CN104202421A - Cloud computing based password service system - Google Patents

Cloud computing based password service system Download PDF

Info

Publication number
CN104202421A
CN104202421A CN201410480227.0A CN201410480227A CN104202421A CN 104202421 A CN104202421 A CN 104202421A CN 201410480227 A CN201410480227 A CN 201410480227A CN 104202421 A CN104202421 A CN 104202421A
Authority
CN
China
Prior art keywords
module
cryptographic
interface
layer
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410480227.0A
Other languages
Chinese (zh)
Inventor
苏振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201410480227.0A priority Critical patent/CN104202421A/en
Publication of CN104202421A publication Critical patent/CN104202421A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a cloud computing based password service system comprising a physical layer, a computing resource layer, a service layer and an application layer. The physical layer is used for describing its hardware architecture and functions of its parts. The computing resource layer is used for describing its modules and functions of the modules. The service layer is used for describing password operation software and a password computing application interface. The application layer is used for describing various password services provided. Compared with the prior art, the system has the advantages that the techniques such as the cryptographic techniques, the Hadoop technology and the parallel computing technology are adopted, password services such as file encryption, data encryption, key management and identity authentication are provided, safeguarding efficiency can be significantly improved, data processing speed, encryption speed and decryption speed are higher, and data security is effectively protected for cloud computing.

Description

A kind of cryptographic service system based on cloud computing
Technical field
The present invention relates to cloud computing technology field, specifically a kind of practical, cryptographic service system based on cloud computing.
Background technology
Cloud computing is increase, use and the delivery mode of the related service based on the Internet, it is a kind of pattern of paying by use amount, this pattern provides access to netwoks available, easily, as required, and (resource comprises network, server to enter configurable computing resource sharing pond, storage, application software, service), these resources can be supplied by Quick, only need to drop into management work seldom, or carry out seldom mutual with service supplier.
Due to the dependence of the data under cloud computing environment to network and server, problem of data safety is more outstanding than net environment.User exists and queries the fail safe of cloud computing and privacy confidentiality, and what cause that data cannot safety transfers in cloud computing environment.Based on this, a kind of cryptographic service system based on cloud computing is now provided, this system is used after cryptographic technique in cloud computing, the encryption of data is no longer only relied on to the hardware devices such as encrypted card in local PC, key, but rely on huge network service, carry out in real time data acquisition, analysis and processing.Greatly improved the operating efficiency of security protection, made data processing, encryption and decryption quicker.
Summary of the invention
Technical assignment of the present invention is for above weak point, and a kind of practical, cryptographic service system based on cloud computing is provided.
A cryptographic service system based on cloud computing, this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: comprise some servers, equal deployment operation system, memory module, crypto module, the network equipment in each server; Server in this physical layer is the Infrastructure platform of cloud computing, for upper strata provides crypto-operation, data storage resource, disposes or move the software of oneself for user, and the software here comprises operating system or application;
Computational resource layer: computational resource layer comprises cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module, these module compositions a computing pool;
Service layer: comprise cryptographic calculations application interface and crypto-operation software; The cryptographic calculations application interface of described service layer comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface; Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed;
Application layer: comprise various cipher application software, file encryption, data encryption, key management, authentication, data backup cryptographic service are provided; The cryptographic calculations application interface of each software corresponding with service layer.
Described computational resource layer is used many tenants model, according to user, needs, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.
In described physical layer, the operating system of installing in server is Windows, Unix or linux system;
Cryptographic hardware module is the high speed password card with PCI-E interface, is connected to the PCI-E slot of server by PCI-E interface, realizes partial password algorithm, and this high speed password card blocks concurrent working more;
Memory module is the hard disk of SATA interface, for storing user's identity information, key, password, encrypted message;
The network equipment comprises router and switch, and the infrastructure component of physical layer and the integral frame of cloud computing link together by network, provide service by network to user simultaneously.
Partial password algorithm in described cryptographic hardware module is symmetry algorithm SM1, elliptic curve cryptography SM2 or physics real random number generator.
In described computational resource layer, cryptographic algorithm module provides following cryptographic algorithm:
SM1 symmetric cryptographic algorithm module: by integrated SM1 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM2 public key algorithm module: by integrated SM2 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: by integrated physics noise source module, the server of above-mentioned PCI-E cipher card provides; True random number is as the key in crypto-operation process, intermediate operations vector parameter;
Above-mentioned any one cryptographic algorithm, is provided by one or more server, or concurrent execution on a station server, and the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface concurrent call various cryptographic algorithms;
Key management module is used for user's key information distribute and manage, and backs up; Only have the user by upper strata authentication just can call key management module;
Data backup module is for backing up, and recover data timely user's key, personal information data;
Monitoring module is responsible for the important information of supervisory user, and key data is limited in server and is used.
In described service layer, the detailed process that crypto-operation software adopts the realization of Hadoop distributed computing architecture to process large-scale distributed data set is:
First, build Hadoop cluster, Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster; User submits to the calculation task of data encrypting and deciphering to Hadoop cluster from client independently;
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data; Large data sets is stored as Single document in HDFS, is segmented physically and is stored in many back end parallel processing on these nodes.
Application layer user uses client device, the cipher application that visits service layer by customer interface, application software meets the demand of oneself, the cipher application here comprises file encryption, data encryption, key management, authentication, data backup, and user does not manage or control the cloud infrastructure of physical layer; The key that user inserts USB interface in local side computer carries out the authentication of identity; User configures computing capability when needed automatically, and the computing capability here comprises response time, the network storage of server.
A kind of cryptographic service system based on cloud computing of the present invention, has the following advantages:
A kind of cryptographic service system based on cloud computing of this invention, take cloud computing as Infrastructure platform, adopt cryptographic technique, Hadoop technology, parallel computing etc., the cryptographic service such as file encryption, data encryption, key management and authentication are provided, can significantly improve the operating efficiency of security protection, make data processing, encryption and decryption quicker, effectively protect the data security of cloud computing; Practical, applied widely, fail safe is good, is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is structural representation of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the invention will be further described.
The invention provides a kind of cryptographic service system based on cloud computing; on cloud computing Infrastructure platform, realize the cryptographic service such as file encryption, data encryption, key management and authentication; efficient data protection measure is provided, effectively protects the data security of cloud computing.Based on above-mentioned thinking, as shown in Figure 1, this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: the function of having described hardware structure and the each several part of physical layer.
Computational resource layer: described the modules and the function that form computational resource layer.
Service layer: described crypto-operation software and cryptographic calculations application interface.
Application layer: the various cryptographic service that provide have been provided.
Further, above-mentioned four structure sheaf concrete structures are:
Physical layer: physical layer comprises a plurality of servers, has disposed the resources such as operating system, memory module, crypto module, the network equipment in each server.Server is the Infrastructure platform of cloud computing, and the computational resources such as crypto-operation, data storage are provided for upper strata, and the software of disposing or move oneself for user, comprises operating system or application.
Computational resource layer: computational resource layer is used many tenants model, needs according to user, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.Computational resource layer comprises each cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module etc.These module compositions a computing pool.
Service layer: comprise cryptographic calculations application interface and crypto-operation software.Cryptographic calculations application interface comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface.Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed.
Application layer: comprise various cipher application software, the cryptographic service such as file encryption, data encryption, key management, authentication, data backup are provided.The cryptographic calculations application interface of each software corresponding with service layer.
Below in conjunction with 1 pair of every one deck of the present invention of accompanying drawing, do further and describe in detail.
1, physical layer.
Operating system: comprise the main flow system platforms such as Windows, Unix, Linux.
Cryptographic hardware module: cryptographic hardware module is the high speed password card of PCI-E interface, by PCI-E interface, be connected to the PCI-E slot of server, effect is to realize partial password algorithm, as symmetry algorithm SM1, elliptic curve cryptography SM2, physics real random number generator etc.In order to improve the performance of crypto-operation, adopt the parallel working method of many cards.
Memory module: memory module is the hard disk of SATA interface, for storing user's the important information such as identity information, key, password, password.
The network equipment: the network equipment comprises router and switch, the infrastructure component of physical layer and the integral frame of cloud computing are linked together by network, provide service by network to user simultaneously.User can be by different terminal equipments, and the application by standard realizes the access to network.
2, computational resource layer:
Cryptographic algorithm module: following cryptographic algorithm is provided.
SM1 symmetric cryptographic algorithm module: the server by integrated SM1 hardware algorithm module (PCI-E cipher card) provides;
SM2 public key algorithm module: the server by integrated SM2 hardware algorithm module (PCI-E cipher card) provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: the server by integrated physics noise source module (PCI-E cipher card) provides; True random number can be used as the parameters such as key in crypto-operation process, intermediate operations vector.
For above-mentioned a kind of specific cryptographic algorithm, can be provided by one or more server, also can concurrent execution on a station server, the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface etc. can walk abreast calls various cryptographic algorithms.
Key management module is used for user's the key messages such as key distribute and manage, and backs up.Only have the user by upper strata authentication just can call key management module.
Data backup module, for the significant datas such as user's key, personal information are backed up, prevents user misoperation, mistake deletion.And can recover timely data.
Monitoring module is responsible for the important information of supervisory user and is not revealed, and wherein the important data such as key only limit to use in server, can not export to user side, can be encrypted use to key data if desired again.
3, service layer is for the different cipher application software of application layer, and crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed.
First, built Hadoop cluster.Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster.User submits to the calculation tasks such as data encrypting and deciphering to Hadoop cluster from client independently.
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data.Large data sets is in HDFS(Hadoop distributed file system) in be stored as Single document, be segmented physically and be stored in many back end, and can parallel processing on these nodes.
Parallel computation service interface is used multiple computational resource to solve various cryptographic algorithms simultaneously.By carry out the same cryptographic algorithm of Cooperative Solving with a plurality of processors, can significantly promote crypto-operation speed and disposal ability.This parallel computation service interface both can call the encryption and decryption that the server that contains a plurality of processors completes data, also can call some station servers of interconnection, completed the encryption and decryption of data by parallel computing trunking.
4, application layer: use various client devices application layer user, the cipher application that visits service layer by customer interface, application software etc. meets the demand of oneself, comprise file encryption, data encryption, key management, authentication, data backup etc., user does not manage or controls the cloud infrastructure of physical layer.A large amount of users can be concurrent, parallel execution Password Operations.The key that wherein user inserts USB interface in local side PC carries out the authentication of identity.User can configure computing capability when needed automatically, such as response time of server, network storage etc., and without mutual with service supplier's attendant.
Above-mentioned embodiment is only concrete case of the present invention; scope of patent protection of the present invention includes but not limited to above-mentioned embodiment; suitable variation or replacement that person of an ordinary skill in the technical field claims of any a kind of cryptographic service system based on cloud computing according to the invention and any does it, all should fall into scope of patent protection of the present invention.

Claims (7)

1. the cryptographic service system based on cloud computing, is characterized in that: this cloud computing cryptographic service system comprises physical layer, computational resource layer, service layer and application layer, wherein:
Physical layer: comprise some servers, equal deployment operation system, memory module, crypto module, the network equipment in each server; Server in this physical layer is the Infrastructure platform of cloud computing, for upper strata provides crypto-operation, data storage resource, disposes or move the software of oneself for user, and the software here comprises operating system or application;
Computational resource layer: computational resource layer comprises cryptographic algorithm module, key management module, data backup module, scheduling of resource module and monitoring module, these module compositions a computing pool;
Service layer: comprise cryptographic calculations application interface and crypto-operation software; The cryptographic calculations application interface of described service layer comprises file encryption-decryption interface, data encrypting and deciphering interface, cipher key management interface, authentication interface and data backup interface; Crypto-operation software adopts Hadoop distributed computing architecture to realize large-scale distributed data set is processed;
Application layer: comprise various cipher application software, file encryption, data encryption, key management, authentication, data backup cryptographic service are provided; The cryptographic calculations application interface of each software corresponding with service layer.
2. a kind of cryptographic service system based on cloud computing according to claim 1, is characterized in that: described computational resource layer is used many tenants model, according to user, needs, and different physics and virtual resource are dynamically distributed to a plurality of users' uses.
3. a kind of cryptographic service system based on cloud computing according to claim 1 and 2, is characterized in that: in described physical layer, the operating system of installing in server is Windows, Unix or linux system;
Cryptographic hardware module is the high speed password card with PCI-E interface, is connected to the PCI-E slot of server by PCI-E interface, realizes partial password algorithm, and this high speed password card blocks concurrent working more;
Memory module is the hard disk of SATA interface, for storing user's identity information, key, password, encrypted message;
The network equipment comprises router and switch, and the infrastructure component of physical layer and the integral frame of cloud computing link together by network, provide service by network to user simultaneously.
4. a kind of cryptographic service system based on cloud computing according to claim 3, is characterized in that: the partial password algorithm in described cryptographic hardware module is symmetry algorithm SM1, elliptic curve cryptography SM2 or physics real random number generator.
5. a kind of cryptographic service system based on cloud computing according to claim 4, is characterized in that: in described computational resource layer, cryptographic algorithm module provides following cryptographic algorithm:
SM1 symmetric cryptographic algorithm module: by integrated SM1 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM2 public key algorithm module: by integrated SM2 hardware algorithm module, the server of above-mentioned PCI-E cipher card provides;
SM3 cryptographic Hash algoritic module: adopt software programming to realize on server;
SM4 symmetric cryptographic algorithm module: adopt software programming to realize on server;
Real random number generator module: by integrated physics noise source module, the server of above-mentioned PCI-E cipher card provides; True random number is as the key in crypto-operation process, intermediate operations vector parameter;
Above-mentioned any one cryptographic algorithm, is provided by one or more server, or concurrent execution on a station server, and the cryptographic calculations application interface of service layer, parallel computation service interface, Distributed Calculation interface concurrent call various cryptographic algorithms;
Key management module is used for user's key information distribute and manage, and backs up; Only have the user by upper strata authentication just can call key management module;
Data backup module is for backing up, and recover data timely user's key, personal information data;
Monitoring module is responsible for the important information of supervisory user, and key data is limited in server and is used.
6. a kind of cryptographic service system based on cloud computing according to claim 1, is characterized in that: in described service layer, crypto-operation software adopts Hadoop distributed computing architecture to realize the detailed process that large-scale distributed data set is processed to be:
First, build Hadoop cluster, Hadoop operates on the interconnected server cluster of physical layer network, according to the framework of Hadoop, writes and move Distributed Application, and data Storage and Processing is all carried out on this cluster; User submits to the calculation task of data encrypting and deciphering to Hadoop cluster from client independently;
Secondly, set up after Hadoop cluster, configured HDFS file system, under Hadoop framework, call parallel computation interface and Distributed Calculation interface carries out parallel computation and distributed treatment to large data; Large data sets is stored as Single document in HDFS, is segmented physically and is stored in many back end parallel processing on these nodes.
7. a kind of cryptographic service system based on cloud computing according to claim 1, it is characterized in that: application layer user uses client device, the cipher application that visits service layer by customer interface, application software meets the demand of oneself, the cipher application here comprises file encryption, data encryption, key management, authentication, data backup, and user does not manage or control the cloud infrastructure of physical layer; The key that user inserts USB interface in local side computer carries out the authentication of identity; User configures computing capability when needed automatically, and the computing capability here comprises response time, the network storage of server.
CN201410480227.0A 2014-09-19 2014-09-19 Cloud computing based password service system Pending CN104202421A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410480227.0A CN104202421A (en) 2014-09-19 2014-09-19 Cloud computing based password service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410480227.0A CN104202421A (en) 2014-09-19 2014-09-19 Cloud computing based password service system

Publications (1)

Publication Number Publication Date
CN104202421A true CN104202421A (en) 2014-12-10

Family

ID=52087646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410480227.0A Pending CN104202421A (en) 2014-09-19 2014-09-19 Cloud computing based password service system

Country Status (1)

Country Link
CN (1) CN104202421A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519140A (en) * 2015-01-08 2015-04-15 浪潮(北京)电子信息产业有限公司 Server system for distributed parallel computing and management method thereof
CN105306576A (en) * 2015-11-10 2016-02-03 中国电子科技集团公司第三十研究所 Scheduling method and system for password arithmetic units
CN106101096A (en) * 2016-06-10 2016-11-09 北京数盾信息科技有限公司 A kind of high-speed encryption module separated based on interface bus
CN108063813A (en) * 2017-12-15 2018-05-22 华中农业大学 The method and system of cryptographic service network parallelization under a kind of cluster environment
WO2018119990A1 (en) * 2016-12-30 2018-07-05 刘清华 Cloud data platform key setting method
CN108418856A (en) * 2018-01-22 2018-08-17 济南浪潮高新科技投资发展有限公司 A kind of government affairs cloud cipher application platform construction method based on cloud computing technology
CN108574573A (en) * 2017-12-14 2018-09-25 成都卫士通信息产业股份有限公司 Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN
CN109688116A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability
CN109687956A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of unification provides key management and key computational service system to client
CN109729170A (en) * 2019-01-09 2019-05-07 武汉巨正环保科技有限公司 A kind of cloud computing data backup of new algorithm and restoring method
CN109981267A (en) * 2019-03-22 2019-07-05 西安电子科技大学 Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method
CN110086750A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of encryption system based on optical fiber data link road network and satellite communication network
CN110321695A (en) * 2019-07-11 2019-10-11 成都卫士通信息产业股份有限公司 Big data system password method of servicing, device
CN110572258A (en) * 2019-07-24 2019-12-13 中国科学院数据与通信保护研究教育中心 Cloud password computing platform and computing service method
CN111488602A (en) * 2020-04-16 2020-08-04 支付宝(杭州)信息技术有限公司 Data object privacy protection method and device and electronic equipment
CN111541664A (en) * 2020-04-14 2020-08-14 北京数盾信息科技有限公司 Unified password service management platform
CN111859396A (en) * 2020-07-21 2020-10-30 中国人民解放军国防科技大学 Soft and hard cooperation multi-layer password service method and system supporting universal/trusted double computing system
CN112134872A (en) * 2020-09-16 2020-12-25 江苏省未来网络创新研究院 Network system with multi-application-layer cloud computing function
CN112905993A (en) * 2021-03-22 2021-06-04 华东师范大学 Large-scale network-oriented distributed password equipment management system and construction method
CN114189330A (en) * 2021-11-25 2022-03-15 成都国泰网信科技有限公司 Password service platform based on cloud architecture
CN114884661A (en) * 2022-07-13 2022-08-09 麒麟软件有限公司 Hybrid security service password system and implementation method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946440A (en) * 2012-12-04 2013-02-27 乐视致新电子科技(天津)有限公司 Automatic cloud synchronization and recovery system based on cloud storage technology
US8719590B1 (en) * 2012-06-18 2014-05-06 Emc Corporation Secure processing in multi-tenant cloud infrastructure
CN103905557A (en) * 2014-04-09 2014-07-02 曙光云计算技术有限公司 Data storage method and device used for cloud environment and downloading method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8719590B1 (en) * 2012-06-18 2014-05-06 Emc Corporation Secure processing in multi-tenant cloud infrastructure
CN102946440A (en) * 2012-12-04 2013-02-27 乐视致新电子科技(天津)有限公司 Automatic cloud synchronization and recovery system based on cloud storage technology
CN103905557A (en) * 2014-04-09 2014-07-02 曙光云计算技术有限公司 Data storage method and device used for cloud environment and downloading method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘晓毅: "云计算中的数据全生命周期防护技术", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *
苏振宇: "基于FPGA和DSP的PCI_E高速密码卡设计与实现", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519140A (en) * 2015-01-08 2015-04-15 浪潮(北京)电子信息产业有限公司 Server system for distributed parallel computing and management method thereof
CN105306576A (en) * 2015-11-10 2016-02-03 中国电子科技集团公司第三十研究所 Scheduling method and system for password arithmetic units
CN106101096A (en) * 2016-06-10 2016-11-09 北京数盾信息科技有限公司 A kind of high-speed encryption module separated based on interface bus
CN106101096B (en) * 2016-06-10 2022-06-28 北京数盾信息科技有限公司 High-speed encryption module based on interface bus separation
WO2018119990A1 (en) * 2016-12-30 2018-07-05 刘清华 Cloud data platform key setting method
CN108574573A (en) * 2017-12-14 2018-09-25 成都卫士通信息产业股份有限公司 Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN
CN108574573B (en) * 2017-12-14 2021-07-23 成都卫士通信息产业股份有限公司 Method for providing password service for virtual VPN, password device and virtual VPN service system
CN108063813A (en) * 2017-12-15 2018-05-22 华中农业大学 The method and system of cryptographic service network parallelization under a kind of cluster environment
CN108063813B (en) * 2017-12-15 2020-09-08 武汉东湖大数据交易中心股份有限公司 Method and system for parallelizing password service network in cluster environment
CN108418856A (en) * 2018-01-22 2018-08-17 济南浪潮高新科技投资发展有限公司 A kind of government affairs cloud cipher application platform construction method based on cloud computing technology
CN110086750A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of encryption system based on optical fiber data link road network and satellite communication network
CN109688116A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability
CN109687956A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of unification provides key management and key computational service system to client
CN109729170A (en) * 2019-01-09 2019-05-07 武汉巨正环保科技有限公司 A kind of cloud computing data backup of new algorithm and restoring method
CN109981267B (en) * 2019-03-22 2021-06-08 西安电子科技大学 Large-scale user multi-key scene cloud encryption database system and storage query method
CN109981267A (en) * 2019-03-22 2019-07-05 西安电子科技大学 Large-scale consumer multi-key cipher scene cloud encrypting database system and storage querying method
CN110321695A (en) * 2019-07-11 2019-10-11 成都卫士通信息产业股份有限公司 Big data system password method of servicing, device
CN110572258A (en) * 2019-07-24 2019-12-13 中国科学院数据与通信保护研究教育中心 Cloud password computing platform and computing service method
CN111541664A (en) * 2020-04-14 2020-08-14 北京数盾信息科技有限公司 Unified password service management platform
CN111488602A (en) * 2020-04-16 2020-08-04 支付宝(杭州)信息技术有限公司 Data object privacy protection method and device and electronic equipment
CN111859396A (en) * 2020-07-21 2020-10-30 中国人民解放军国防科技大学 Soft and hard cooperation multi-layer password service method and system supporting universal/trusted double computing system
CN111859396B (en) * 2020-07-21 2023-10-03 中国人民解放军国防科技大学 Soft-hard collaborative multi-level password service method and system supporting general/trusted double computing system
CN112134872A (en) * 2020-09-16 2020-12-25 江苏省未来网络创新研究院 Network system with multi-application-layer cloud computing function
CN112134872B (en) * 2020-09-16 2022-07-26 江苏省未来网络创新研究院 Network system with multi-application-layer cloud computing function
CN112905993A (en) * 2021-03-22 2021-06-04 华东师范大学 Large-scale network-oriented distributed password equipment management system and construction method
CN114189330A (en) * 2021-11-25 2022-03-15 成都国泰网信科技有限公司 Password service platform based on cloud architecture
CN114884661A (en) * 2022-07-13 2022-08-09 麒麟软件有限公司 Hybrid security service password system and implementation method thereof
CN114884661B (en) * 2022-07-13 2022-10-14 麒麟软件有限公司 Hybrid security service cryptographic system

Similar Documents

Publication Publication Date Title
CN104202421A (en) Cloud computing based password service system
CN105027494B (en) The data processing of trust in public cloud
CN109361517A (en) A kind of virtualization cloud cipher machine system and its implementation based on cloud computing
EP3158497B1 (en) Methods and devices for key management in an as-a-service context
CN103534976A (en) Data security protection method, server, host, and system
CN104520873A (en) Systems and methods for securing and restoring virtual machines
CN109710386B (en) Overall dynamic migration method for virtual trusted root instance of virtual machine
Chalse et al. A new technique of data integrity for analysis of the cloud computing security
Kaur et al. Analyzing data security for cloud computing using cryptographic algorithms
CN103107994A (en) Vitualization environment data security partition method and system
Tajadod et al. Microsoft and Amazon: A comparison of approaches to cloud security
Soofi et al. Security issues in SaaS delivery model of cloud computing
CN104980269A (en) Secret key sharing method, device and system
Maher et al. DropStore: A secure backup system using multi-cloud and fog computing
Gupta et al. Data storage security in cloud computing using container clustering
Li Cloud computing: introduction, application and security from industry perspectives
Lei et al. Research and design of cryptography cloud framework
Annane et al. SecNetworkCloudSim: An extensible simulation tool for secure distributed mobile applications
CN105554127B (en) The private clound back mechanism of the safe cryptographic means of multi-layer data
US11468356B2 (en) Matrix-based quantum-resilient server-cluster
Amalarathinam et al. Survey on data security in multi-cloud environment
Saxena et al. Protecting data storage on cloud to enhance security level and processing of the data by using Hadoop
Dinesh Cloud Computing and its Variable Techniques in Obtaining Data Security Parameter
Mishra et al. Improved cloud security approach with threshold cryptography
US10997521B1 (en) Quantum-resilient computer cluster

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141210