Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control system based on cloud computing data security

A technology of data security and access control, applied in the field of cloud computing, can solve problems such as potential safety hazards and inability to guarantee safe access of users in external domains, and achieve the effects of reducing difficulty, safe and reliable data interaction, and avoiding security risks

Inactive Publication Date: 2021-03-26
STATE GRID ANHUI ELECTRIC POWER CO LTD +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an access control system based on cloud computing data security in order to solve the problem that the above-mentioned cloud computing cannot guarantee the safe access of external domain users during access control, and there are potential safety hazards. The authorization unit has double protection for internal domain and external domain users, making data access more secure and reliable, and less vulnerable to malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system based on cloud computing data security
  • Access control system based on cloud computing data security
  • Access control system based on cloud computing data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] see figure 1 As shown, an access control system based on cloud computing data security includes an access policy unit, a trusted authorization unit and a user unit, and the user unit includes internal domain users and external domain users, wherein the access policy unit is used to connect all The internal domain user and the cloud computing platform, the trusted authorization unit is used to connect the external domain user and the cloud ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control system based on cloud computing data security, and belongs to the technical field of cloud computing. The system comprises an access strategy unit, a credibleauthorization unit and a user unit; the user unit comprises an inner domain user and an outer domain user; the access strategy unit is used for connecting the inner domain user with a cloud computingplatform, and the trusted authorization unit is used for connecting the external domain user and the cloud computing platform; the access strategy unit receives an access request of the internal domain user and verifies identity information of the internal domain user, so that data transmission between the internal domain user and the cloud computing platform is realized; and the trusted authorization unit encrypts an authorization instruction of the cloud computing platform, so that the external domain user obtains the access permission of the cloud computing platform by decrypting the authorization instruction. Users accessing the cloud computing platform are divided into inner domain users and outer domain users through the access strategy unit and the credible authorization unit, andthe access process is controlled to be safer and more reliable.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to an access control system based on cloud computing data security. Background technique [0002] With the development of cloud computing, cloud security has become an increasingly critical issue. In the cloud computing environment, users lose control over the data and computing placed in the cloud server, and have no control over whether the data is protected or the computing tasks are executed correctly. It cannot be determined, so it is necessary to design corresponding security mechanisms and architectures to protect the confidentiality, integrity, and availability of user data. How to implement a fine-grained access control mechanism for a large number of classified and hierarchical resources in cloud storage to ensure that data in cloud storage is not illegally accessed is a problem that needs to be solved urgently in cloud computing technology. [0003] Traditional c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/107
Inventor 周明赵永红王伟由媛媛周永刚巩舒王筠吴极项旭王丽张旭程少华蒋志刚徐军
Owner STATE GRID ANHUI ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products