Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters

a cloud storage environment and cloud technology, applied in the field of cloud storage and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, computer clusters and mobile device clusters, can solve the problems of unresolved need, inability to ensure the integrity, confidentiality, and privacy of critical business information deployed in cloud storage environments, and online fraud has grown into a sophisticated underground economy that requires infrastructure on a massive scal

Inactive Publication Date: 2016-11-17
TENG VICTORIA KIEN MAN +3
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]The computer implemented method and system disclosed herein addresses the above stated needs for securing data in a cloud storage environment. Moreover, the computer implemented method and system disclosed herein maintains integrity, confidentiality, and privacy of information stored in the cloud storage environment. Furthermore, the computer implemented method and system disclosed herein prevents online password cracking activities on information stored in the cloud storage environment.
[0016]The BIG DATA CLOUD TOTAL TRAFFIC CONTROL MANAGER / MOBILE CLOUD TRAFFIC CONTROL MANAGER can be separate for individual security pieces or integrated together as a whole solution for fast speed and efficient.

Problems solved by technology

While technical and legal protection may exist, the integrity, confidentiality, and privacy of critical business information deployed in a cloud storage environment cannot be ensured absolutely.
However, online fraud has grown into a sophisticated underground economy that requires infrastructure on a massive scale.
Hence, there is a long felt but unresolved need for a computer implemented method and system that secures data in a cloud storage environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters
  • Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters
  • Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]FIG. 1 illustrates a computer implemented method for securing data in a cloud storage environment. As used herein, “securing data” refers to protecting data, for example, medical information, legal information, financial information such as certified public accountant (CPA) information, personal information, etc., from unwanted actions by unauthorized users. Also, as used herein, “cloud storage environment” refers to a data storage environment where data from different computing devices such as personal computers, mobile devices, etc., is stored in cloud computing systems comprising, for example, virtualization cloud systems, mobile cloud systems, mobile virtualization cloud systems, computer clusters, mobile device clusters, etc. The computer implemented method disclosed herein employs a cloud security system comprising at least one processor configured to execute computer program instructions for securing data in a cloud storage environment. In an embodiment, the cloud secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer implemented method and a cloud security system are provided for securing data in a cloud storage environment. The cloud security system receives data of multiple types from multiple sources and decodes the received data. The cloud security system stores the decoded data in one or more of multiple storage locations within the cloud storage environment and allocates one or more of multiple security actions to be performed on the stored data in each of the storage locations. The cloud security system applies multiple security algorithms to perform the allocated security actions on the stored data in each of the storage locations. The cloud security system encodes resultant data obtained from the application of the security algorithms to the stored data with a security identifier in combination with one or more of a user's authentication information, biometric data, and supplementary parameters for facilitating secure access to the resultant data.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to and the benefit of provisional patent application No. 62 / 014,579 titled “Security for cloud systems and virtualization cloud systems, mobile cloud systems and mobile virtualization cloud systems, and computer clusters and mobile device clusters”, filed in the United States Patent and Trademark Office on Jun. 19, 2014. The specification of the above referenced patent application is incorporated herein by reference in its entirety.BACKGROUND[0002]An emerging information technology (IT) delivery model is cloud computing, by which shared resources, software, and information are provided as a service over a network, for example, the internet to computers, mobile devices, and other user devices. Cloud computing enables an on-demand network access to a shared pool of configurable computing resources. Cloud computing systems in virtualized computing environments comprise servers, network storage devices, router...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/0861H04L63/145H04W12/63
Inventor TENG, VICTORIA KIEN MANTENG, ROBERT KIEN FAITSUI-TENG, JOSHUA HANSONTSUI-TENG, MATTHEW
Owner TENG VICTORIA KIEN MAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products