Secure cloud computing system

A cloud computing and cloud computing server technology, applied in the field of information security, can solve problems such as user data and information loss, and achieve the effects of preventing user data and information loss, reducing costs, and saving resources

Inactive Publication Date: 2017-09-22
SHENZHEN QIXIN GRP LLC
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] An embodiment of the present invention provides a secure cloud computing system, aiming to solve the problem of loss of user data and information in extreme cases in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud computing system
  • Secure cloud computing system
  • Secure cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033] The secure cloud computing system provided by the embodiment of the present invention adopts three data storage forms of independent database, isolated database and shared database, and can select the storage form according to the level of data security, which can not only save resources, reduce costs, but also Data storage provides an effective security guarantee; at the same time, through identity verification, it effectively solves the situation of user information leakage caused by weak cloud computing terminal protection measures, and prevents identity loss, data theft, information loss ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the field of information security, and provides a secure cloud computing system. The secure cloud computing system comprises a cloud center, a secure cloud computing server and a proxy terminal, the cloud center is connected with the secure cloud computing server, the proxy terminal is installed on the secure cloud computing server and is in communication connection with the cloud center; a data storage form of three structures, namely, an independent database, an isolated database and a shared database, is adopted, the storage form can be selected according to the data security level, thereby not only saving resources and reducing the cost, but also providing effective security guarantee for the data storage; meanwhile, by means of the identity verification manner, the condition of user information leakage caused by the weak protection measure of the cloud computing terminal is effectively solved, the identity loss, data stealing, information loss and other potential safety hazards are prevented, and in the case of communication abnormality or network interruption, local terminal backup area data and local terminal backup area data and parameters can be used to prevent the loss of user data information in extreme cases.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a secure cloud computing system. Background technique [0002] Cloud computing is a new type of computing model that can more effectively use computing resources to provide users with various data services. It links a large number of computing resources, storage resources and software resources, and uses virtual technology to provide users with customizable Computing, storage and application services, avoiding the construction and maintenance of users' own heavy infrastructure. However, the centrally managed cloud computing center will become a key target of hacker attacks. Due to its unprecedented openness and complexity, its security is facing more severe tests than ever before. The access control of big data resources in cloud computing is the key to cloud computing security. At the core of the problem, access control is an important means to realize the confidentiality of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/64G06F21/62G06F11/14
Inventor 陈钦鹏
Owner SHENZHEN QIXIN GRP LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products