File processing method based on big data

A file processing and big data technology, applied in the field of big data security, can solve problems such as data pollution and achieve the effect of ensuring security

Active Publication Date: 2017-11-24
成都华西公用医疗信息服务有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, even if the user can obtain very limited identities, and the system also adopts a data redundancy storage strategy, multiple illegal users can still easily obtain the identities of the storage nodes corresponding to the data copies through union, thus pollute the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File processing method based on big data
  • File processing method based on big data
  • File processing method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0018] figure 1 It is a flowchart of a method for processing files based on big data according to an embodiment of the present invention. The present invention aims at the characteristics of the cloud storage system. The present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for processing a file based on large data, including: cloud platform server generates a secret key parameter, and selects a secured node; a user enters a system through the secured node; the secured node exchanges the secret key with the user; the secured node generates a corresponding private key and token for the user; the cloud platform server generates a password calculation; the calculation includes random numbers with the length of a preset bit; the user cracks the random number through exhaustion, and then obtains the private key by using decoding; and other nodes in the cloud platform determine whether the user has a legal identity. The method of the present invention can effectively solve the problem of attacking by an illegal user through a network logic address, guarantee the security of the system and is adapted to a cloud storage system.

Description

technical field [0001] The invention relates to big data security, in particular to a file processing method based on big data. Background technique [0002] The cloud storage system for big data ensures the high reliability of the services provided through the management and operation mechanism of the cloud platform; on the other hand, it provides low-cost and huge-capacity storage space by pooling the storage resources contributed by all participating users In order to effectively meet the needs of high-speed Internet applications in terms of large-scale, high efficiency, high reliability, high scalability and high cost performance. The user scale and data scale of the cloud system are huge, and it has more complex security issues. Users are users of the system. The user authorization control mechanism is the first line of defense for the security of the cloud storage system. It is used to determine whether the user can log in to the system. Verify the user's legitimate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0822H04L63/062H04L63/083H04L67/1097
Inventor 赵欢王隼林利
Owner 成都华西公用医疗信息服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products