Data security access method in cloud computing environment

A cloud computing environment and data security technology, applied in the computer field, can solve problems such as data integrity and confidentiality threats

Inactive Publication Date: 2012-08-01
中山爱科数字家庭产业孵化基地有限公司
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Changes in the service model have also brought about security issues in many cloud computing information systems. For example, open interfaces provide the possibility for illegal access. Illegal users will enter the information system to steal confidential data of enterprises and users, and data integrity and confidentiality are greatly threatened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access method in cloud computing environment
  • Data security access method in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] refer to figure 1 , is the cloud computing architecture of the solution of the present invention. On the whole, it includes three parts, namely cloud user (or cloud query terminal), cloud platform, and cloud server. Among them, a cloud user refers to a network requesting user or terminal for obtaining a certain computing service or data resource; a cloud platform is a central platform that provides centralized control and business management for a certain cloud computing service; a cloud server is a computer connected through the Internet , which is the constituent unit of various clouds. Regardless of whether it is a public cloud or a private cloud, it is a group of a large number of interconnected computers, and these computers can be personal computers or network servers. The figure only shows the architecture of the basic cloud environment, and specific applications may have other components. In addition, the cloud platform must have a front-end module and a reso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a computer technology field and a data security access method in a cloud computing environment. The method is characterized in that the method includes the following steps that: step1 cloud users send cloud server data resource query requests to a cloud platform; step2 a cloud platform preposed module identifies the query requests, and a resource manager determines whether an accessible congener cloud server data resource exists or not, if there is the accessible congener cloud server data resource, forming a congener cloud server resource allocation information list; if not, automatically configurating the cloud server data resource for the cloud users, and authorizing the cloud users to access the resource; and step3 the cloud users select a target cloud server which the cloud users need access to according to the congener cloud server resource allocation information list , and the cloud users get access to the target cloud server data resource through authorizing the target cloud server to read and write local data. The cloud users access the target cloud server data resource.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for securely accessing data in a cloud computing environment. Background technique [0002] Cloud computing is proposed as a new network application model, which is an emerging computing model. Cloud computing is also a kind of distributed computing, which is developed on the basis of grid computing. [0003] In the era of cloud computing, the data storage method breaks the traditional model. All data is stored in the cloud server in a hosted manner. Data and Services Required. Changes in the service model have also brought about security issues in many cloud computing information systems. For example, open interfaces provide the possibility for illegal access. Illegal users will enter the information system to steal confidential data of enterprises and users, and data integrity and confidentiality are greatly threatened. . [0004] In order to solve the above secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 王俊梁叶灿才卢林发朱颖陈晓
Owner 中山爱科数字家庭产业孵化基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products