Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing safty architecture

A cloud computing and security technology, applied in electrical components, transmission systems, etc., can solve problems such as resource waste, customer loss, and data security performance cannot be effectively guaranteed, and achieve the effect of saving resources and reducing costs

Inactive Publication Date: 2012-05-16
江苏真云计算科技有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Cloud computing, as the direction of future development, has been valued by various enterprises. In cloud computing, data security is an important aspect, which is an important factor restricting its development. The existing cloud computing storage models are often in three forms : That is, one is an independent database, the other is a shared database and an isolated data structure, and the third is a shared database and a shared data structure; the three forms have their own advantages and disadvantages, which are mainly reflected in the contradictions in cost and security performance. Currently, tenants often only have a single However, the data uploaded by a tenant is different, and the requirements for its security performance are different. If a single form is used, if a form with a higher security level is selected, there will be some concerns about the security level. Data with low requirements also occupies an independent database, resulting in a waste of resources; if a form with a lower security level is selected, the security performance of data with high security requirements cannot be effectively guaranteed, and it is easy to cause losses to customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] The cloud system of the present invention is provided with three regional forms: one is an independent database, the other is a shared database and an isolated data structure, and the third is a shared database and a shared data structure. Each region is provided with an identification code, and the client terminal transmits the data to the cloud system. The data is classified and identified according to the situation, and the identification corresponds to the corresponding identification code.

[0009] Transmission channels are set up between each area, and the client terminal can send instructions to transfer data from one area to another.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mobile Internet data transmission and storage method. A client transmits data which needs to be uploaded to a storage cloud system. The storage cloud system carries out identification and encryption to each information. When needing the information, the other client sends a request to the storage cloud system and sends a verification code. After receiving the relevant information and performing the verification, the storage cloud system sends the relevant information to a user. The cloud computing safety architecture has the following advantages: for a video file, a recipient can perform playback without storing the whole file; the storage cloud system is used to receive the file, receive a demand of the playback and then receive the file; many times, the recipient does not play the whole video; for an image and a photo, if the recipient does not have an enough space, other parts of the file can be eliminated; after the file is stored in cloud, if the same file is sent to other friends, uploading bandwidth is not consumed any more; a file name needs to be transmit so that a server can push the file to the recipient.

Description

technical field [0001] The invention relates to a cloud computing security framework. Background technique [0002] As the direction of future development, cloud computing has been valued by various enterprises. In cloud computing, data security is an important aspect and is an important factor restricting its development. The existing cloud computing storage models are often in three forms : That is, one is an independent database, the other is a shared database and an isolated data structure, and the third is a shared database and a shared data structure; the three forms have their own advantages and disadvantages, mainly reflected in the contradictions in cost and security performance, and current tenants often only have a single However, the data uploaded by a tenant is different, and the requirements for its security performance are different. If a single form is used, if a form with a higher security level is selected, some security levels will be affected. Data with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 马庆鸣
Owner 江苏真云计算科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products