Method for realizing follow-up safe access of user data

A technology for secure access and user data, applied in the field of realizing user data follow-up secure access, can solve problems such as limited network transmission speed, loss, impact on public cloud service quality and user experience, etc., to improve data access speed , the effect of increasing the speed

Active Publication Date: 2016-09-14
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the most prominent problem of the public cloud is data security. The security of user data is completely controlled by the cloud storage service provider. Once an attacker breaks through the service provider, it will cause irreparable losses, such as the iCloud privacy leak.
In addition, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing follow-up safe access of user data
  • Method for realizing follow-up safe access of user data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] Example

[0051] For the convenience of description, the relevant technical terms appearing in the specific implementation manner are explained first:

[0052] BRAS (Broadband Remote Access Server): Broadband Remote Access Server;

[0053] NAS (Network Attached Storage): Network Attached Storage;

[0054] AP (AccessPoint): access point;

[0055] SDN (Software Defined Networking): Software Defined Network;

[0056] OpenFlow: The standard for the southbound interface of the controller in the SDN architecture determined by the standardization organization ONF;

[0057] Packet in: OpenFlow protocol message, which enables the switch to send data packets to the controller;

[0058] Packet-out: OpenFlow protocol message, enabling the controller to send packets through the switch;

[0059] Flow add: OpenFlow protocol message, which enables the controller to add a flow entry to the switch;

[0060] Intel DPDK (Intel Dataplane Packet Development Kit): An open-source packet ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing follow-up safe access of user data. A safe tunnel triggered by a user is realized to achieve safe transmission of non-inductive user data, then the isolation and safe access of the user data are accomplished by encryption technology irrelevant to a storage service provider, and the safe storage architecture method, which both has the speed and safety of private cloud and can provide the convenience of public cloud, can enable the user to truly experience the same safety and convenience of storing data on the cloud just like storing the data in local.

Description

technical field [0001] The invention belongs to the technical field of data storage, and more specifically relates to a method for realizing follow-up safe access of user data. Background technique [0002] In recent years, with the development and maturity of new technologies such as cloud computing and big data, "cloud" has penetrated into all aspects of various fields, and has increasingly become a necessity in people's daily life. The reason is that in today's era of information explosion, people produce more and more data that needs to be stored and shared. Cloud storage technology emerged in such an era - users can store data in Cloud instead of local with limited storage capacity. [0003] Generally, cloud can be divided into private cloud and public cloud. Private clouds based on NAS (such as Xiaomi routers, various network hard disks, etc.) are mainly used in home, SOHO or internal use of companies. And public cloud storage such as Dropbox, Baidu Cloud, Microdisk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/06H04L67/06H04L67/1095H04L67/1097H04L67/60
Inventor 许都陈炜邓灵莉付鹏飞胡彦杰
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products