein the third computing power node is used for executing pollution detection operation corresponding to the first pollution detection request, the safety performance of the first computing power node is lower than or equal to that of the third computing power node, and the safety performance of the third computing power node is lower than or equal to that of the second computing power node. In the above solution, if the first pollution detection request sent by the pollution detection node is received, determining, based on the first pollution detection request, a first computing node, a second computing node, and a third computing node that have an association relationship with the first data identification information, where the determining includes: if the first pollution detection request is received, determining a first computing node for storing first encrypted data corresponding to the first data identification information and a second computing node for obtaining the first encrypted data through encryption processing; and performing resource scheduling management based on the first pollution detection request, and distributing the corresponding third computing power node for the first data identification information. In the above solution, if the first pollution detection request sent by the pollution detection node is received, determining, based on the first pollution detection request, a first computing node, a second computing node, and a third computing node that have an association relationship with the first data identification information, where the determining includes: If the first pollution detection request is received, determining a first power node for storing first encrypted data corresponding to the first data identification information; and performing resource scheduling management based on the first pollution detection request, and distributing the corresponding second computing power node and third computing power node for the first data identification information. In the above scheme, the method further comprises: And if the second computing node does not comprise the authentication information for performing authentication processing on the first encrypted data, sending the authentication information to the second computing node so