Cloud computing data security processing system

A data processing and data security technology, applied in the field of data processing, can solve problems such as hidden dangers affecting data security, and achieve the effect of improving security, improving technical effects, and ensuring computing requirements

Pending Publication Date: 2022-07-22
李林骏
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this application is to provide a cloud computing data security processing system to solve the technical problems in the prior art that cloud computing processing is affected by different computing processing elements, and there are potential safety hazards that affect data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing data security processing system
  • Cloud computing data security processing system
  • Cloud computing data security processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Please see attached figure 1 , an embodiment of the present application provides a cloud computing data security processing method, the method is applied to a cloud computing data security processing system, and the method includes:

[0032] Step S100: Obtain data processing information to be calculated, wherein the data processing information to be calculated includes a data processing type and a data processing target.

[0033] Specifically, the data processing information to be calculated includes the data information that needs to be processed currently, the data processing type, and the data processing target. The data information is the specific data content; the data processing type is the business feature that needs to be processed, that is, the specific processing Which operations are processed; the data processing targets are which cloud computing needs to be performed, and which cloud platforms and applets are to be transmitted and processed.

[0034] Step S...

Embodiment 2

[0078] Based on the same inventive concept as the cloud computing data security processing method in the foregoing embodiment, the present invention also provides a cloud computing data security processing system, please refer to the appendix figure 2 , the system includes:

[0079] a first obtaining unit 11, the first obtaining unit 11 is configured to obtain data processing information to be calculated, wherein the data processing information to be calculated includes a data processing type and a data processing target;

[0080] a second obtaining unit 12, the second obtaining unit 12 is configured to obtain a cloud computing processing node according to the data processing type and data processing target;

[0081] The third obtaining unit 13, the third obtaining unit 13 is configured to perform node operation feature analysis according to the cloud computing processing node, and obtain the computing node feature;

[0082] a first determining unit 14, the first determining...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing data security processing system. The method comprises the following steps: obtaining to-be-computed data processing information including a data processing type and a data processing target; obtaining a cloud computing processing node according to the data processing type and the data processing target; performing node operation feature analysis according to the cloud computing processing nodes to obtain computing node features; performing risk assessment according to the computational node features, and determining a node risk level and a node risk type; performing defense element matching according to the node risk type to obtain risk defense elements; and performing security defense means analysis according to the node risk level and the risk defense elements to obtain computing node security processing information. The technical problem that cloud computing processing is affected by different operation processing elements, potential safety hazards exist, and data safety is affected is solved. The technical effects of performing targeted security risk analysis and risk prevention and control on the computing nodes involved in the cloud computing and improving the cloud computing data processing reliability are achieved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, to a cloud computing data security processing system. Background technique [0002] In recent years, with the rapid development of the Internet and the continuous advancement of technology, the cloud computing market has begun to take shape. Cloud computing is a type of distributed computing, which refers to decomposing huge data computing processing programs into countless small programs through the network "cloud", and then processing and analyzing these small programs through a system composed of multiple servers to obtain results and returned to the user. As an emerging applied computer technology, cloud computing not only provides computing services, but also provides storage services. When all computing behaviors and data storage are exposed in the cloud, which is invisible and illusory, it will inevitably involve When it comes to the private data of i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/1097
CPCH04L63/0407H04L63/0428H04L63/10H04L63/20H04L67/1097
Inventor 李林骏朱志魏玉康
Owner 李林骏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products