Unlock instant, AI-driven research and patent intelligence for your innovation.

Access method for shared storage information in cloud computing platform

A cloud computing platform and shared storage technology, applied in the field of cloud computing, can solve the problems of cluster node applications vulnerable to malicious attacks, unable to create a safe operating environment, attacks, etc., to ensure isolation, solve time-consuming problems, and ensure security Effect

Active Publication Date: 2018-06-12
PENGYUAN CREDIT ESTIMATION
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the complexity and openness of mobile terminal cluster nodes make it impossible to create a safe operating environment, and the cluster nodes themselves and applications are vulnerable to malicious attacks
In addition, encrypting and storing private data in the ordinary file system also has the risk of illegal damage and attack
Although the trusted isolation zone technology provides a secure and isolated runtime environment for applications to process private data, it fails to provide a unified secure access interface for verified application development and web application development, while web applications that send data security access requests Do security checks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method for shared storage information in cloud computing platform
  • Access method for shared storage information in cloud computing platform
  • Access method for shared storage information in cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0021] One aspect of the present invention provides a method for accessing shared storage information under a cloud computing platform. figure 1 It is a flowchart of a method for accessing shared storage information under a cloud compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access method for shared storage information in a cloud computing platform. The method comprises the following steps: analyzing a terminal access address, to obtain accessedauthentication information; judging the type of access data according to the authentication information, if the type is control data, processing the control data by a main control module of a privatecloud; if the type is transaction data, forwarding an address request to a cluster engine of the private cloud, and processing the transaction data by the cluster engine. The provided access method for the shared storage information in the cloud computing platform is capable of performing the spatial instantiation on a basic cluster environment of the cloud platform, more adequately using the system resources of the cluster, and solving a time-consuming problem caused by using the private cloud of a virtual machine. The separation between private data and cluster nodes is guaranteed, the separation between the private data and authenticated applications is guaranteed, and the safety of the private storage is guaranteed.

Description

technical field [0001] The invention relates to cloud computing, in particular to a method for accessing shared storage information under a cloud computing platform. Background technique [0002] The affairs handled by mobile terminals extend from the traditional communication field to high-security affairs fields such as office and payment. Mobile terminals need to process user account information, personal privacy information, payment order information, private files, etc. How to effectively ensure the security of private data has become a difficult problem for mobile terminal devices to carry out security and private affairs. The existing solution is to encrypt private data through high-strength cryptographic algorithms, and use the authority control of cluster nodes to restrict data access. However, the complexity and openness of mobile terminal cluster nodes make it impossible to create a safe operating environment, and the cluster nodes themselves and applications ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/1097
Inventor 刘颖
Owner PENGYUAN CREDIT ESTIMATION