Secure cloud storage system

A cloud storage system and security technology, applied in the field of network security, can solve problems such as poor cloud storage security, and achieve the effects of reduced workload, complete coverage and high security

Inactive Publication Date: 2018-03-30
SUIHUA UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a secure cloud st

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud storage system
  • Secure cloud storage system
  • Secure cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see Figure 1~2 , the secure cloud storage system includes a cloud server, a cloud gateway, a client terminal, and a verification server. The client terminal connects to the cloud server through the cloud gateway, and the verification server is respectively connected to the client terminal and the cloud server. Integrity of files in the server; the cloud gateway is equipped with an inter-client management module, an internal client management module, and a security control module. The inter-client security management module receives the security policy management commands of the cloud server and stores the policy management results in the inter-client security In the isolation policy, the customer internal management module receives security policy management commands from the customer, and stores the policy management results in the customer internal security policy, and the security control module authenticates the login user according to the security isolation policy ...

Embodiment 2

[0030] see Figure 3-4 , the cloud storage system also includes a virtual storage pool, which is connected to the cloud gateway; the cloud gateway also has a frequency evaluation module and a backup module, the frequency evaluation module is used to evaluate the access frequency of files in the virtual storage pool, and the backup module will access Infrequent files are backed up to cloud servers. The present invention decides whether to store the files on the cloud server by judging the access frequency of the files, thereby reducing the cost of hardware storage, and at the same time frequently used files are stored in the local virtual storage pool, which has higher security.

[0031] There is also an update module in the cloud gateway, which is used to update the status of the backed-up data to be transferred when the backup module backs up the data whose temperature is cold. After the backed-up data is backed up to the cloud server, the update is The status of the backup ...

Embodiment 3

[0033] see Figure 5 , the cloud gateway also has an attack judgment module and an attack analysis module, the attack judgment module is used to judge the type of attack scene; the attack judgment module judges the type of attack scene includes:

[0034] Identify whether the attack feature is a multi-step attack feature or a single-step attack feature;

[0035] When the attack feature is identified as a single-step attack feature, it is judged that the type of attack scenario is a simple attack process;

[0036] When the attack feature is identified as a multi-step attack feature, it is judged that the type of attack scenario is a complex attack process;

[0037] The attack analysis module is used to analyze the security event flow by using a character string matching-based model when it is determined that the type of the attack scene is a simple attack process. The analysis module uses a model based on string matching to analyze security event streams, including:

[0038] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure cloud storage system. The secure cloud storage system comprises a cloud server, a cloud gateway, a client terminal and a verification server; the client terminal connects to the cloud server through the cloud gateway; the verification server is connected with the client terminal and the cloud server through a network; and the client terminal verifies the integrityof files stored in the cloud server through the verification server. According to the invention, the verification server is used to verify the integrity of the files stored in the cloud server, therefore, the files can be stored integrally; the security responsibilities of cloud service providers and customers are clearly divided through an inter-customer management module and a customer internalmanagement module without overlapping; the security management coverage is complete, and the security is high; the cloud service providers are only responsible for the management of a customer security isolation strategy, therefore, the workload is reduced effectively; and the customers perform the management on the customers through the customer internal management module, therefore, the confidence of the customers to the cloud server is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a secure cloud storage system. Background technique [0002] As an emerging network storage technology, cloud storage is a collection of a large number of different types of storage devices in the network to work together through application software to provide data storage and business access to the outside world. Users can use the device at any time and any place. It is very convenient to store and read data. [0003] The biggest problem currently facing cloud storage is data security. Once the user's data is lost or stolen, it will cause great losses to the user. Contents of the invention [0004] The purpose of the present invention is to provide a safe cloud storage system to solve the problem of poor security of existing cloud storage. [0005] To achieve the above purpose, specifically, the secure cloud storage system includes a cloud server, a cloud gateway, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 王铁滨杨晶孙珊珊李欣马春华
Owner SUIHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products