Information security big-data resource management system based on trusted computing and cloud computing

A resource management system and data resource technology, applied in the field of information security big data resource management system, can solve problems such as poor scalability, inability to meet flexible, scalable and robust data resource search requirements, single point of failure, etc.

Active Publication Date: 2016-12-07
上海宽惠网络科技股份有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current related research work, the traditional centralized data resource management and search method adopts the data resource node management method based on the registration center, whic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security big-data resource management system based on trusted computing and cloud computing
  • Information security big-data resource management system based on trusted computing and cloud computing
  • Information security big-data resource management system based on trusted computing and cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Embodiment 1: as figure 1 , figure 2 The shown information security big data resource management system based on trusted computing and cloud computing includes a data resource storage unit 10, a data resource classification unit 20, a key unit 30 based on trusted computing, a data resource search unit 40, and a task planning Unit 50, trusted combination evaluation unit 60 and trusted combination evaluation unit 70, specifically:

[0043] (1) Data resource storage unit 10: including a data storage module 11 and a data backup module 12, the data storage module 11 authenticates the hardware nodes in the network required for information storage, judges the credibility of the network hardware nodes, and establishes the stored The trust relationship of information, after the trust relationship is established, based on the data resources distributed in the cloud environment, the data resources are encapsulated and stored; the data backup module 12 is used to restore data in ...

Embodiment 2

[0072] Embodiment 2: as figure 1 , figure 2 The shown information security big data resource management system based on trusted computing and cloud computing includes a data resource storage unit 10, a data resource classification unit 20, a key unit 30 based on trusted computing, a data resource search unit 40, and a task planning Unit 50, trusted combination evaluation unit 60 and trusted combination evaluation unit 70, specifically:

[0073] (1) Data resource storage unit 10: including a data storage module 11 and a data backup module 12, the data storage module 11 authenticates the hardware nodes in the network required for information storage, judges the credibility of the network hardware nodes, and establishes the stored The trust relationship of information, after the trust relationship is established, based on the data resources distributed in the cloud environment, the data resources are encapsulated and stored; the data backup module 12 is used to restore data in ...

Embodiment 3

[0102] Embodiment 3: as figure 1 , figure 2 The shown information security big data resource management system based on trusted computing and cloud computing includes a data resource storage unit 10, a data resource classification unit 20, a key unit 30 based on trusted computing, a data resource search unit 40, and a task planning Unit 50, trusted combination evaluation unit 60 and trusted combination evaluation unit 70, specifically:

[0103] (1) Data resource storage unit 10: including a data storage module 11 and a data backup module 12, the data storage module 11 authenticates the hardware nodes in the network required for information storage, judges the credibility of the network hardware nodes, and establishes the stored The trust relationship of information, after the trust relationship is established, based on the data resources distributed in the cloud environment, the data resources are encapsulated and stored; the data backup module 12 is used to restore data in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security big-data resource management system based on trusted computing and cloud computing. The information security big-data resource management system comprises a data resource storage unit, a data resource classification unit, a key unit based on trusted computing, a data resource searching unit, a task planning unit, a trusted combination evaluation unit and a service deployment unit. A system architecture is that a credibility evaluation mechanism and a trusted relationship transmission mechanism are constructed on the basis of characteristic foundation including a protective function, authentication and integrity measurement, so that a trusted chain from data resource storage, data resource searching to data resource service distribution is established. By means of the information security big-data resource management system disclosed by the invention, effective management of big-data resources is realized; and the security and the creditability of the system are improved.

Description

technical field [0001] The invention relates to the field of big data, in particular to an information security big data resource management system based on trusted computing and cloud computing. Background technique [0002] To collect data resources in large-scale distributed data nodes in the cloud environment, it is first necessary to manage the scattered data resource nodes and design an efficient data resource search method. In the current related research work, the traditional centralized data resource management and search method adopts the data resource node management method based on the registration center, which faces problems such as single point of failure and poor scalability, and cannot meet the needs of flexible and scalable cloud environments. Extended and robust data resource lookup requirements. Therefore, how to adopt decentralized data resource node management and data search methods to meet the needs of scalable data resource node management and data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6227
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月郑俊明欧阳喆杭聪宋骏豪
Owner 上海宽惠网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products