Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for encrypting log storage through utilization of 3DES encryption algorithm in cloud computing environment

A cloud computing environment and encryption algorithm technology, applied in the field of cloud computing, can solve the problems of slow encryption and decryption, inefficiency, log encryption storage occupying a lot of space, etc., to achieve low system resource occupation, sensitive data protection, and high execution efficiency. Effect

Active Publication Date: 2018-01-19
山东恒云信息科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. After years of development and practice of encryption technology, a very complete system has been established. However, in this era of rapid information development, various threats pose serious challenges to security. The resistance of existing encryption technology to these threats appears to be some powerless
[0005] 2. Log encrypted storage takes up a lot of space and is inefficient. Under the traditional encryption method, the encryption and decryption speed is slow, which cannot meet the query and view of the architecture system, and the encryption method has high requirements on the operating environment and cannot satisfy random migration. Upgrades and Migration Inconvenience
[0006] Therefore, if the 3DES encryption algorithm is used to encrypt the log storage according to the personalized requirements of the business, the current conventional software and hardware tools cannot do it.
Moreover, in the environment of Internet cloud computing, multiple log storages are distributed all over the world, and traditional technologies cannot really achieve the goal of effective security protection for log information scattered on multiple servers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting log storage through utilization of 3DES encryption algorithm in cloud computing environment
  • Method for encrypting log storage through utilization of 3DES encryption algorithm in cloud computing environment
  • Method for encrypting log storage through utilization of 3DES encryption algorithm in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Attached below figure 1 , attached figure 2 The present invention will be further described.

[0031] A method for encrypting log storage using a 3DES encryption algorithm in a cloud computing environment, comprising the steps of:

[0032] a) Establish a cloud computing platform. The cloud computing platform is equipped with N service nodes that operate independently. The service nodes include management node A, log node L, data storage node D and service provider node S.

[0033] b) Initialize the management node A, so that the management node A provides the Key file and password required for authentication.

[0034] c) Register all service nodes participating in cloud computing with management node A, and provide Key files and passwords as authentication basis when registering. After registration, you can see all service node log information on management node A, and do a good job for later setting encrypted storage get ready.

[0035] d) Set the key required for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting log storage through utilization of a 3DES encryption algorithm in a cloud computing environment. The method comprises the following steps that a), a cloud computing platform is set up; 2), a management node A is initialized; c), all service nodes participating in cloud computing are registered with the management node A; d), a key required by 3DES encryption is set on the management node A; and e), after a service providing node S and a log storage node L receive 3DES key information issued by the management node A, the 3DES key information is stored to the nodes, an encryption algorithm is started for encryption of logs, and the logs are stored. Complex software and hardware device and various development languages in the cloud computing environment can be adapted, the parallel performance can be carried out, the performance of the normal business is not influenced, the occupied system resources are few, the performance efficiency is high, and the sensitive data can be protected.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a method for encrypting log storage using a 3DES encryption algorithm in a cloud computing environment. Background technique [0002] At present, the log storage and encryption methods of mainstream cloud computing nodes are still implemented through traditional modes. These modes include using the syslog log tool to upload logs to the server for unified management, centralized storage, log file storage, and log data in database tables. Storage and public key ciphers, block ciphers, sequence ciphers, PKI technology, etc. [0003] In the new cloud computing environment, the traditional model has the following problems: [0004] 1. After years of development and practice of encryption technology, a very complete system has been established. However, in this era of rapid information development, various threats pose serious challenges to security. The resistance of existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 殷宪宝顾云夏
Owner 山东恒云信息科技有限公司