Method for protecting security of computer system based on cloud computation

A computer system and cloud computing technology, applied in transmission systems, electrical components, etc., can solve problems such as the complex relationship between applications and hardware, networks and operating systems, the lack of consideration of service quality constraints, and the adverse impact of client computer data security.

Inactive Publication Date: 2018-08-24
JIANGSU COLLEGE OF FINANCE & ACCOUNTING
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In the existing cloud computing mode, the cloud computing server is set at the remote end, and the cloud computing service provider usually needs the internal data source of the cloud computing client's computer, which adversely affects the data security of the client computer.
At the same time, with the deepening of Internet applications, the operating environment of the data center is transforming from the traditional client / server to the central server connected to the network. Center security introduces many uncertainties
[0010] The existing continuous location-based service requests do not consider the service quality constraints of different requests in the process of generating anonymous areas, and ignore that users in different locations have different location privacy requirements and service quality requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting security of computer system based on cloud computation
  • Method for protecting security of computer system based on cloud computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057]In the existing cloud computing mode, the cloud computing server is set at the remote end, and the cloud computing service provider usually needs the internal data source of the cloud computing client's computer, which adversely affects the data security of the client computer. At the same time, with the deepening of Internet applications, the operating environment of the data center is transforming from the traditional client / server to the central server connected to the network. Center security introduces many uncertain factors.

[0058] Such as figure 1 As shown, the present invention provides a method for prote...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of the computer security, and discloses a method for protecting security of computer system based on cloud computation. The method comprises the followingsteps: a computer client sends a request to a data analysis platform; the cloud security control center is responsible for monitoring real-time dynamic of each cloud data center; the cloud security control center further needs to formulate security rule and standard to send to the cloud security sub-module of each cloud data center; a data analysis platform receives the request sent by the clientthrough the monitoring of the cloud security control center; a logic cloud server provides specific logic for the data analysis platform according to the received information, and returns a processingresult to the computer client. Through the method disclosed by the invention, the security, the privacy and non-leakage of the data of the data owner are guaranteed from the structure, and the knowledge, the experience and the algorithm of the cloud side can be applied; the method can be cooperated with the cloud security control center to maintain the security of the data center, and the security of the whole data center is further improved through the own design feature.

Description

technical field [0001] The invention belongs to the technical field of computer security, in particular to a method for protecting computer system security based on cloud computing. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Cloud computing is the growth, usage and delivery model of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. Cloud is a metaphor for network, internet. In the past, the cloud was often used to represent the telecommunications network in the figure, and later it was also used to represent the abstraction of the Internet and the underlying infrastructure. Therefore, cloud computing can even allow you to experience the computing power of 10 trillion times per second. With such powerful computing power, you can simulate nuclear explosions, predict climate change and market development tre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/20H04L67/125H04L67/52
Inventor 郑习武
Owner JIANGSU COLLEGE OF FINANCE & ACCOUNTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products