Data security insurance method in cloud computing environment

A cloud computing environment and data security technology, applied in the field of cloud computing services, can solve problems such as imperfect industry standard national supervision and management system, catastrophic impact, hidden dangers, etc., and achieve clear and feasible results

Inactive Publication Date: 2012-04-11
BEIJING JIAOTONG UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1) Security issues: As a collection of services, cloud computing is pushed to the eyes of users. No matter how vigorously the service provider is developing the service market, the most important issue is to ensure that the service reaching the terminal is safe. , the data uploaded by the terminal to the cloud is also safe
At the same time, the monopoly of infrastructure in the form of cloud computing centers will also cause security risks. If a large amount of information aggregation is analyzed and mined with ulterior motives, national information security will be severely tested.
It can also be catastrophic if an international company or service provider ceases service for any reason
These are problems that cannot be fundamentally solved by the existing models in the field of cloud computing security and need to be solved urgently.
[0011] 2) The problem of blind development: the rise of cloud computing and the group buying industry, to a certain extent, are similar
[0012] 3) Network transmission issues: In the cloud computing environment, the requirements for network transmission speed and stability are greatly improved, and network transmission issues cannot be ignored.
[0013] 4) Software license issues: The cloud computing environment makes it easier to obtain various software services, and the resulting software license issues, software authorization infringement issues, etc. need to attract the attention of relevant personnel and solve them
[0014] 5) Industry standards, regulations, and national supervision and management systems are not perfect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security insurance method in cloud computing environment
  • Data security insurance method in cloud computing environment
  • Data security insurance method in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below in conjunction with the accompanying drawings:

[0031] The data security guarantee method in the cloud computing environment first needs to carry out the following operations: improve the relevant use mechanism of cloud technology, and impose requirements on the service life of cloud computing. Once you become a cloud computing service provider, you cannot terminate the service at will within five years.

[0032] The provision or termination of cloud computing services requires the approval and approval of strict legal procedures, and the market cannot be allowed to enter and terminate at will. This guarantees the threshold of entering the enterprise to a certain extent, and also helps to control the independent property rights of cloud computing services in the hands of the state and powerful enterprises, so that users can enjoy services conveniently. At the same time, when problems arise, there are la...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security insurance method in a cloud computing environment, belonging to the field of cloud computing services. The method comprises steps as follows: 1) a micro cloud transmits a request to a service cloud, and the service cloud dynamically configures resources according to user demands and quickly makes a response; the micro cloud makes a judgment on the service cloud according to the response; 2) dividing the service clouds into private clouds, community clouds, public clouds and mix clouds according to the system architecture allocated by cloud computing; and 3) encrypting data in the transmission process by dynamically generating a DES (data encryption standard) key in combination with RSA (public-key encryption). The invention insures the data security in a cloud computing environment, provides higher requirements for stable terminal technology, and gives out problems to be sequentially considered and technical points to be perfected in a data security insurance mechanism and evaluation method in a cloud computing environment.

Description

technical field [0001] The invention belongs to the field of cloud computing services, and in particular relates to a method for ensuring data security in a cloud computing environment. The invention relates to technologies related to cloud computing such as stable terminal technology, massive data distributed management technology, and data encryption transmission technology. Background technique [0002] Cloud computing distributes tasks on a virtual resource pool composed of a large number of computers, enabling various application systems to obtain computing power, storage space and various software services as needed. Cloud computing is essentially a service that responds to user needs. [0003] The architecture of cloud computing: The cloud computing service platform mainly provides three levels of services, namely infrastructure as a service, platform as a service, and software as a service. Infrastructure as a service is to provide physical resources, mainly includi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 肖红叶苏磊刘世峰兰洪杰刘红璐常丹
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products