Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method for big data in cloud computing

A privacy protection and big data technology, applied in the field of secure cloud storage, can solve problems such as security and hidden dangers caused by inter-domain role mapping, and achieve the effect of enhancing security read policy control, meeting application requirements, and ensuring security

Inactive Publication Date: 2017-12-15
CHENGDU DINGZHIHUI TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology expands on the basis of the traditional authorization management model, and the role mapping between domains enables the roles in different domains to establish an association relationship, but the transfer of role mapping between domains is also likely to cause security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for big data in cloud computing
  • Privacy protection method for big data in cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0015] One aspect of the present invention provides a privacy protection method for cloud computing big data. figure 1 It is a flowchart of a cloud computing big data privacy protection method according to an embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection method for big data in cloud computing. The method includes the steps of setting a plurality of authentication servers in a cloud storage platform, and conducting secret key distribution and character authentication transaction processing by class; maintaining a global user character list, wherein the authentication servers set an authorization reading policy and a constraint control policy. The privacy protection method for the big data in the cloud computing enhances safe reading policy control of environment and policy constraints, reduces computing costs of writing users on the premise of ensuring safety, and meets application demands of various cross-cloud cross-class data policies.

Description

technical field [0001] The invention relates to secure cloud storage, in particular to a privacy protection method for cloud computing big data. Background technique [0002] The cloud data storage platform stores computing resources in a configurable shared pool of computing resources, and reads computing resources through a convenient and on-demand network. Security has become a key issue restricting the development of cloud storage. Cloud storage service providers provide services in cloud storage, while users are in a passive position, resulting in a serious asymmetry in information control. Cloud storage transfers information to cloud storage service providers, but enterprises themselves can no longer fully control the information and storage details of cloud service providers; cloud storage is aimed at multiple users, and cloud service providers cannot provide information to owners in consideration of their own security. Present key information in storage. On the ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0819H04L63/0428H04L63/062H04L63/067H04L63/083H04L63/20H04L67/1004H04L67/1097
Inventor 许驰
Owner CHENGDU DINGZHIHUI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products