Disclosure of Invention
In view of this, the present application provides a data preservation method and apparatus for a third-party-oriented cloud platform evaluation system, which can ensure that the third-party evaluation system verifies the originality and integrity of a log file, and protect user privacy from the perspective of a cloud service provider.
In order to achieve the above object, the following solutions are proposed:
a data preservation method for a cloud platform third party evaluation system is provided, and the method for the third party evaluation system comprises the following steps:
acquiring log data of a cloud platform, and analyzing the log data to generate a plurality of first log instances;
encrypting the plurality of first log instances to generate a plurality of second log instances;
arranging the plurality of second log instances according to the last modification time of the log instances and the sequence to generate a log chain;
acquiring log certification information of the second log instance provided by the cloud platform, and generating a log certification information instance;
retrieving a second log instance of each virtual IP and a log certification instance corresponding to the second log instance;
and encrypting the second log instance and the log certification instance corresponding to the second log instance to generate a third log instance containing certification information.
Preferably, the encrypting the plurality of first log instances to generate a plurality of second log instances includes:
and encrypting the plurality of first log instances by adopting a public key of a third party evaluation system to generate a plurality of second log instances.
Preferably, the encrypting the second log instance and the log certification instance corresponding to the second log instance to generate a third log instance containing certification information includes:
and encrypting the second log instance and the log certification instance corresponding to the second log instance by adopting a private key of the cloud platform to generate a third log instance containing certification information.
Preferably, the method further comprises the following steps: and storing the second log instance and the log chain to a log database of a third-party evaluation system.
Preferably, the method further comprises the following steps: and storing the third log instance to a log certification database of the third party evaluation system.
A data security device facing a cloud platform third party evaluation system comprises:
the system comprises a first data acquisition unit, a second data acquisition unit and a data processing unit, wherein the first data acquisition unit is used for acquiring log data of a cloud platform and analyzing the log data to generate a plurality of first log instances;
a first encryption unit, configured to encrypt the plurality of first log instances and generate a plurality of second log instances;
the log chain generating unit is used for arranging the plurality of second log instances according to the last modification time of the log instances and the sequence order to generate a log chain;
the second data acquisition unit is used for acquiring the log certification information of the second log instance provided by the cloud platform and generating a log certification information instance;
the retrieval unit is used for retrieving a second log instance of each virtual IP and a log certification instance corresponding to the second log instance;
and the second encryption unit is used for encrypting the second log instance and the log certification instance corresponding to the second log instance to generate a third log instance containing certification information.
Preferably, the first encryption unit encrypts the plurality of first log instances by using a public key of the third party evaluation system to generate a plurality of second log instances.
Preferably, the second encryption unit encrypts the second log instance and the log certification instance corresponding to the second log instance by using a private key of a cloud platform, and generates a third log instance containing certification information.
Preferably: the log chain generating unit is also used for storing the second log instance and the log chain to a log database of a third-party evaluation system.
Preferably, the second encryption unit is further configured to store the third log instance in a log certification database of the third party evaluation system.
According to the technical scheme, the data preservation method and device for the third-party-oriented cloud platform evaluation system are disclosed. The method encrypts the log data and the log certification information provided by the cloud service platform and stores the log data in a log chain form. When a third-party evaluation system uses collected log data to evaluate a cloud service platform, log authentication information verification and log chain sequence verification need to be carried out on the log data at first, and the log data is prevented from being illegally tampered in the using process, so that the originality and integrity of a log file are verified, and meanwhile, the privacy of a user is protected by adopting an encryption means.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows a flow diagram of a data preservation method for a cloud platform third party evaluation system according to an embodiment of the present invention.
In this embodiment, the method includes:
s101: the method comprises the steps of obtaining log data of a cloud platform, and analyzing the log data to generate a plurality of first log instances.
First, communication is established with a cloud platform to collect different types of log data (including weblogs, process logs, and operating system logs), and the log data is parsed to generate a first log instance, which is described below with respect to weblogs.
One weblog instance is defined as follows:
LE=<FromIP,ToIP,TL,Port,UserID,Content>
wherein fromlp is a source IP, ToIP is a destination IP, TL is UTC time of network operation, Port is a Port number, UserID is an ID of a cloud platform user, and Content is other contents of an operation record.
S102: and encrypting the plurality of first log instances to generate a plurality of second log instances.
In order to protect data security, a public key PKA of a third-party evaluating system is used for encrypting data information in a Log instance, and a second Encrypted Log instance (ELE) is generated and is represented as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
s103: and arranging the plurality of second log instances according to the last modification time of the log instances and the sequence to generate a log chain.
After the ELE is generated, the file is arranged into a Log chain (Log chain, LC) according to the sequence according to the last modification time of the file (contained in the timestamp information of the file), and the Log chain is rearranged if illegal tampering occurs. The log chain is represented as follows:
LC=<ELE,LCprev>
LCprev is the prior log instance of the current log instance.
Further, a second log instance and log chain are stored to a log database, denoted DBLE, consisting of ELE and LC:
DBLE=<ELE,LC>
s104: and acquiring the log certification information of the second log instance provided by the cloud platform, and generating a log certification information instance.
Acquiring log certification information provided by a cloud service provider and generating a log certification information example, wherein the log certification information example comprises a check value of an original log file and various timestamp information, and is represented as pro:
Pro=<H(LE),time-stamp 1,time-stamp 2,...>
and sending the updated log certification instance to a log certification database for storage.
S105: and retrieving a second log instance of each virtual IP and a log certification instance corresponding to the second log instance.
And searching the log database and the log certification database at preset time, and acquiring a second log instance of each virtual IP and log certification information corresponding to the second log instance, wherein the log certification information is represented as an AED:
AED=<ELE,Pro>
s106: and encrypting the second log instance and the log certification instance corresponding to the second log instance to generate a third log instance containing certification information.
Encrypting the second log instance and the log certification instance corresponding to the second log instance by using a private key of the cloud platform to generate a third log instance containing certification information, which is expressed as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
tp represents the generation time of the file, SigSKC (AED, Tp) is a digital signature generated by encrypting (AED, Tp) using the private key SKC of the cloud facilitator.
When a third-party evaluation system uses collected log data to evaluate a cloud service platform, verification of certification information and log chain sequence verification are firstly carried out on the log data. Fig. 2 is a certification information verification process, in which a cloud platform public key and a third party evaluation system private key are used to decrypt the third log instance and the log certification instance corresponding to the third log instance, the decrypted log certification instance is used to verify the third log instance if decryption is successful, and the log chain sequence is verified if verification is passed to verify the integrity of the log file. Fig. 3 is a log chain sequence verification process, assuming there is one log chain: (ELE0, LC0) (ELE1, LC1) …
Because LC1 is the first in order of the second log instance, i.e. (ELE0, LC0), if the log chain has been illegally tampered with, the sequence will change (because it is arranged according to the last modification timestamp), if (ELE0, LC0) and LC1 are the same, indicating that it has not been illegally tampered with. The verification method can verify the originality of the log file and prevent illegal tampering in the use process.
Compared with the prior art, the method has the advantages that the cloud service provider provides log certification information, and a private key of the cloud service provider is used for generating a digital signature, so that the privacy of a cloud platform user is protected; the log file is stored in a log chain form, and illegal tampering in the use process is prevented through sequence verification.
Fig. 4 is a schematic structural diagram of a data security device of a cloud platform evaluation system for a third party according to another embodiment of the present invention.
As can be seen from fig. 4, the apparatus includes: the system comprises a first data acquisition unit 1, a first encryption unit 2, a log chain generation unit 3, a second data acquisition unit 4, a retrieval unit 5 and a second encryption unit 6.
The first data acquisition unit 1 is configured to acquire log data of a cloud platform, and parse the log data to generate a plurality of first log instances.
For a network instance, the network instance may be represented as
LE=<FromIP,ToIP,TL,Port,UserID,Content>
Wherein fromlp is a source IP, ToIP is a destination IP, TL is UTC time of network operation, Port is a Port number, UserID is an ID of a cloud platform user, and Content is other contents of an operation record.
Further, the first encryption unit 2 encrypts the data information in the first log instance by using the public key PKA of the third party evaluation system, and generates an encrypted second log instance (encrypted log Entry, ELE), which is expressed as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
the log chain generating unit 3 is configured to arrange the second log instances according to the last modification time of the log instances and the sequence order, and generate a log chain. Wherein the log chain is represented as follows:
LC=<ELE,LCprev>
LCprev is the prior log instance of the current log instance.
Further, a second log instance and log chain are stored to a log database, denoted DBLE, consisting of ELEs and LCs.
The second data acquisition unit 4 is configured to acquire the log certification information of the second log instance provided by the cloud platform, generate a log certification information instance, and store the updated log certification information instance in a log certification database of the third-party evaluation system.
At a fixed point in time each day, the retrieval unit 5 retrieves a second log instance of each virtual IP and a corresponding log-certification instance of said second log instance in a log database and a log-certification database, denoted as AED:
AED=<ELE,Pro>
wherein ELE is a second log instance, and Pro is a log certificate corresponding to the second log instance.
The second encryption unit 6 encrypts the second log instance and the log certification instance corresponding to the second log instance by using a private key of the cloud platform to generate a third log instance containing certification information, and sends the third log instance to a log certification database of a third-party evaluation system for storage, wherein the third log instance is represented as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
tp represents the generation time of the file, SigSKC (AED, Tp) is a digital signature generated by encrypting (AED, Tp) using the private key SKC of the cloud facilitator.
It should be noted that the system embodiment corresponds to the method embodiment, and the execution process and the execution principle are the same, which are not described herein again.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.