CN104361284A - Third-party intrusion monitoring method for cloud storage data packet - Google Patents
Third-party intrusion monitoring method for cloud storage data packet Download PDFInfo
- Publication number
- CN104361284A CN104361284A CN201410576221.3A CN201410576221A CN104361284A CN 104361284 A CN104361284 A CN 104361284A CN 201410576221 A CN201410576221 A CN 201410576221A CN 104361284 A CN104361284 A CN 104361284A
- Authority
- CN
- China
- Prior art keywords
- cloud
- monitoring
- file
- party
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 106
- 238000000034 method Methods 0.000 title abstract description 8
- 238000013475 authorization Methods 0.000 claims abstract description 49
- 238000005516 engineering process Methods 0.000 claims abstract description 25
- 238000001514 detection method Methods 0.000 claims description 34
- 230000009545 invasion Effects 0.000 claims description 16
- 230000006870 function Effects 0.000 claims description 10
- 230000010354 integration Effects 0.000 claims description 8
- 241001269238 Data Species 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims description 3
- 230000002155 anti-virotic effect Effects 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 239000000203 mixture Substances 0.000 claims description 2
- 230000000737 periodic effect Effects 0.000 claims description 2
- 239000000523 sample Substances 0.000 claims description 2
- 238000005336 cracking Methods 0.000 description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410576221.3A CN104361284B (en) | 2014-10-26 | 2014-10-26 | To third party's intrusion detection method of cloud storage packet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410576221.3A CN104361284B (en) | 2014-10-26 | 2014-10-26 | To third party's intrusion detection method of cloud storage packet |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104361284A true CN104361284A (en) | 2015-02-18 |
CN104361284B CN104361284B (en) | 2018-02-13 |
Family
ID=52528543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410576221.3A Active CN104361284B (en) | 2014-10-26 | 2014-10-26 | To third party's intrusion detection method of cloud storage packet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104361284B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106982217A (en) * | 2017-04-13 | 2017-07-25 | 西安莫贝克半导体科技有限公司 | A kind of network security management mode of decentralization |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413143A (en) * | 2011-12-01 | 2012-04-11 | 江苏华丽网络工程有限公司 | Security audit system and method based on cloud computing |
US20130254885A1 (en) * | 2012-03-14 | 2013-09-26 | Matthew G. DEVOST | System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity |
CN103700059A (en) * | 2013-12-19 | 2014-04-02 | 南京信息工程大学 | Cloud storage image data ownership verifying method based on multifunction digital watermark |
CN103748551A (en) * | 2011-08-17 | 2014-04-23 | 惠普发展公司,有限责任合伙企业 | Tracing data block operations |
CN104065651A (en) * | 2014-06-09 | 2014-09-24 | 上海交通大学 | Information flow dependability guarantee mechanism for cloud computation |
CN104104672A (en) * | 2014-06-30 | 2014-10-15 | 重庆智韬信息技术中心 | Method for establishing dynamic authorization code based on identity authentication |
-
2014
- 2014-10-26 CN CN201410576221.3A patent/CN104361284B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103748551A (en) * | 2011-08-17 | 2014-04-23 | 惠普发展公司,有限责任合伙企业 | Tracing data block operations |
CN102413143A (en) * | 2011-12-01 | 2012-04-11 | 江苏华丽网络工程有限公司 | Security audit system and method based on cloud computing |
US20130254885A1 (en) * | 2012-03-14 | 2013-09-26 | Matthew G. DEVOST | System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity |
CN103700059A (en) * | 2013-12-19 | 2014-04-02 | 南京信息工程大学 | Cloud storage image data ownership verifying method based on multifunction digital watermark |
CN104065651A (en) * | 2014-06-09 | 2014-09-24 | 上海交通大学 | Information flow dependability guarantee mechanism for cloud computation |
CN104104672A (en) * | 2014-06-30 | 2014-10-15 | 重庆智韬信息技术中心 | Method for establishing dynamic authorization code based on identity authentication |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106982217A (en) * | 2017-04-13 | 2017-07-25 | 西安莫贝克半导体科技有限公司 | A kind of network security management mode of decentralization |
Also Published As
Publication number | Publication date |
---|---|
CN104361284B (en) | 2018-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070368B2 (en) | System, method, and program for transmitting and receiving any type of secure digital data | |
Alqassem et al. | A taxonomy of security and privacy requirements for the Internet of Things (IoT) | |
US8984611B2 (en) | System, apparatus and method for securing electronic data independent of their location | |
KR101769282B1 (en) | Data security service | |
US9317708B2 (en) | Hardware trust anchors in SP-enabled processors | |
Abi Sen et al. | A comparative study between security and privacy | |
GB2462442A (en) | A remote server centrally controls access to data stored in a data container in an encrypted form | |
CN104333545A (en) | Method for encrypting cloud storage file data | |
Teufl et al. | Android encryption systems | |
CN109936555A (en) | A kind of date storage method based on cloud platform, apparatus and system | |
US11677546B2 (en) | Methods and systems of securely transferring data | |
CN104333544A (en) | Encryption method for data file based on mobile terminal | |
Flores et al. | Bring your own disclosure: analysing BYOD threats to corporate information | |
CN109818923A (en) | A kind of attribute base cloud service access control method based on attribute ciphertext re-encryption | |
Kofahi et al. | Identifying the top threats in cloud computing and its suggested solutions: a survey | |
CN104363093A (en) | Method for encrypting file data by dynamic authorization code | |
CN103577763A (en) | Mobile terminal device with data protection function and data protection method | |
CN104361284A (en) | Third-party intrusion monitoring method for cloud storage data packet | |
Khan et al. | A comparative study of trends in security in cloud computing | |
Tsai et al. | A group file encryption method using dynamic system environment key | |
Maurya et al. | Blockchain-powered solution to safeguard IoT devices against attacks | |
CN112769784A (en) | Text processing method and device, computer readable storage medium and processor | |
Mishra et al. | Design of a cloud-based security mechanism for Industry 4.0 communication | |
Sanaullah et al. | Information Security Challenges in the Internet of Things (IoT) Ecosystem | |
Candra et al. | Security analysis testing for secure instant messaging in android with study case: Telegram |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Li Inventor after: Yang Shaobai Inventor before: Ren Minghe |
|
CB03 | Change of inventor or designer information | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180118 Address after: Baoan District Xin'an street Shenzhen city Guangdong province 518133 left three road (Shenzhen) Co., Ltd. Changfeng Electric Intelligence valley area and the 2 layer 1 layer ABC Applicant after: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD. Applicant after: Shenzhen runxun Marketing Data Services Ltd. Address before: 400039 Chongqing Jiulongpo District No. 186 stone path 2 buildings 21-1 Applicant before: CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Third-party intrusion monitoring method for cloud storage data packet Effective date of registration: 20181106 Granted publication date: 20180213 Pledgee: Shenzhen high tech investment and financing Company limited by guarantee Pledgor: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.|Shenzhen runxun Marketing Data Services Ltd. Registration number: 2018990001033 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Date of cancellation: 20190823 Granted publication date: 20180213 Pledgee: Shenzhen high tech investment and financing Company limited by guarantee Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD. Registration number: 2018990001033 |
|
PC01 | Cancellation of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Third-party intrusion monitoring method for cloud storage data packet Effective date of registration: 20190930 Granted publication date: 20180213 Pledgee: Shenzhen high tech investment and financing Company limited by guarantee Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD. Registration number: Y2019990000305 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Date of cancellation: 20210322 Granted publication date: 20180213 Pledgee: Shenzhen high tech investment and financing Company limited by guarantee Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION Co.,Ltd. Registration number: Y2019990000305 |
|
PC01 | Cancellation of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Third party intrusion detection method for cloud storage packets Effective date of registration: 20220624 Granted publication date: 20180213 Pledgee: China Co. truction Bank Corp Hefei Luyang branch Pledgor: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD. Registration number: Y2022980008820 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |