Cloud computing big data privacy protection method

A privacy protection and big data technology, applied in the field of secure cloud storage, can solve problems such as security and hidden dangers caused by inter-domain role mapping, and achieve the effect of enhancing security read policy control, meeting application requirements, and ensuring security

Active Publication Date: 2017-12-12
SHANGHAI MUNICIPAL ELECTRIC POWER CO
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology expands on the basis of the traditional authorization management model, and the role mapping between domains enables the roles in different domains to establish an association relationship, but the transfer of role mapping between domains is also likely to cause security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing big data privacy protection method
  • Cloud computing big data privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0015] One aspect of the present invention provides a privacy protection method for cloud computing big data. figure 1 It is a flowchart of a cloud computing big data privacy protection method according to an embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides cloud computing big data privacy protection method. The method comprises the following steps: deploying a plurality of authentication servers in a cloud storage platform, and performing graded key distribution and feature authentication affair; and maintaining a global user feature list, and setting an authorization reading strategy and a constraint control strategy by the authentication servers. By adoption of the cloud computing big data privacy protection method, the secure strategy reading control of the environment and the strategy constraint is enhanced, the computing cost of a writing user is reduced on the premise of ensuring the security, and the application demands of cross-cloud and cross-grade data strategies of all types are satisfied.

Description

technical field [0001] The invention relates to secure cloud storage, in particular to a privacy protection method for cloud computing big data. Background technique [0002] The cloud data storage platform stores computing resources in a configurable shared pool of computing resources, and reads computing resources through a convenient and on-demand network. Security has become a key issue restricting the development of cloud storage. Cloud storage service providers provide services in cloud storage, while users are in a passive position, resulting in a serious asymmetry in information control. Cloud storage transfers information to cloud storage service providers, but enterprises themselves can no longer fully control the information and storage details of cloud service providers; cloud storage is aimed at multiple users, and cloud service providers cannot provide information to owners in consideration of their own security. Present key information in storage. On the ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L63/0428H04L63/08H04L63/105H04L63/20H04L67/1097
Inventor 刘颖
Owner SHANGHAI MUNICIPAL ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products