网络安全访问控制系统设计分析Design and analysis of network security access control system
王亮,张虹霞
摘要(Abstract):
普通Web网络安全访问控制系统不能随着并发用户数量的增加而降低平均响应时间和平均登录时间。为了解决此问题,设计基于大数据的Web网络安全访问控制系统。通过Web三级安全网络架构设计、大数据环境下系统PKI/CA模块设计、网络安全隔离模块设计,完成系统硬件设计;通过系统数据库设计、集中认证/授权模块设计、安全访问控制服务器设计,完成系统软件设计。实验结果表明,应用基于大数据的Web网络安全访问控制系统后,用户平均响应时间和平均登录时间得到有效控制。
关键词(KeyWords): 大数据环境;Web网络安全;PKI/CA模块;访问控制;安全隔离;系统设计
基金项目(Foundation): 四川省科技厅科研基金(2013JY0089)~~
作者(Author): 王亮,张虹霞
DOI: 10.16652/j.issn.1004-373x.2018.10.026
参考文献(References):
- [1]谢榕,刘亚文,李翔翔.大数据环境下卫星对地观测数据集成系统的关键技术[J].地球科学进展,2015,30(8):855-862.XIE Rong,LIU Yawen,LI Xiangxiang.Key technologies of earth observation satellite data integration system under big data environment[J].Advances in earth science,2015,30(8):855-862.
- [2]徐建闽,王钰,林培群.大数据环境下的动态最短路径算法[J].华南理工大学学报(自然科学版),2015,43(10):1-7.XU Jianmin,WANG Yu,LIN Peiqun.A dynamic shortest path algorithm for big data[J].Journal of South China University of Technology(Natural science edition),2015,43(10):1-7.
- [3]王晰巍,张长亮,蔡佳铭,等.大数据环境下中美高校信息素养培养模式比较研究[J].图书情报工作,2016,60(11):29-35.WANG Xiwei,ZHANG Changliang,CAI Jiaming,et al.Comparative study of information literacy training models in Chinese and American universities in big data environment[J].Library and information service,2016,60(11):29-35.
- [4]田新,肖钰麟,廖芬.大数据环境下企业管理模式创新研究[J].湖北理工学院学报(人文社会科学版),2016,33(3):43-47.TIAN Xin,XIAO Yulin,LIAO Fen.Research on the innovation of enterprise management mode with big data[J].Journal of Hubei Polytechnic University(Humanities and social sciences),2016,33(3):43-47.
- [5]虞颖映,马凌飞,胡天天,等.大数据环境下医学信息服务平台研究与实践[J].医学信息学杂志,2016,37(12):72-76.YU Yingying,MA Lingfei,HU Tiantian,et al.Research and practice of medical information service platform under the big data environment[J].Journal of medical informatics,2016,37(12):72-76.
- [6]侯瑞霞,孙伟,曹姗姗,等.大数据环境下林业资源信息云服务体系架构:设计与实证[J].中国农学通报,2016,32(2):170-179.HOU Ruixia,SUN Wei,CAO Shanshan,et al.Cloud service architecture of forestry resource information in big data environment-design and verification[J].Chinese agricultural science bulletin,2016,32(2):170-179.
- [7]潘志宏,万智萍,谢海明.大数据环境下高校智慧移动学习平台的构建研究[J].实验技术与管理,2017,34(4):161-163.PAN Zhihong,WAN Zhiping,XIE Haiming.Research on construction of smart mobile learning platform in colleges and universities based on big data[J].Experimental technology and management,2017,34(4):161-163.
- [8]王红芳,姜功恒,张凯兵.大数据环境下图书馆学科服务的SWOT分析与服务策略[J].农业图书情报学刊,2015,27(10):180-183.WANG Hongfang,JIANG Gongheng,ZHANG Kaibing.SWOT analysis and tactics of discipline service in libraries in the big data environment[J].Journal of library and information sciences in agriculture,2015,27(10):180-183.
- [9]陈善学,杨政,朱江,等.一种基于累加PSO-SVM的网络安全态势预测模型[J].计算机应用研究,2015,32(6):1778-1781.CHEN Shanxue,YANG Zheng,ZHU Jiang,et al.Network security situation prediction method based on PSO-SVM[J].Application research of computers,2015,32(6):1778-1781.
- [10]李凤华,殷丽华,吴巍,等.天地一体化信息网络安全保障技术研究进展及发展趋势[J].通信学报,2016,37(11):156-168.LI Fenghua,YIN Lihua,WU Wei,et al.Research status and development trends of security assurance for spaceground integration information network[J].Journal on communications,2016,37(11):156-168.
- [11]CHEN G,GONG Y,XIAO P,et al.Physical layer network security in the full-duplex relay system[J].IEEE transactions on information forensics&security,2015,10(3):574-583.
- [12]LIYANAGE M,ABRO A B,YLIANTTILA M,et al.Opportunities and challenges of software-defined mobile networks in network security[J].IEEE security&privacy,2016,14(4):34-44.
- [13]ZHANG Y.Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information[J].Journal of intelligent&fuzzy systems,2015,28(1):199-204.