Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile cloud data graded access control method based on credibility of mobile terminals

A mobile terminal and access control technology, applied in wireless communication, electrical components, transmission systems, etc., can solve problems such as low storage capacity and limited computing power of mobile terminals, achieve flexible classification and authority changes, and overcome cloud trusted access. into the problem and overcome the effect of limited computing power

Active Publication Date: 2016-12-14
SICHUAN HENGJINYI SCI & TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to overcome the deficiencies of the prior art, and provide a mobile cloud data hierarchical access control method based on the trust degree of mobile terminals. Through the dynamic management of mobile cloud and the self-management method of mobile terminals, the interaction between mobile terminals is utilized. Credibility evaluation and linking this credibility with access rights can not only overcome the shortcomings of limited computing power and low storage capacity of mobile terminals, but also effectively ensure the reliability and security of mobile cloud data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile cloud data graded access control method based on credibility of mobile terminals
  • Mobile cloud data graded access control method based on credibility of mobile terminals
  • Mobile cloud data graded access control method based on credibility of mobile terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0020] Such as figure 1 As shown, there are m mobile terminals in the system to provide data respectively denoted as PD i ,i=1,2,3,...m, the corresponding reliability is β_PD i ,i=1,2,3,..., the data provided by each mobile terminal is encrypted and stored in the cloud, and there are n mobile terminals making data access requests to the cloud, expressed as Its corresponding reliability is β_SQ i ,i=1,2,3,..., after using the data in the cloud, it evaluates the credit of the data, expressed as F i , i=1, 2, 3, . . .

[0021] Such as figure 2 As shown, the mobile cloud data hierarchical access control method based on mobile terminal trustworthiness, it comprises the following steps:

[0022] It is assumed that each mobile terminal has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile cloud data graded access control method based on the credibility of mobile terminals. By means of dynamic management of mobile cloud sides and self-management of the mobile terminals, the mutual credibility evaluation of the mobile terminals is utilized; furthermore, the credibility is associated with access permission; therefore, the disadvantage that the mobile terminals are limited in calculation capability and low in storage capability are overcome; furthermore, the reliability and the security of mobile cloud data can be effectively ensured; the problem of credible access of a huge number of cloud sides of the mobile terminals can be overcome; and simultaneously, the mobile cloud sides can flexibly realize access permission grading and permission changing.

Description

technical field [0001] The invention relates to a mobile cloud security access technology, in particular to a mobile cloud data hierarchical access control method based on the trust degree of a mobile terminal. Background technique [0002] The computing power and storage capacity of existing mobile terminals and some functions provided by remote Internet services have been difficult to meet the needs of most mobile users, but the powerful computing power and unlimited storage capacity of cloud computing can help improve user Experience =, cloud computing services have gradually expanded from PCs to mobile terminal devices. With the development of cloud computing and mobile Internet, mobile cloud computing has become one of the hottest new technologies today. [0003] Mobile cloud is the application of virtualization technology to mobile terminals. In mobile cloud computing, mobile users implement data storage and processing services on the cloud platform. At the same time, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/0431H04W12/069
CPCH04L63/062H04L63/10H04W12/04
Inventor 罗杰文革李家云
Owner SICHUAN HENGJINYI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products