CN103108028A - Cloud computing processing system with security architecture - Google Patents

Cloud computing processing system with security architecture Download PDF

Info

Publication number
CN103108028A
CN103108028A CN2012105268667A CN201210526866A CN103108028A CN 103108028 A CN103108028 A CN 103108028A CN 2012105268667 A CN2012105268667 A CN 2012105268667A CN 201210526866 A CN201210526866 A CN 201210526866A CN 103108028 A CN103108028 A CN 103108028A
Authority
CN
China
Prior art keywords
module
cloud
data analysis
cloud computing
analysis module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105268667A
Other languages
Chinese (zh)
Inventor
宗竞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Original Assignee
JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd filed Critical JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Priority to CN2012105268667A priority Critical patent/CN103108028A/en
Publication of CN103108028A publication Critical patent/CN103108028A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A cloud computing processing system with a security architecture includes a client module, a database module, a cloud computing server and a data analysis module. The client module sends a request to the data analysis module, the database module is used for storing data, the cloud computing server is used for setting computing rules and providing the special computing rules to the data analysis module according to different situations, the data analysis module is used for receiving the request and acquiring the corresponding computing rules according to the requested parameters, combining with the data in the database to carry out the cloud computing process according to the computing rules and returning processed results to the client module. The cloud computing processing system further includes a client encryption/decryption module and a cloud security module, the client encryption/decryption module is used for encrypting the request and sending the encrypted request to the data analysis module and for decrypting the results returned by the data analysis module. The cloud security module is used for authenticating the identities of users, decrypting the request, encrypting the results returned by the data analysis module and monitoring the operation of the users. The cloud computing processing system with the security architecture can improve the safety of the cloud computing processing system.

Description

A kind of cloud computation treating system with security architecture
Technical field
The present invention relates to a kind of cloud computing system, especially relate to a kind of cloud computation treating system with security architecture.
Background technology
Fast development along with Internet technology, a kind of account form-cloud computing of Internet-based technology is just flourish, by the cloud computing mode, software and hardware resources and the information shared can offer corresponding computer and miscellaneous equipment as required, make the user carry out the Internet when operation and can overcome the restriction of self software and hardware resources, efficient quick ground obtains resource and the information that oneself needs from the Internet, this content that obtains the magnanimity information from the Internet for the user oneself being concerned about has very important significance.
cloud computing service normally realize by accessing by online business cloud computing platform, cloud computing platform is to be responsible for building and safeguarding by specific cloud computing platform provider, can bring in by corresponding client through the user who authenticates cloud computing platform is conducted interviews and uses, cloud computing platform generally comprises cloud computing server, be arranged on the software on cloud computing server and have the data center that stores data, client is connected with cloud computing platform by the Internet, the user can submit request to by client, after the corresponding safety of request process to the user authenticates with license, the request that cloud computing server can propose based on the user is also called software according to corresponding algorithm and is carried out the cloud computing operation, the data that for example user provided are processed, according to user's requirement mining data on the internet, the data that the user is submitted to send to other user etc., data center is an important component part of cloud computing platform, its user stores user's various request msgs, the data message that arrives by web mining, and the operation rules of storage cloud computing platform and security control content etc.
Because the user visits and use cloud computation treating system by client, and cloud computing system by the Internet with corresponding data information transfer to the user, in this two-way data transmission procedure, the safety issue of the safety issue of transfer of data and cloud computation treating system itself is all vital.On the one hand, prevent that the user is transferred to the leakage of information of cloud computation treating system, with protection user's privacy; On the other hand, to prevent that also cloud computation treating system from sending to the fail safe of user data, prevent that simultaneously the disabled user from carrying out some unwarranted operations to cloud computation treating system, brings risk with the exempt from customs examination cloud computation treating system.And also there is certain defective in present cloud computation treating system at above-mentioned secure context, it is only that identity to the user authenticates, this authentication is generally to realize by user name and the user cipher of input registration in client, there is very large leak in this safety certifying method, be easy to network hacker with opportunity, in case these disabled users steal subscriber identity information and log in cloud computation treating system, will possibly whole cloud computation treating system be caused larger loss.
Therefore, provide a kind of cloud computation treating system with higher safety assurance to become the instant work in this area.
Summary of the invention
The invention provides a kind of cloud computation treating system with security architecture, it is by in the corresponding security mechanism of customer end adopted and by the cloud security module is set, can effectively guarantee the fail safe of client submission data and the fail safe of cloud computation treating system itself, and can monitor user's all operations, greatly improved the safe operation of cloud computation treating system.
cloud computation treating system with security architecture of the present invention comprises client modules, database module, cloud computing server, data analysis module, wherein, described client modules is used for sending request to described data analysis module, described database module is used for the storage data, described cloud computing server is used for computation rule being set and according to different situations, specific computation rule being offered data analysis module, described data analysis module be used for to receive request that client modules sends and according to the computation rule of the parameter acquiring cloud computing server of described request, and carry out calculation process with this computation rule in conjunction with the data in database, result is back to client modules, it is characterized in that:
Described cloud computation treating system also comprises client encrypt/deciphering module and cloud security module, wherein, described client encrypt/deciphering module sends to described data analysis module after being used for the request that the user inputs by client modules is encrypted, and the result that is used for data analysis module is returned is decrypted; Described cloud security module be used for to the user carry out authentication, result that the request of user's input is decrypted, described data analysis module is returned is encrypted and user's operating process is monitored etc.
Wherein, described client encrypt/deciphering module is implemented as by chip hardware, symmetric cryptographic algorithm and combination key generating algorithm in conjunction with the smart card that forms, in the chip of smart card, adopt symmetric cryptographic algorithm to set up the client encrypt system, and write symmetric cryptographic algorithm, combination key generating algorithm, encrypt/decrypt agreement.
wherein, described cloud security module comprises the authenticating user identification unit, data decryption unit, DEU data encryption unit and operation supervise and control unit, described authenticating user identification unit is used for according to the rules authentication protocol to authenticating with user identity, cleartext information after described data decryption unit is used for the request that client modules sends is decrypted and will deciphers according to corresponding decipherment algorithm is transferred to described data analysis module, described DEU data encryption unit is used for the result of described data analysis module is encrypted and ciphertext is returned to described client modules, described operation supervise and control unit is used for to the user all operations on cloud computing platform and monitors.
Wherein, described operation supervise and control unit is provided with login log database and Operation Log database, recording user login cloud computing platform and operating for information about on cloud computing platform.
Wherein, the keeper of described cloud computation treating system can check and download the described recorded information that logs in log database and described Operation Log database.
Description of drawings
Fig. 1 is the composition structural representation with cloud computation treating system of security architecture of the present invention.
Embodiment
Cloud computation treating system of the present invention comprises client modules 1, database module 2, cloud computing server 3, data analysis module 4.Wherein, client modules 1 is arranged on user's terminal computer, it is the private client software that is provided by cloud computation treating system provider, this client modules 1 is used for sending request to data analysis module 4, database module 2 is used for the storage data, and these data comprise that data that solicited message, cloud computation treating system work that the user sends are required and cloud computation treating system process the data message that obtains etc. according to user's request; Cloud computing server 3 is used for computation rule being set and according to different situations, specific computation rule being offered data analysis module 4, the computation rule here can have multiple, it should comprise the computation rule that present this area is commonly used, and can be regular or irregularly upgrade and safeguard; Data analysis module 4 is used for receiving request that client modules 1 sends and according to the computation rule of the parameter acquiring cloud computing server 2 of described request, and carry out calculation process with this computation rule in conjunction with the data in database, result is back to client modules 1.
Send the fail safe of information in order to improve the user side module, as a key of the present invention, cloud computation treating system of the present invention also comprises client encrypt/deciphering module 5 and cloud security module 6, wherein, client encrypt/deciphering module 5 sends to data analysis module 4 after being used for the request that the user inputs by client modules 1 is encrypted, and the result that is used for data analysis module 4 is returned is decrypted; Cloud security module 6 be used for to the user carry out authentication, result that the request of user's input is decrypted, data analysis module 4 is returned is encrypted and user's operating process is monitored etc.
In the present invention, in order to improve the security mechanism of client modules, client encrypt/deciphering module 5 is implemented as by chip hardware, symmetric cryptographic algorithm and combination key generating algorithm in conjunction with the smart card that forms, in the chip of smart card, adopt symmetric cryptographic algorithm to set up the client encrypt system, and write symmetric cryptographic algorithm, combination key generating algorithm, encrypt/decrypt agreement.When the user logs on this cloud computation treating system by client modules, this smart card should be connected with user's terminal computer, be connected thereby set up safety between client modules 1 and cloud computing platform.
in the present invention, cloud security module 6 comprises authenticating user identification unit 61, data decryption unit 62, DEU data encryption unit 63 and operation supervise and control unit 64, the authentication protocol that authenticating user identification unit 61 is used for according to the rules authenticates user identity, cleartext information after data decryption unit 62 is used for the request that client modules 1 sends is decrypted and will deciphers according to corresponding decipherment algorithm is transferred to data analysis module 4, DEU data encryption unit 63 is used for the result of data analysis module 4 is encrypted and ciphertext is returned to client modules 1, operation supervise and control unit 64 is used for to the user all operations on cloud computing platform and monitors.
For the ease of recording-related information, operation supervise and control unit 64 also is provided with login log database and Operation Log database, recording user login cloud computing platform and operating for information about on cloud computing platform.Log in log database and Operation Log database by setting, can accurately and timely the user be stored all operations of cloud computation treating system, so that later using and analyzing.
When needs use and analyze above-mentionedly when logging in log database and Operation Log database canned data, the keeper of cloud computation treating system of the present invention can check and download the described recorded information that logs in log database and described Operation Log database.In general, so that the fail safe of cloud computation treating system, just the system manager is generally only arranged and can check and download above-mentioned recorded information through the personnel that authorize.
In sum, because cloud computation treating system of the present invention has adopted corresponding security architecture, can guarantee effectively that the user uses the fail safe of information in this cloud computation treating system process, also can effectively guarantee the fail safe of cloud computation treating system itself, have positive meaning for applying of cloud computation treating system.

Claims (5)

1. cloud computation treating system with security architecture, it comprises client modules, database module, cloud computing server, data analysis module, wherein, described client modules is used for sending request to described data analysis module, described database module is used for the storage data, described cloud computing server is used for computation rule being set and according to different situations, specific computation rule being offered data analysis module, described data analysis module be used for to receive request that client modules sends and according to the computation rule of the parameter acquiring cloud computing server of described request, and carry out calculation process with this computation rule in conjunction with the data in database, result is back to client modules, it is characterized in that:
Described cloud computation treating system also comprises client encrypt/deciphering module and cloud security module, wherein, described client encrypt/deciphering module sends to described data analysis module after being used for the request that the user inputs by client modules is encrypted, and the result that is used for data analysis module is returned is decrypted; Described cloud security module be used for to the user carry out authentication, result that the request of user's input is decrypted, described data analysis module is returned is encrypted and user's operating process is monitored etc.
2. cloud computation treating system according to claim 1, wherein, described client encrypt/deciphering module is implemented as by chip hardware, symmetric cryptographic algorithm and combination key generating algorithm in conjunction with the smart card that forms, in the chip of smart card, adopt symmetric cryptographic algorithm to set up the client encrypt system, and write symmetric cryptographic algorithm, combination key generating algorithm, encrypt/decrypt agreement.
3. cloud computation treating system according to claim 1, wherein, described cloud security module comprises the authenticating user identification unit, data decryption unit, DEU data encryption unit and operation supervise and control unit, described authenticating user identification unit is used for according to the rules authentication protocol to authenticating with user identity, cleartext information after described data decryption unit is used for the request that client modules sends is decrypted and will deciphers according to corresponding decipherment algorithm is transferred to described data analysis module, described DEU data encryption unit is used for the result of described data analysis module is encrypted and ciphertext is returned to described client modules, described operation supervise and control unit is used for to the user all operations on cloud computing platform and monitors.
4. cloud computation treating system according to claim 3, wherein, described operation supervise and control unit is provided with login log database and Operation Log database, recording user login cloud computing platform and operating for information about on cloud computing platform.
5. cloud computing system according to claim 4, wherein, the keeper of described cloud computation treating system can check and download the described recorded information that logs in log database and described Operation Log database.
CN2012105268667A 2012-12-10 2012-12-10 Cloud computing processing system with security architecture Pending CN103108028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105268667A CN103108028A (en) 2012-12-10 2012-12-10 Cloud computing processing system with security architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105268667A CN103108028A (en) 2012-12-10 2012-12-10 Cloud computing processing system with security architecture

Publications (1)

Publication Number Publication Date
CN103108028A true CN103108028A (en) 2013-05-15

Family

ID=48315595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105268667A Pending CN103108028A (en) 2012-12-10 2012-12-10 Cloud computing processing system with security architecture

Country Status (1)

Country Link
CN (1) CN103108028A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450636A (en) * 2015-11-06 2016-03-30 长春智信创联科技有限公司 Cloud computing management system and management method of cloud computing management system
CN105512567A (en) * 2015-12-07 2016-04-20 中国电力科学研究院 Easily-extensible rule customization data monitoring method
CN105590064A (en) * 2015-12-14 2016-05-18 中国建设银行股份有限公司 File processing method, file processing device and file server
CN105761081A (en) * 2016-02-18 2016-07-13 流量海科技成都有限公司 Data transaction method and data transaction apparatus
CN105872013A (en) * 2016-03-08 2016-08-17 周口师范学院 Cloud computing system
CN106104549A (en) * 2014-03-07 2016-11-09 诺基亚技术有限公司 Method and apparatus for the data of verification process
CN106960035A (en) * 2017-03-22 2017-07-18 东莞职业技术学院 A kind of enterprise's cloud computing is served by system
CN108183966A (en) * 2018-01-15 2018-06-19 江苏冠达通电子科技有限公司 A kind of cloud stocking system
CN110275498A (en) * 2019-06-28 2019-09-24 泉州信息工程学院 A kind of intelligence manufacture method and system and equipment based on internet and deep learning
CN114117493A (en) * 2021-11-30 2022-03-01 谢同玲 Computer safety protection system based on cloud calculates

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143230A (en) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 Method for mini-station to authenticate and log in virtual machine in cloud system and login system
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143230A (en) * 2011-04-01 2011-08-03 广州杰赛科技股份有限公司 Method for mini-station to authenticate and log in virtual machine in cloud system and login system
CN102291418A (en) * 2011-09-23 2011-12-21 胡祥义 Method for realizing cloud computing security architecture

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
康瑛石;吴吉义;王海宁: "基于云计算的一体化煤矿安全监管信息系统", 《煤炭学报》, vol. 36, no. 5, 15 May 2011 (2011-05-15) *
段春乐: "云计算的安全性及数据安全传输的研究", 《中国优秀硕士学位论文全文数据库》, 15 May 2012 (2012-05-15) *
洑涵妤: "基于云计算的安全数据存储系统的设计与实现", 《煤炭技术》, vol. 29, no. 12, 10 December 2010 (2010-12-10), pages 1 *
鲍伟民: "基于云计算的安全审计系统研究与设计", 《软件产业与工程》, 10 November 2012 (2012-11-10) *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106104549A (en) * 2014-03-07 2016-11-09 诺基亚技术有限公司 Method and apparatus for the data of verification process
US10693657B2 (en) 2014-03-07 2020-06-23 Nokia Technologies Oy Method and apparatus for verifying processed data
CN105450636A (en) * 2015-11-06 2016-03-30 长春智信创联科技有限公司 Cloud computing management system and management method of cloud computing management system
CN105450636B (en) * 2015-11-06 2019-02-01 长春智信创联科技有限公司 A kind of cloud computing management system
CN105512567A (en) * 2015-12-07 2016-04-20 中国电力科学研究院 Easily-extensible rule customization data monitoring method
CN105512567B (en) * 2015-12-07 2020-08-28 中国电力科学研究院 Easily-extensible rule customized data monitoring method
CN105590064B (en) * 2015-12-14 2018-10-19 中国建设银行股份有限公司 Document handling method, document handling apparatus and file server
CN105590064A (en) * 2015-12-14 2016-05-18 中国建设银行股份有限公司 File processing method, file processing device and file server
CN105761081A (en) * 2016-02-18 2016-07-13 流量海科技成都有限公司 Data transaction method and data transaction apparatus
CN105761081B (en) * 2016-02-18 2019-07-05 流量海科技成都有限公司 Data trade method and data trade device
CN105872013A (en) * 2016-03-08 2016-08-17 周口师范学院 Cloud computing system
CN106960035A (en) * 2017-03-22 2017-07-18 东莞职业技术学院 A kind of enterprise's cloud computing is served by system
CN108183966A (en) * 2018-01-15 2018-06-19 江苏冠达通电子科技有限公司 A kind of cloud stocking system
CN110275498A (en) * 2019-06-28 2019-09-24 泉州信息工程学院 A kind of intelligence manufacture method and system and equipment based on internet and deep learning
CN114117493A (en) * 2021-11-30 2022-03-01 谢同玲 Computer safety protection system based on cloud calculates

Similar Documents

Publication Publication Date Title
CN103108028A (en) Cloud computing processing system with security architecture
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN103001976A (en) Safe network information transmission method
CN102986161B (en) For carrying out the method and system of cryptoguard to application
CN111770088A (en) Data authentication method, device, electronic equipment and computer readable storage medium
CN102075327A (en) Method, device and system for unlocking electronic key
CN113242238B (en) Secure communication method, device and system
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode
WO2012176506A1 (en) Single sign-on system, single sign-on method, and authentication server linking program
CN112989320B (en) User state management system and method for password equipment
US10417448B2 (en) Management of sensitive information access and use
CN106713372B (en) A kind of method of controlling security and safety control system based on permission control
CN112865965A (en) Train service data processing method and system based on quantum key
CN102629928B (en) Implementation method for safety link of internet lottery ticket system based on public key
CN117081815A (en) Method, device, computer equipment and storage medium for data security transmission
CN111368271A (en) Method and system for realizing password management based on multiple encryption
CN106453259A (en) Internet finance safety link realization method based on block chaining encryption technology
CN104184580A (en) Network operating method and network operating system
CN116244750A (en) Secret-related information maintenance method, device, equipment and storage medium
CN111935164B (en) Https interface request method
US11102187B2 (en) Systems and methods for managing workflow transactions including protected personal data in regulated computing environments
CN113472770A (en) Safe outsourcing computing architecture suitable for big data of power grid
CN104618105A (en) Online trading system based on verification and data encryption
CN110278127A (en) A kind of Agent dispositions method and system based on secure transfer protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515