Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network virtual disk file safety management method based on cloud computing

A disk file and network virtualization technology, which is applied in the field of cloud computing-based network virtual disk file security management, and can solve problems such as irreparable, enlarged files, and damage.

Inactive Publication Date: 2012-03-28
WUHAN UNIV
View PDF2 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system encrypts all confidential files, but software errors or abnormal situations such as power outages increase the probability of file damage, and generally file damage cannot be repaired, which requires extremely high stability and reliability of the security system itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network virtual disk file safety management method based on cloud computing
  • Network virtual disk file safety management method based on cloud computing
  • Network virtual disk file safety management method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0052] The technical solution of the present invention will be described in detail below in conjunction with the drawings and embodiments.

[0053] see figure 1 , the system architecture consists of three parties: client, cloud and authentication server. The authentication server is responsible for identity authentication and key distribution during the interaction between the client and the cloud. It negotiates and distributes keys with the cloud, responds to the client's user request, and receives the client's identity certificate; the cloud is responsible for the image file uploaded by the user. For distributed storage and management; the client can be used by users to perform basic operations on virtual disks, such as creating image files, uploading images to the cloud, loading images from the cloud, and so on.

[0054] see figure 2 , the software process includes user registration and login and identity verification, system initialization, creating virtual disk image f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network virtual disk file safety management method based on cloud computing, which achieves the functions of automatic load balancing and transparent space expanding and shrinking by adopting cloud computing thought. In order to overcome the defect that public cloud can not realize data safety isolation and authorization use, the method can take Hadoop cloud platform as a base to construct a seamless virtual disk transparent encryption environment and realize distribution storage, data isolation, safe data sharing and other functions.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a cloud computing-based network virtual disk file security management method. Background technique [0002] The rapid development of the Internet enables us to browse massive resources on the Internet, but at the same time exposes our local data to the Internet. In many commercial projects, enterprises have very high requirements for data security, especially do not want important data such as source codes, design drawings, customer information, research results, and company sales records developed by enterprises to be leaked by internal personnel, or spread to in the hands of competitors. According to the statistics of the FBI in the United States, 83% of information security accidents are caused by insiders and internal and external collusion, and 70% of leaking crimes come from within the enterprise. The problem of data security storage and sharing cannot be ignor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈晶郑明辉杜瑞颖傅建明李彤
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products