Font Size: a A A

Design And Implementation Of IoT Vulnerable Information Resource Pool Based On Data Virtualization

Posted on:2020-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:X D XuFull Text:PDF
GTID:2428330590971665Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In recent years,the number of IoT devices has grown dramatically,and a large number of IoT devices use unsafe operating systems and open source software programs.The vulnerability of these systems,once exploited,poses a serious security risk.In this thesis we refer to all kinds of security threat information related to IoT devices as IoT vulnerable information.Managing and sharing this vulnerable information is critical to IoT security research.The current management of IoT vulnerable information mainly focused on the realization of information searching and sharing functions.In the process of information sharing,the requirement for real-time data and the security of data was neglected,so that the effectiveness of decisions made by users based on shared data information is reduced.Therefore,it is necessary to find a suitable technology for the management of multi-source heterogeneous IoT vulnerable information.Data virtualization is an emerging multi-source heterogeneous data management solution.Compared with traditional data management methods,it has the characteristics of high real-time performance,high security and flexibility.We design and implements an IoT vulnerable information resource pool based on data virtualization to achieve the management and sharing of IoT vulnerable information.The main work is as follows:Firstly,based on the characteristics of the data virtualization system,the three-tier system architecture of the IoT vulnerable information resource pool is proposed,which is source data,data virtualization layer and application layer.The source data refers to the IoT vulnerable information to be managed and shared.The data virtualization layer uses the stream processing technology to extract and process the metadata,guarantees the real-time performance of the system data,and complete the mapping between the metadata and the source data.The application layer obtains the integrated data through the data virtualization layer,and provides users with multiple IoT vulnerable information query services through a unified interface.Secondly,in order to improve the overall query performance of the system,we propose a Neo4j-based metadata hierarchical model for the metadata query phase of the data query process.While constructing the attribute index,the model fully considers the relationship between the data of the system so that the closely related data are close to each other.Comparative experiments show that it effectively improves the retrieval speed of metadata.In the source data acquisition phase of the data query process,we propose a metadata-based cache optimization strategy,which makes full use of the existing cache services to optimize the query performance.Experimental results show that the strategy is effective.The experimental results of the system show that the IoT vulnerable information resource pool based on data virtualization can realize real-time processing of data.It can also query and analyze the multi-source heterogeneous IoT vulnerable information at a faster speed.In summary,it has great reference significance for the management of IoT vulnerable information and multi-source heterogeneous information in other fields.
Keywords/Search Tags:IoT vulnerable information, data virtualization, stream computing, metadata
PDF Full Text Request
Related items