Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Big data security protection cloud system based on trusted computing

A security protection and trusted computing technology, applied in the field of big data, can solve problems such as side channel attacks, achieve the effect of small calculation, increase calculation speed, and save time and cost

Inactive Publication Date: 2017-02-22
GUANGXI POWER GRID CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, security problems in traditional networks, such as denial of service attacks and distributed denial of service attacks, are increasing in the cloud platform. At the same time, the characteristics of multi-tenant sharing of cloud computing also breed some new security risks, such as side channel attacks; Although there have been many studies on cloud security in industry and academia, the research on cloud internal network protection is still in its infancy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security protection cloud system based on trusted computing
  • Big data security protection cloud system based on trusted computing
  • Big data security protection cloud system based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention is further described in conjunction with the following examples.

[0040] Such as figure 1 The shown big data security protection cloud system based on trusted computing includes a trusted cloud network node security classification system 10, a multi-level trusted security protection configuration system 20, a network security monitoring system 30, and a cloud service system 40. The trust cloud network node security grading system 10 divides the network nodes into 4 different security levels by calculating the importance value of the network nodes, and the multi-level trusted security protection configuration system 20 is based on the trusted cloud network node security grading system 10. Classification results provide different security encryption services for network nodes of different security levels and links between nodes; the network security monitoring system 30 is used to monitor the status of network nodes, and the cloud service system 40 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a big data security protection cloud system based on trusted calculation. The big data security protection cloud system constructs a security configuration system based on a trusted security grading system and minimal trees on the basis of systems having security grading functions and trusted security configuration functions, and provides a trusted calculating environment for the security protection of information through the cooperation with a security network monitoring system. The trusted protection cloud system starts from the acquisition and security grading of basic data, divides the network nodes into four different security grades by calculating the importance values of the network nodes, and constructs an integral trusted environment, and by means of the security grading configuration with high credibility, the trusted security of information security and protection is guaranteed, the data cannot be acquired randomly, and a good balance between the calculated quantity and trusted security configuration is achieved.

Description

technical field [0001] The invention relates to the field of big data, in particular to a big data security protection cloud system based on trusted computing. Background technique [0002] Cloud computing has attracted more and more users, especially enterprise users. Through cloud computing, enterprise users do not need to build and maintain their own data centers, but only need to quickly apply for and release cloud service providers according to their own business load requirements. The various resources provided have successfully liberated major enterprise users from the huge cost consumption of infrastructure construction and maintenance, allowing them to focus more on the development of their core business. Cloud computing has such powerful advantages, but due to its unique features such as virtualization technology, data hosting and outsourcing services, it also faces unprecedented security challenges. First of all, security problems in traditional networks, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/105H04L63/20H04L67/10
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月郑俊明曾明霏杭聪宋骏豪沈汉灵何钟柱
Owner GUANGXI POWER GRID CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products