Disclosure of Invention
The invention aims to provide a geological data access control method and system based on information encryption, which are used for solving the technical problems in the prior art.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
In a first aspect, the present invention provides a geological data access control method based on information encryption, which includes the following steps:
S1, data encryption processing comprises the following steps:
s11, obtaining geological data;
s12, classifying the data, namely classifying the geological data according to different attributes of the data;
S13, encrypting the data, namely encrypting the classified data by using AES and HSM;
s2, identity verification and authorization, including:
s21, multi-factor authentication, namely, the user needs to be subjected to multi-factor authentication when accessing the system;
s22, authority management, namely the system distributes different data access authorities according to the roles of the users;
S23, after the user passes the verification, the system retrieves the corresponding encryption key according to the user authority;
s3, data access control, which comprises the following steps:
S31, processing the access request, namely selecting the data type to be accessed by a user in the system, checking the authority of the user by the system, and determining whether the user has the right to access the requested data or not;
s32, decrypting the data by using the distributed encryption key by the user to obtain the needed geological data;
S33, providing data and safety access, wherein the system provides decrypted plaintext data for a user, and the provided data is recorded as an access event to ensure the transparency of use;
S34, accessing the record, namely recording the access behavior of the user and realizing the traceability of the access record.
Preferably, in step S1:
S11, obtaining geological data, including:
collecting geological data from a geological exploration, wherein the geological data comprises drilling data, geological profile data, soil sample data and groundwater level data;
S12, classifying the data, namely classifying the geological data according to different attributes of the data, wherein the generated classification attribute information comprises soil component data, geological horizon data and groundwater level data;
The soil composition data includes chemical composition and physical properties of the soil;
the geological horizon data comprises rock types and horizon information of different strata;
the groundwater level data comprises water level height and water quality parameters;
S13, encrypting the data, namely encrypting the classified data by using AES and HSM.
Preferably, in step S13, the encryption processing using AES includes:
Key generation-a 192-bit random key is generated using a secure random number generator, and the unpredictability of the key is ensured using a secure random number generator (cspng). The generated key is stored in an HSM key management system in an encrypted mode so as to prevent unauthorized access;
data partitioning, namely dividing data to be encrypted into blocks (192 bits in general) with fixed sizes to adapt to an AES encryption algorithm;
The encryption process comprises the steps of 1, key expansion, generating a group of round keys (key schedule) for encryption operation of each round through a key expansion algorithm, 2, initial round, performing initial round transformation on a data block, wherein the initial round comprises byte substitution and row shift operation of the initial round, 3, main round, 12-round main round transformation, each round comprises byte substitution, row shift, column mixing and key addition operation, and 4, final round, and final round transformation which does not comprise column mixing;
After encryption, outputting a ciphertext data block, and storing the ciphertext data block together with a data block index and a time stamp to ensure the integrity and traceability of the data;
Key management the generated keys (such as K1, K2 and K3) are stored in the private key management system after being encrypted. The system adopts a Hardware Security Module (HSM) based solution to ensure the security of the key access process.
Preferably, in step S13, the HSM use includes:
the key generation and storage are used for generating an AES encryption key and storing the key in an encryption mode to prevent unauthorized access, wherein the key generation process is carried out in the HSM, and the randomness and the security of the key are ensured by utilizing a built-in hardware random number generator;
The key access control, namely, the HSM ensures that only authorized users and applications can access the key through Access Control List (ACL) and user role management, and the generation, access and use of the key are recorded in the log of the HSM each time to provide a complete audit trail;
The key backup and recovery method comprises the steps that the HSM supports the key backup and recovery functions, the key backup is carried out on a physically isolated secure medium and needs multiple authentications for recovery, and the HSM ensures the recovery capability of the key in case of hardware failure through supporting multiple backup strategies.
Preferably, in step S13, the process of the present invention,
Performing AES encryption on the soil component data to generate an encryption key K1;
AES encryption is carried out on geological horizon data, and an encryption key K2 is generated;
AES encryption is performed on the groundwater level data, generating an encryption key K3.
Preferably, in step S2:
S21, multi-factor authentication, wherein the user needs to be subjected to multi-factor authentication when accessing the system, and the multi-factor authentication comprises the following steps:
When a user logs in a system, firstly, password verification is carried out;
after the password passes the verification, performing biological feature verification;
after the biological characteristics pass verification, a temporary access token is generated, and the user is authorized to access corresponding data;
s22, authority management, namely the system distributes different data access authorities according to the roles of the users;
The administrator has complete access rights, and can read and modify all data;
wherein a geological engineer has access to data related to exploration and analysis;
wherein the common user is limited to viewing public information or low sensitivity data;
s23, obtaining the key, namely after the user passes the verification, the system searches and provides the corresponding encryption key according to the user authority, and when the user requests to access the specific data, the system provides the corresponding encryption key.
Preferably, in step S3:
S31, processing the access request, namely selecting the data type to be accessed by a user in the system, checking the authority of the user by the system, and determining whether the user has the right to access the requested data or not;
S32, decrypting the data by using the distributed encryption key to acquire the needed geological data, wherein the decryption process comprises the steps of downloading the encrypted geological data block from the system by the user, decrypting by using the acquired AES key, and restoring the plaintext data according to the process opposite to the encryption process;
S33, providing data and safety access, wherein the system provides decrypted plaintext data for a user, and the provided data is recorded as an access event to ensure the transparency of use;
s34, recording access behaviors of a user, and realizing traceability of the access records;
wherein the system records each access operation of the user, including access time, user identity, type of data accessed, and decryption key.
The log information is stored in a safe log system and is used for subsequent security audit and access tracing;
The access activity of the system is monitored in real time through log analysis, abnormal behaviors are detected, and timely response is conducted.
Preferably, in step S32, the AES decryption flow includes:
The method comprises the steps of initial preparation, namely dividing an encrypted data block into 192-bit blocks, and preparing for decryption;
The decryption round comprises the steps of performing inverse key addition operation firstly, performing exclusive OR operation on the last round of key and ciphertext block, performing inverse column mixing, namely, applying inverse column mixing operation to restore a data structure in each round of inverse operation, performing inverse shift operation on data lines in each round of inverse operation, performing inverse byte substitution, namely, replacing bytes with original values through an inverse S box, and performing round circulation, namely, repeating the inverse operation until the original plaintext data block is restored;
And verifying the integrity of the decrypted data by using a built-in Message Authentication Code (MAC), and after the verification is passed, confirming that the data is not tampered and preparing for analysis.
The invention provides an information encryption-based geological data access control system which comprises a data acquisition module, a data classification module, a data encryption module, an identity verification and authority management module, a data access control module and an access record and audit module, wherein the data acquisition module is used for acquiring geological data, the data classification module is used for classifying the geological data according to different attributes of the data, the data encryption module is used for conducting encryption processing on the classified data by using AES and HSM, the identity verification and authority management module is used for conducting multi-factor identity verification when a user logs in, different data access authorities are distributed according to user roles, and after the user passes verification, the corresponding encryption keys are searched and provided according to the user authorities, the data access control module is used for checking the user authorities when the user requests to access the geological data, determining whether the user has the right to access requested data and distributing the corresponding encryption keys according to the authorities, after the user decrypts the data by using the distributed encryption keys, the decrypted plaintext data is provided for the user, and the access record and the module is used for recording the access behaviors of the user.
By adopting the technical scheme, the invention has the following beneficial effects:
The invention provides a geological data access control method and system based on information encryption, which utilize advanced encryption technology and a multi-factor authentication mechanism to realize the safe storage and access control of geological data, thereby reducing the risk of data leakage and improving the safety and reliability of the system.
Detailed Description
The following description of the embodiments of the present invention will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The following describes specific embodiments of the present invention in detail with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Examples
Referring to fig. 1 to 4, the present embodiment provides a geological data access control method based on information encryption, which includes the following steps:
S1, data encryption processing comprises the following steps:
s11, obtaining geological data;
collecting geological data from a geological exploration, wherein the geological data comprises drilling data, geological profile data, soil sample data and groundwater level data;
the collected data is transmitted in real time in a wired or wireless mode before being transmitted to a data processing system, so that timeliness and integrity of the data are ensured.
S12, data classification:
Geological data is classified according to different attributes of the data so as to carry out targeted encryption, such as soil components, geological horizons, groundwater levels and the like. The generated classification attribute information comprises soil component data, geological horizon data and groundwater level data;
The soil composition data includes chemical composition and physical properties of the soil;
the geological horizon data comprises rock types and horizon information of different strata;
the groundwater level data comprises water level height and water quality parameters;
S13, data encryption:
the classified data is encrypted using AES (advanced encryption standard) and HSM (hardware security module), and preferably a 192-bit encryption key is selected to balance security and performance.
Therein, preferably, in step S13, the encryption processing using AES includes:
Key generation-a 192-bit random key is generated using a secure random number generator, and the unpredictability of the key is ensured using a secure random number generator (cspng). The generated key is stored in an HSM key management system in an encrypted mode so as to prevent unauthorized access;
data partitioning, namely dividing data to be encrypted into blocks (192 bits in general) with fixed sizes to adapt to an AES encryption algorithm;
The encryption process comprises the steps of 1, key expansion, generating a group of round keys (key schedule) for encryption operation of each round through a key expansion algorithm, 2, initial round, performing initial round transformation on a data block, wherein the initial round comprises byte substitution and row shift operation of the initial round, 3, main round, 12-round main round transformation, each round comprises byte substitution, row shift, column mixing and key addition operation, and 4, final round, and final round transformation which does not comprise column mixing;
After encryption, outputting a ciphertext data block, and storing the ciphertext data block together with a data block index and a time stamp to ensure the integrity and traceability of the data;
Key management the generated keys (such as K1, K2 and K3) are stored in the private key management system after being encrypted. The system adopts a Hardware Security Module (HSM) based solution to ensure the security of the key access process.
Wherein, preferably, in step S13,
Performing AES encryption on the soil component data to generate an encryption key K1;
AES encryption is carried out on geological horizon data, and an encryption key K2 is generated;
AES encryption is performed on the groundwater level data, generating an encryption key K3.
Wherein, preferably, in step S13, the HSM use includes:
the key generation and storage are used for generating an AES encryption key and storing the key in an encryption mode to prevent unauthorized access, wherein the key generation process is carried out in the HSM, and the randomness and the security of the key are ensured by utilizing a built-in hardware random number generator;
The key access control, namely, the HSM ensures that only authorized users and applications can access the key through Access Control List (ACL) and user role management, and the generation, access and use of the key are recorded in the log of the HSM each time to provide a complete audit trail;
The key backup and recovery method comprises the steps that the HSM supports the key backup and recovery functions, the key backup is carried out on a physically isolated secure medium and needs multiple authentications for recovery, and the HSM ensures the recovery capability of the key in case of hardware failure through supporting multiple backup strategies.
S2, identity verification and authorization, including:
s21, multi-factor authentication, namely the user needs to be subjected to multi-factor authentication when accessing the system, and the method specifically comprises the following steps:
step 1, password verification:
the user inputs his personal password through the secure input interface.
The system performs hash operation on the password and compares the password with the password hash stored in the database.
If the matching is successful, the next step of verification is carried out, otherwise, access is refused and login attempt is recorded.
Step 2, biometric authentication (fingerprint identification):
the user needs to verify his identity through a fingerprint identifier.
Fingerprint data is collected through a sensor and is compared with a prestored encrypted fingerprint template.
After verification is successful, the system records a successful authentication event.
Step 3, temporary access token generation:
The system generates a time-based temporary access token (TOTP) and communicates it to the user's registration device.
The user enters a token to complete the final authentication step.
After successful generation and input of the token, the user obtains temporary access of the corresponding rights.
S22, authority management, namely the system distributes different data access authorities according to the roles of the users;
The administrator has complete access rights, and can read and modify all data;
Wherein a geological engineer has access to data related to exploration and analysis, such as geologic horizons and groundwater levels;
wherein the common user is limited to viewing public information or low sensitivity data;
S23, obtaining the key, namely after the user passes the verification, the system searches the corresponding encryption key according to the user authority, and when the user requests to access the specific data, the system provides the corresponding encryption key.
S3, data access control, which comprises the following steps:
S31, processing the access request, namely selecting the data type to be accessed by a user in the system, checking the authority of the user by the system, and determining whether the user has the right to access the requested data or not;
S32, decrypting the data by using the distributed encryption key to acquire the needed geological data, wherein the decryption process comprises the steps of downloading the encrypted geological data block from the system by the user, decrypting by using the acquired AES key, and restoring the plaintext data according to the process opposite to the encryption process;
preferably, in step S32, the AES decryption flow includes:
The method comprises the steps of initial preparation, namely dividing an encrypted data block into 192-bit blocks, and preparing for decryption;
The decryption round comprises the steps of performing inverse key addition operation firstly, performing exclusive OR operation on the last round of key and ciphertext block, performing inverse column mixing, namely, applying inverse column mixing operation to restore a data structure in each round of inverse operation, performing inverse shift operation on data lines in each round of inverse operation, performing inverse byte substitution, namely, replacing bytes with original values through an inverse S box, and performing round circulation, namely, repeating the inverse operation until the original plaintext data block is restored;
And verifying the integrity of the decrypted data by using a built-in Message Authentication Code (MAC), and after the verification is passed, confirming that the data is not tampered and preparing for analysis.
S33, providing data and safety access, wherein the system provides decrypted plaintext data for a user, and the provided data is recorded as an access event to ensure the transparency of use;
S34, accessing the record, namely recording the access behavior of the user and realizing the traceability of the access record.
Wherein the system records each access operation of the user, including access time, user identity, type of data accessed, and decryption key.
The log information is stored in a safe log system and is used for subsequent security audit and access tracing;
The access activity of the system can be monitored in real time through log analysis, and abnormal behaviors are detected and responded in time.
In summary, the advantages of the invention are mainly reflected in the following aspects:
The technical effects are as follows:
1. The data security is obviously improved:
The invention realizes high-intensity encryption of geological data by combining the advanced encryption standard of AES and a Hardware Security Module (HSM), and greatly enhances the security of the data. The AES algorithm is selected and used due to high efficiency and strong safety, and the 192-bit secret key generated and managed by the HSM is combined, so that the encryption process is prevented from being interfered by the outside, and the risk of data leakage is effectively prevented. Compared with the traditional software encryption method, the method has the advantages of higher encryption processing speed and higher encryption strength, and further improves the security of geological data.
2. Multi-factor authentication provides higher security:
The invention integrates multi-factor authentication mechanisms, including password authentication, fingerprint recognition, facial recognition and other biometric authentication. The multi-factor authentication mechanism provides multiple security guarantees while ensuring the authenticity of the identity of the user, and effectively prevents unauthorized access. Compared with the traditional authentication method which only depends on a single password, the multi-factor authentication mechanism of the invention greatly improves the security of the system.
3. Detailed access records and traceability:
The invention designs a detailed access recording function, and records the information such as time of each data access, user identity, type of data accessed, decryption key and the like. These records are stored in a log system to enable traceability and security auditing of data access. Through detailed access records, each data access operation can be traced, the safety and reliability of the system are enhanced, and the potential security threat can be found and processed in time.
Economic effect:
1. The geological data management efficiency is improved:
The efficient AES encryption algorithm and flexible key management system greatly improve the management efficiency of the geological data. The data encryption and decryption processes are quick, and the user authentication and the authority management are flexible and convenient, so that the geological data can be stored, transmitted and accessed more efficiently.
2. The risk of data leakage and related costs are reduced:
According to the invention, through multi-level security measures, the risk of geological data leakage is obviously reduced. Data leakage can present serious economic loss and legal risks, the invention effectively prevents data leakage and reduces the related cost and risk.
3. Support a wide range of engineering applications:
The concrete application example of the invention in the geological survey of highway engineering shows the remarkable effect in the actual engineering. Through safe management and efficient access to the geological data, the method and the device support wide engineering application, and improve the management level and the data utilization efficiency of geological engineering projects.
Social effects:
1. Improving the geological data safety awareness:
The invention improves the safety level of geological data management and the importance of users and industries on the data safety through advanced encryption technology and multi-factor authentication mechanism. A secure and reliable data management system helps establish and promote standards and specifications for geological data management.
2. Promote technical progress and innovation:
the invention promotes the application and development of information security technology in geological data management in terms of data encryption, identity verification, authority management and the like. By the technical scheme, the improvement and application innovation of the information security technology are promoted, and the information security technology has important demonstration and introduction effects.
3. Enhancing public trust and satisfaction:
Through the high-efficiency and safe geological data management system, the transparency and reliability of data management are effectively improved, and the trust and satisfaction degree of public on geological data management are enhanced. The reliable geological data management system not only ensures the safety of data, but also provides better service and support for the public and industry.
Examples
As shown in fig. 1 to 4, the second embodiment provides a geological data access control system based on information encryption based on the first embodiment. The second embodiment includes the technical content disclosed in the first embodiment, and the technical content of the second embodiment that is the same as that of the first embodiment is not repeated, and the differences between the second embodiment and the first embodiment are described below.
The embodiment provides an information encryption-based geological data access control system which is used for executing the information encryption-based geological data access control method in the first embodiment, and specifically comprises a data acquisition module, a data classification module, a data encryption module, an identity verification and authority management module, a data access control module and an access record and audit module, wherein the data acquisition module is used for acquiring geological data, the data classification module is used for classifying the geological data according to different attributes of the data, the data encryption module is used for conducting encryption processing on the classified data by using AES and HSM, the identity verification and authority management module is used for conducting multi-factor identity verification when a user logs in, different data access authorities are distributed according to user roles, and after the user passes verification, the data access control module is used for searching and providing corresponding encryption keys according to the user authorities, checking whether the user authorities have the right to access the requested data when the user requests access to the geological data, distributing the corresponding encryption keys according to the authorities, after the user decrypts the data by using the distributed encryption keys, the decrypted data is provided for the user, and the data and the access record and the user behavior module is used for accessing the audit record.
Examples
Referring to fig. 1 to fig. 4, a third embodiment provides a geological data access control system based on information encryption based on the first embodiment and the second embodiment, and the application example of highway engineering geological survey is as follows:
1) And (3) data acquisition:
geological data in highway surveys are collected, including borehole data, geological profile data, and soil sample data.
The drilling data includes drilling depth, soil layer thickness, groundwater level, etc.
The geologic profile data includes geologic horizons, rock types, formation dip angles, and the like.
Soil sample data includes soil composition, soil density, moisture content, and the like.
2) Encryption of data:
The AES algorithm is used to encrypt different types of data, generate an encryption key, and store the encryption key.
The borehole data is encrypted to generate an encryption key K4.
The geological profile data is encrypted to generate an encryption key K5.
The soil sample data is encrypted to generate an encryption key K6.
The generated encryption keys K4, K5, K6 are stored in the key management system, respectively.
3) Access control:
when the constructor needs to access the geological data, multi-factor identity verification is performed first.
When constructors log in the system, firstly, password verification is carried out.
And after the password passes verification, fingerprint identification or facial identification is carried out.
After passing the multi-factor authentication, the system generates a temporary access token, and authorizes constructors to access corresponding data.
The system retrieves and provides the corresponding encryption key according to its rights.
When the constructor requests access to the borehole data, the system retrieves the encryption key K4.
And the constructor decrypts the drilling data by using the secret key K4 to acquire detailed information.
And the constructor decrypts the drilling data by using K4 to obtain the decrypted drilling depth, soil layer thickness, groundwater level and other information.
The system provides decrypted plaintext data, and ensures the safe access and use of the data.
4) Accessing the record:
the system records each data access activity including access time, user identity and data type of access.
The time, identity and decryption key K4 of each access to the borehole data by the constructor is recorded.
These records are stored in a log system for subsequent security audit and access tracebacks.
In summary, the innovation points and advantages of the invention are as follows:
1. application of AES advanced encryption standard in combination with Hardware Security Module (HSM) in geological data encryption:
According to the invention, the advanced encryption standard of AES is combined with the Hardware Security Module (HSM) to encrypt the geological data, so that the security of the data is greatly improved. The AES encryption algorithm encrypts geological data, and AES is known in terms of high efficiency and strong safety, so that leakage risks of the data in the transmission and storage processes can be effectively prevented. The HSM is responsible for generating and storing AES encryption keys, with its built-in Hardware Random Number Generator (HRNG) ensuring the randomness and security of the keys.
Compared with the traditional soft encryption scheme, the invention improves the security and reliability of key management through the hardware-level key protection provided by the HSM. The use of the HSM ensures that the secret key in the encryption process is not exposed to the external environment, reduces the risk of secret key leakage, and remarkably improves the overall security of geological data. The system has the advantages of higher encryption processing speed and higher encryption strength, can effectively cope with external attack, and can meet the requirements of the modern geological data management system on high efficiency and safety.
By combining an AES encryption algorithm and an HSM technology, the invention not only realizes strong encryption of geological data, but also obviously improves the confidentiality and the integrity of the data through perfect key management flow and hardware level security. This gives the present invention significant advantages in protecting against data leakage and unauthorized access.
2. Integration of multi-factor authentication mechanisms:
the invention integrates multi-factor authentication mechanisms, including password authentication, fingerprint recognition, facial recognition and other biometric authentication. Multi-factor authentication provides multiple security guarantees that only tightly authenticated users can access sensitive geological data. Compared with the traditional single-factor authentication, the multi-factor authentication greatly improves the security of the system.
3. Detailed access records and traceability:
The invention designs a detailed access recording function, and records the information such as time of each data access, user identity, type of data accessed, decryption key and the like. These records are stored in a log system to enable traceability and security auditing of data access. Through the detailed access record, each data access operation can be traced, and the safety and reliability of the system are enhanced.
It should be noted that the above embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that the technical solution described in the above embodiments may be modified or some or all of the technical features may be equivalently replaced, and these modifications or substitutions do not make the essence of the corresponding technical solution deviate from the scope of the technical solution of the embodiments of the present invention.