Big data storage method

A technology of big data storage and key parameters, which is applied in the field of big data security, can solve problems such as data pollution, and achieve the effect of ensuring security

Active Publication Date: 2015-09-23
成都华西公用医疗信息服务有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, even if the user can obtain very limited identities, and the system also adopts a data redundancy storage strategy, multiple illegal users can still easily obtain the identities of the storage nodes corresponding to the data copies through union, thus pollute the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data storage method
  • Big data storage method
  • Big data storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0026] figure 1 is a flow chart of a large data storage method according to an embodiment of the present invention. The present invention aims at the characteristics of the cloud storage system. The present invention utilizes the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a big data storage method. The method includes: a cloud server distributes an identification for a user based on a network logic address of the user, exports a public key of the user from the identification of the user, calculates and generates a private key of the user via a pre-generated secret key parameter, generates and distributes a key pair corresponding to the identification for the private key, and sets the legal user as the system middle node; during the login of the user, user verification is realized via the manner of callback, and when the current user can receive a connection of the network logic address, the user is determined to be the legal owner of the address. According to the method, the problem that illegal users carry out attacks via the network logic addresses can be effectively solved, the system security is guaranteed, and the method is applicable to cloud storage systems.

Description

technical field [0001] The invention relates to big data security, in particular to a big data storage method. Background technique [0002] The cloud storage system for big data ensures the high reliability of the services provided through the management and operation mechanism of the cloud platform; on the other hand, it provides low-cost and huge-capacity storage space by pooling the storage resources contributed by all participating users In order to effectively meet the needs of high-speed Internet applications in terms of large-scale, high efficiency, high reliability, high scalability and high cost performance. The user scale and data scale of the cloud system are huge, and it has more complex security issues. Users are users of the system. The user authorization control mechanism is the first line of defense for the security of the cloud storage system. It is used to determine whether the user can log in to the system. Verify the user's legitimate identity. Only ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/3006H04L63/0442H04L63/08H04L67/1097
Inventor 毕永东郑涛郑兵
Owner 成都华西公用医疗信息服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products