Cloud computing security system and method

A security system, cloud computing technology, applied in the field of cloud computing to achieve the effect of enhancing security

Active Publication Date: 2014-08-06
GUANGDONG XUANYUAN NETWORK & TECH
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the traditional form is that as long as the user can open the corresponding computer and enter the corresponding work interface, he can open and view the data or files, or he can crack the locked folder to view the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing security system and method
  • Cloud computing security system and method
  • Cloud computing security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments, taking cloud computing data transmission as an example.

[0020] One aspect of the present invention provides a cloud computing security system, such as figure 1 As shown, it includes a plurality of user terminals 100, a cloud data security system 200, and a cloud server 300. In this embodiment, data interaction between the user terminal 100 and the cloud server 300 is taken as an example for illustration. Such as image 3 As shown, the user terminal 100 includes a service system 102 , a user terminal network interface 101 communicatively connected to the Internet and / or mobile Internet, and a software development kit 103 . Such as figure 2 As shown, the cloud server 300 includes an access system 301, a login system 302, a business connection system 303, a business processing and caching system 304, a database 305, and a cloud server n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud computing security system, comprising a plurality of user terminals, a cloud data security system and a cloud server side, wherein each user terminal comprises a business system, a user terminal network interface and a software development kit, wherein the business system is connected with a login system of the cloud server side through an internet and / or mobile internet, a heartbeat packet is transmitted to the login system by the business system, the user terminal network interface is in communication connection with the internet and / or mobile internet, and used for realizing data interaction between the user terminal and the cloud server side, and the software development kit is arranged inside a memory of the user terminal, and used for being implanted into developed application software by a developer. The cloud data security system comprises a monitoring system for monitoring reading and writing-in operations of a user, a filtering system for filtering file data which does not need to be encrypted, and an encryption and decryption system for data encryption and data decryption.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a cloud computing security system and method. Background technique [0002] Cloud computing is a hot topic in the current information field. At present, cloud computing is divided into public cloud, private cloud and hybrid cloud. Various types of cloud infrastructure platforms, cloud services, cloud storage systems, etc. emerge in endlessly. However, the current development of cloud computing still faces a series of technical challenges. Whether it is public cloud, private cloud or hybrid cloud, data information security is an important challenge. As a cloud computing user, I am particularly concerned about whether my data security and privacy can be guaranteed. For example, I am worried about the security of the data network, and worry that after handing over my code and data to the cloud service provider, the cloud service provider also has the right to control and protect th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 曹继翔
Owner GUANGDONG XUANYUAN NETWORK & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products