Method for accessing big data of cloud platform

An access method and cloud platform technology, applied in the field of big data security, can solve problems such as data pollution and achieve the effect of ensuring security

Active Publication Date: 2015-10-28
成都华西公用医疗信息服务有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, even if the user can obtain very limited identities, and the system also adopts a data redundancy storage strategy, multiple illegal users can still easily obtain the identities of the storage nodes corresponding to the data copies through union, thus pollute the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing big data of cloud platform
  • Method for accessing big data of cloud platform
  • Method for accessing big data of cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following appendices illustrate the principles of the present invention. Figure 1 A detailed description of one or more embodiments of the invention is provided. The present invention is described in conjunction with such embodiments, but the present invention is not limited to any embodiment. The scope of the invention is limited only by the claims, and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0020] figure 1 It is a flowchart of a cloud platform big data access method according to an embodiment of the present invention. The present invention aims at the characteristics of the cloud storage system. The present invention util...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for accessing big data of a cloud platform. The method comprises the steps as follows: a cloud platform server generates a secret key parameter and selects a security node, a user joins a system through the security node; the security node executes secret key exchange with the user, the security node generates a corresponding private key and a token for the user; the user verifies a message, decryption is performed to obtain the private key, and other nodes in the cloud platform determine whether the user has a legal identity. The method of the present invention can effectively solve the problem that an illegal user makes an attack through a network logical address, can ensure security of the system, and is suitable for a cloud storage system.

Description

technical field [0001] The invention relates to big data security, in particular to a method for accessing big data on a cloud platform. Background technique [0002] The cloud storage system for big data ensures the high reliability of the services provided through the management and operation mechanism of the cloud platform; on the other hand, it provides low-cost and huge-capacity storage space by pooling the storage resources contributed by all participating users In order to effectively meet the needs of high-speed Internet applications in terms of large-scale, high efficiency, high reliability, high scalability and high cost performance. The user scale and data scale of the cloud system are huge, and it has more complex security issues. Users are users of the system. The user authorization control mechanism is the first line of defense for the security of the cloud storage system. It is used to determine whether the user can log in to the system. Verify the user's l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L9/08H04L9/3263H04L63/0823H04L63/0876H04L63/105H04L67/10
Inventor 唐明亮刘剑秋吴麒
Owner 成都华西公用医疗信息服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products