WO2018119990A1 - 一种云数据平台密匙设置方法 - Google Patents

一种云数据平台密匙设置方法 Download PDF

Info

Publication number
WO2018119990A1
WO2018119990A1 PCT/CN2016/113393 CN2016113393W WO2018119990A1 WO 2018119990 A1 WO2018119990 A1 WO 2018119990A1 CN 2016113393 W CN2016113393 W CN 2016113393W WO 2018119990 A1 WO2018119990 A1 WO 2018119990A1
Authority
WO
WIPO (PCT)
Prior art keywords
layer
key
data platform
cloud data
application layer
Prior art date
Application number
PCT/CN2016/113393
Other languages
English (en)
French (fr)
Inventor
刘清华
Original Assignee
刘清华
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 刘清华 filed Critical 刘清华
Priority to PCT/CN2016/113393 priority Critical patent/WO2018119990A1/zh
Publication of WO2018119990A1 publication Critical patent/WO2018119990A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Definitions

  • the present invention relates to the field of cloud computing, and in particular, to a cloud data platform key setting method.
  • Cloud computing is done by distributing computing across a large number of distributed computers, rather than local or remote servers, and the enterprise data center will behave more like the Internet. This allows companies to switch resources to the applications they need and access computers and storage systems as needed.
  • Cloud has a considerable scale, Google Cloud Computing has more than 1 million servers, and Amazon, IBM, Microsoft, Yahoo and other “clouds” have hundreds of thousands of servers. Enterprise private clouds typically have hundreds of thousands of servers. “Cloud” can give users unprecedented computing power.
  • Cloud computing allows users to access application services from any location using a variety of terminals.
  • the requested resource comes from the "cloud” rather than a fixed tangible entity.
  • the app runs somewhere in the "cloud”, but in reality the user doesn't need to know or worry about where the app is running. With just one laptop or one mobile phone, you can do everything you need through web services, even tasks like supercomputing.
  • Cloud uses data multi-copy fault tolerance, computing node isomorphism interchangeable measures to ensure high service Reliability, using cloud computing is more reliable than using a local computer.
  • Cloud computing is not targeted at specific applications. Under the support of “cloud”, it can construct ever-changing applications. The same “cloud” can support different application operations at the same time.
  • the scale of the "cloud” can be dynamically scaled to meet the needs of application and user scale growth.
  • Cloud is a huge resource pool that you buy on demand; the cloud can be billed like tap water, electricity, and gas.
  • the "cloud”'s automated centralized management eliminates the need for large enterprises to afford increasingly high data center management costs, and the versatility of "cloud” enables resource utilization. Compared with traditional systems, users can fully enjoy the low-cost advantage of “cloud”. It often takes hundreds of dollars and several days to complete tasks that previously required tens of thousands of dollars and months.
  • Cloud computing can completely change people's future lives, but at the same time, we must also pay attention to environmental issues, so that we can truly contribute to human progress, rather than simple technological advancement.
  • cloud computing services In addition to providing computing services, cloud computing services must provide storage services. But cloud computing services are currently monopolized in the hands of private institutions (enterprises), and they are only able to provide commercial credit. For government machines Organizations, commercial organizations (especially those with sensitive data such as banks) should be vigilant in their choice of cloud computing services. Once commercial users use cloud computing services provided by private organizations on a large scale, no matter how strong their technological advantages are, it is inevitable for these private organizations to use the "data (information)" importance to curb the entire society. For the information society, “information” is crucial. On the other hand, data in cloud computing is confidential to other users of cloud computing users other than data owners, but there is no secret to the business that provides cloud computing. All of these potential dangers are an important premise that business organizations and government agencies have to consider when choosing cloud computing services, especially those provided by foreign institutions.
  • the security of cloud data is very important for cloud computing service providers.
  • the secure cloud data platform can attract users to store data, how to protect users' data security, prevent hackers from invading, and avoid customer information loss. It is a key research and development project for cloud computing service providers. .
  • the invention constructs a secure and reliable cloud data platform system by introducing a key module in the terminal device, and the entire information link is layered through the key module.
  • a cloud data platform key setting method the cloud data platform includes: a hardware layer, an execution layer, and an application layer.
  • a security information chain is established from the hardware layer to the application layer, and the application layer passes
  • the key program establishes an external link with the external trusted cloud center and connects to the cloud computing server through the trusted network.
  • the key module is not only transplanted to the lowest hardware layer, but also transplanted to the entire information link.
  • Each link of the information link is provided with a key module, and the key module implements different layers through a key program. Between Security review.
  • the lowest level hardware layer includes a key module, which first ensures the security of the underlying hardware layer of the system, from the lowest hardware layer to the middle execution layer, finally to the topmost application layer, and even to the external cloud computing server.
  • a securely passed information link is first ensures the security of the underlying hardware layer of the system, from the lowest hardware layer to the middle execution layer, finally to the topmost application layer, and even to the external cloud computing server.
  • the hardware layer includes a CPU, a BIOS, and a peripheral device, and provides hardware support for the system.
  • the hardware layer further includes a key module, which internally stores a key program, and implements a security chain between the hardware layer and the execution layer through the key module. The road is built. For the untrusted BIOS startup operation, the key module rejects it and does not pass it to the execution layer to ensure that the lowest hardware layer of the system can be started safely.
  • the execution layer establishes a secure connection with the key module of the hardware layer through the key program, and after the security verification by the key program, starts the operating system application, and the cloud data platform starts to work; the operating system further includes a key module.
  • the key program establishes a secure link with the underlying hardware layer and the top-level application layer; for the unsafe operation after the operating system layer is turned on, the key module rejects and does not pass to the application layer.
  • the application layer establishes a secure link connection with the key module of the execution layer through a key program, and performs an application layer operation after the security verification by the key program; the application layer further includes a key module, which implements the bottom layer to the top layer.
  • the secure link management sets the security level of the entire security chain by setting the key modules in the secure link.
  • the application layer includes a global domain, and implements a global function function of the cloud computing platform system.
  • the key program includes a parsing program for the identity and attribute proof function, and the encrypted identity and attribute proof function are parsed from the underlying hardware layer to the top-level application layer, and the attribute number query function is added in the key program, and the application is applied.
  • the hardware layer sends a local identity and attribute proof function to the execution layer, and the execution layer feeds back the attribute number corresponding to all local identity and attribute proof functions to the application layer.
  • the application layer communicates with the hardware layer.
  • the application layer directly implements the execution of all functions in the hardware layer through the attribute number.
  • the application layer parses the attribute number, enters the attribute parser, and parses the attribute parameters into characters.
  • the key module is not only transplanted to the underlying hardware layer, but also transplanted to all layers of the entire cloud data platform, and the entire platform system is securely integrated. Whether it is the hardware layer startup or the upper application layer application, it must undergo security verification. It can be used to ensure the security of the delivery process, ensuring the reliability and security of the system when the application of the cloud computing platform is installed and running, and finally ensuring the security of the terminal device.
  • FIG. 1 is a system block diagram of a cloud data platform key setting method according to the present invention.
  • the invention provides a cloud data platform key setting method, which is to construct a secure and reliable cloud data platform system by introducing a key module in the cloud data platform system, combining the information chain and the proof interaction mode.
  • the invention provides a cloud data platform key setting method.
  • the cloud data platform comprises: a hardware layer, an execution layer and an application layer, and a security information chain is established from the hardware layer to the application layer.
  • the application layer establishes an external link with an external trusted cloud center through a key program, and connects to the cloud computing server through a trusted network.
  • the key module is not only transplanted to the lowest hardware layer, but also transplanted to the entire information link.
  • Each link of the information link is provided with a key module, and the key module realizes different layers through a key program. Security review.
  • the lowest hardware layer includes the key module, you can first ensure that the underlying hardware layer of the system can be trusted and securely booted, from the lowest hardware layer to the middle execution layer, finally to the topmost application layer, and even to external cloud computing.
  • Servers are a securely passed information link.
  • the hardware layer includes hardware devices such as CPU, BIOS, and peripheral devices, and provides hardware support for the system.
  • the hardware layer also includes a key module, which internally stores a key program, and implements a secure link between the hardware layer and the execution layer through a key module. Built, for untrusted BIOS boot operations, the key module is rejected and not passed to the execution layer to ensure that the lowest hardware layer of the system can be booted securely.
  • the execution layer establishes a secure connection with the key module of the hardware layer through the key program, and after the security verification by the key program, the operating system application is started, and the cloud data platform starts to work; the operating system further includes a key module, and the key program is used.
  • the underlying hardware layer and the top-level application layer establish a secure link. For unsafe operations after the operating system layer is turned on, the key module rejects it and does not pass it to the application layer.
  • the application layer establishes a secure link connection with the key module of the execution layer through the key program, and after the security verification by the key program, starts the application layer operation;
  • the application layer includes the global domain, and implements the global function function index of the cloud computing platform system;
  • the application layer also includes a key module to implement secure link management from the bottom to the top. Set the security level of the entire security chain by setting the key modules in the secure link.
  • the key program includes the parsing program of the identity and attribute proof function. From the underlying hardware layer to the top-level application layer, the encrypted identity and attribute proof function need to be parsed. The attribute number query function is added in the key program, and the application layer and the execution layer are added. After the connection is established, the hardware layer sends the local identity and attribute proof function to the execution layer. The execution layer feeds back the attribute numbers corresponding to all local identity and attribute proof functions to the application layer. The application layer communicates with the hardware layer, and the application layer directly passes the attribute number. Implement all functions in the hardware layer, the application layer parses the attribute number, enters the attribute parser, and parses the attribute parameters into characters.
  • the key module is not only transplanted to the underlying hardware layer, but also transplanted to each layer of the entire cloud data platform, and the security integration of the entire platform system, whether it is the hardware layer startup or the application of the upper application layer, must be verified by security. After that, it can be used to ensure the security of the delivery process, ensuring the reliability and security of the system when the application of the cloud computing platform is installed and running, and finally ensuring the security of the terminal device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种云数据平台密匙设置方法,云数据平台包括:硬件层、执行层和应用层,通过在云数据平台系统中引入密匙模块,自硬件层到应用层建立安全信息链,应用层通过密匙程序与外部可信云中心建立外部链接,通过可信网络与云计算服务器相连。该方法将密匙模块不仅移植到底层硬件层,还移植到整个云数据平台的各个层中,对整个平台系统进行安全整合,不管是硬件层启动,还是上层应用层的应用,必须经过安全验证之后,才能使用,保证传递过程的安全性,保证了云计算平台的应用程序安装和运行时,系统的可靠安全,最终保证了终端设备的安全。

Description

一种云数据平台密匙设置方法 技术领域
本发明涉及云计算领域,特别涉及一种云数据平台密匙设置方法。
背景技术
云计算是通过使计算分布在大量的分布式计算机上,而非本地计算机或远程服务器中,企业数据中心的运行将与互联网更相似。这使得企业能够将资源切换到需要的应用上,根据需求访问计算机和存储系统。
云计算具有如下特点:
(1)超大规模
“云”具有相当的规模,Google云计算已经拥有100多万台服务器,Amazon、IBM、微软、Yahoo等的“云”均拥有几十万台服务器。企业私有云一般拥有数百上千台服务器。“云”能赋予用户前所未有的计算能力。
(2)虚拟化
云计算支持用户在任意位置、使用各种终端获取应用服务。所请求的资源来自“云”,而不是固定的有形的实体。应用在“云”中某处运行,但实际上用户无需了解、也不用担心应用运行的具体位置。只需要一台笔记本或者一个手机,就可以通过网络服务来实现我们需要的一切,甚至包括超级计算这样的任务。
(3)高可靠性
“云”使用了数据多副本容错、计算节点同构可互换等措施来保障服务的高 可靠性,使用云计算比使用本地计算机可靠。
(4)通用性
云计算不针对特定的应用,在“云”的支撑下可以构造出千变万化的应用,同一个“云”可以同时支撑不同的应用运行。
(5)高可扩展性
“云”的规模可以动态伸缩,满足应用和用户规模增长的需要。
(6)按需服务
“云”是一个庞大的资源池,你按需购买;云可以像自来水,电,煤气那样计费。
(7)极其廉价
由于“云”的特殊容错措施可以采用极其廉价的节点来构成云,“云”的自动化集中式管理使大量企业无需负担日益高昂的数据中心管理成本,“云”的通用性使资源的利用率较之传统系统大幅提升,因此用户可以充分享受“云”的低成本优势,经常只要花费几百美元、几天时间就能完成以前需要数万美元、数月时间才能完成的任务。
云计算可以彻底改变人们未来的生活,但同时也要重视环境问题,这样才能真正为人类进步做贡献,而不是简单的技术提升。
(8)潜在的危险性
云计算服务除了提供计算服务外,还必然提供了存储服务。但是云计算服务当前垄断在私人机构(企业)手中,而他们仅仅能够提供商业信用。对于政府机 构、商业机构(特别像银行这样持有敏感数据的商业机构)对于选择云计算服务应保持足够的警惕。一旦商业用户大规模使用私人机构提供的云计算服务,无论其技术优势有多强,都不可避免地让这些私人机构以“数据(信息)”的重要性挟制整个社会。对于信息社会而言,“信息”是至关重要的。另一方面,云计算中的数据对于数据所有者以外的其他用户云计算用户是保密的,但是对于提供云计算的商业机构而言确实毫无秘密可言。所有这些潜在的危险,是商业机构和政府机构选择云计算服务、特别是国外机构提供的云计算服务时,不得不考虑的一个重要的前提。
云数据的安全对于云计算服务商而言至关重要,安全的云数据平台才能吸引用户存储数据,如何保护用户的数据安全,防止黑客入侵,避免客户信息流失,是云计算服务商重点研发项目。
发明内容
本发明通过在终端设备中引入密匙模块,整个信息链路通过密匙模块进行层层对接,来构建一个安全可靠的云数据平台系统。
本发明的技术方案是这样实现的:
一种云数据平台密匙设置方法,云数据平台包括:硬件层、执行层和应用层,通过在云数据平台系统中引入密匙模块,自硬件层到应用层建立安全信息链,应用层通过密匙程序与外部可信云中心建立外部链接,通过可信网络与云计算服务器相连。
可选地,将密匙模块不仅移植到最底层的硬件层,还移植到整个信息链路中,信息链路的每个环节均设置有密匙模块,密匙模块通过密匙程序实现不同层之间 的安全审核。
可选地,最底层的硬件层包括密匙模块,首先保证系统底层硬件层安全的启动,从最底层硬件层到中间执行层,最后到最顶层应用层,甚至到访问外部云计算服务器都是一个安全传递的信息链路。
可选地,硬件层包括如CPU、BIOS和外围设备,为系统提供硬件支持,硬件层还包括密匙模块,其内部存储密匙程序,通过密匙模块实现硬件层与执行层间的安全链路搭建,对于不可信的BIOS启动操作,密匙模块予以拒绝,不向执行层进行传递,保证系统最底层硬件层能够安全的启动。
可选地,执行层通过密匙程序与硬件层的密匙模块建立安全连接,经过密匙程序进行安全验证后,启动操作系统应用,云数据平台开始工作;操作系统还包括密匙模块,通过密匙程序与底层的硬件层和顶层的应用层建立安全链路搭建;对于操作系统层开启后的不安全操作,密匙模块予以拒绝,不向应用层进行传递。
可选地,应用层通过密匙程序与执行层的密匙模块建立安全链路连接,经过密匙程序进行安全验证后,启动应用层操作;应用层还包括密匙模块,实现自底层到顶层的安全链路管理,通过对安全链路中各个密匙模块的设置,设置整个安全链的安全等级。
可选地,应用层包括全局域,实现云计算平台系统的全局功能函数索。
可选地,密匙程序包括身份和属性证明函数的解析程序,从底层硬件层到顶层应用层,都需要对加密的身份和属性证明函数进行解析,密匙程序中增加属性号查询功能,应用层与执行层建立连接后,硬件层发送本地身份和属性证明函数到执行层,执行层反馈所有本地身份和属性证明函数所对应的属性号到应用层, 应用层与硬件层实现通讯,应用层直接通过属性号实现所有功能在硬件层的执行,应用层对属性号进行解析,进入属性解析器,解析为字符形式的属性参数。
本发明的有益效果是:
将密匙模块不仅移植到底层硬件层,还移植到整个云数据平台的各个层中,对整个平台系统进行安全整合,不管是硬件层启动,还是上层应用层的应用,必须经过安全验证之后,才能使用,保证传递过程的安全性,保证了云计算平台的应用程序安装和运行时,系统的可靠安全,最终保证了终端设备的安全。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明的一种云数据平台密匙设置方法的系统框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明提出了一种云数据平台密匙设置方法,通过在云数据平台系统中引入密匙模块,结合信息链和证明交互方式,来构建一个安全可靠的云数据平台系统。
下面结合说明书附图对本发明进行详细说明。
本发明提出了一种云数据平台密匙设置方法,如图1所示,云数据平台包括:硬件层、执行层和应用层,自硬件层到应用层建立安全信息链。应用层通过密匙程序与外部可信云中心建立外部链接,通过可信网络与云计算服务器相连。
本发明将密匙模块不仅移植到最底层的硬件层,还移植到整个信息链路中,信息链路的每个环节均设置有密匙模块,密匙模块通过密匙程序实现不同层之间的安全审核。
由于最底层的硬件层包括密匙模块,因此,可以首先保证系统底层硬件层能够可信安全的启动,从最底层硬件层到中间执行层,最后到最顶层应用层,甚至到访问外部云计算服务器都是一个安全传递的信息链路。
硬件层包括如CPU、BIOS和外围设备等硬件设备,为系统提供硬件支持,硬件层还包括密匙模块,其内部存储密匙程序,通过密匙模块实现硬件层与执行层间的安全链路搭建,对于不可信的BIOS启动操作,密匙模块予以拒绝,不向执行层进行传递,保证系统最底层硬件层能够安全的启动。
执行层通过密匙程序与硬件层的密匙模块建立安全连接,经过密匙程序进行安全验证后,启动操作系统应用,云数据平台开始工作;操作系统还包括密匙模块,通过密匙程序与底层的硬件层和顶层的应用层建立安全链路搭建。对于操作系统层开启后的不安全操作,密匙模块予以拒绝,不向应用层进行传递。
应用层通过密匙程序与执行层的密匙模块建立安全链路连接,经过密匙程序进行安全验证后,启动应用层操作;应用层包括全局域,实现云计算平台系统的全局功能函数索引;应用层还包括密匙模块,实现自底层到顶层的安全链路管理, 通过对安全链路中各个密匙模块的设置,设置整个安全链的安全等级。
密匙程序包括身份和属性证明函数的解析程序,从底层硬件层到顶层应用层,都需要对加密的身份和属性证明函数进行解析,密匙程序中增加属性号查询功能,应用层与执行层建立连接后,硬件层发送本地身份和属性证明函数到执行层,执行层反馈所有本地身份和属性证明函数所对应的属性号到应用层,应用层与硬件层实现通讯,应用层直接通过属性号实现所有功能在硬件层的执行,应用层对属性号进行解析,进入属性解析器,解析为字符形式的属性参数。
本发明将密匙模块不仅移植到底层硬件层,还移植到整个云数据平台的各个层中,对整个平台系统进行安全整合,不管是硬件层启动,还是上层应用层的应用,必须经过安全验证之后,才能使用,保证传递过程的安全性,保证了云计算平台的应用程序安装和运行时,系统的可靠安全,最终保证了终端设备的安全。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (8)

  1. 一种云数据平台密匙设置方法,其特征在于,云数据平台包括:硬件层、执行层和应用层,通过在云数据平台系统中引入密匙模块,自硬件层到应用层建立安全信息链,应用层通过密匙程序与外部可信云中心建立外部链接,通过可信网络与云计算服务器相连。
  2. 如权利要求1所述的一种云数据平台密匙设置方法,其特征在于,
    将密匙模块不仅移植到最底层的硬件层,还移植到整个信息链路中,信息链路的每个环节均设置有密匙模块,密匙模块通过密匙程序实现不同层之间的安全审核。
  3. 如权利要求1所述的一种云数据平台密匙设置方法,其特征在于,
    最底层的硬件层包括密匙模块,首先保证系统底层硬件层安全的启动,从最底层硬件层到中间执行层,最后到最顶层应用层,甚至到访问外部云计算服务器都是一个安全传递的信息链路。
  4. 如权利要求3所述的一种云数据平台密匙设置方法,其特征在于,
    硬件层包括如CPU、BIOS和外围设备,为系统提供硬件支持,硬件层还包括密匙模块,其内部存储密匙程序,通过密匙模块实现硬件层与执行层间的安全链路搭建,对于不可信的BIOS启动操作,密匙模块予以拒绝,不向执行层进行传递,保证系统最底层硬件层能够安全的启动。
  5. 如权利要求3所述的一种云数据平台密匙设置方法,其特征在于,
    执行层通过密匙程序与硬件层的密匙模块建立安全连接,经过密匙程序进行安全验证后,启动操作系统应用,云数据平台开始工作;操作系统还包括密匙模块,通过密匙程序与底层的硬件层和顶层的应用层建立安全链路搭建;对于操作 系统层开启后的不安全操作,密匙模块予以拒绝,不向应用层进行传递。
  6. 如权利要求3所述的一种云数据平台密匙设置方法,其特征在于,应用层通过密匙程序与执行层的密匙模块建立安全链路连接,经过密匙程序进行安全验证后,启动应用层操作;应用层还包括密匙模块,实现自底层到顶层的安全链路管理,通过对安全链路中各个密匙模块的设置,设置整个安全链的安全等级。
  7. 如权利要求6所述的一种云数据平台密匙设置方法,其特征在于,应用层包括全局域,实现云计算平台系统的全局功能函数索。
  8. 如权利要求1所述的一种云数据平台密匙设置方法,其特征在于,
    密匙程序包括身份和属性证明函数的解析程序,从底层硬件层到顶层应用层,都需要对加密的身份和属性证明函数进行解析,密匙程序中增加属性号查询功能,应用层与执行层建立连接后,硬件层发送本地身份和属性证明函数到执行层,执行层反馈所有本地身份和属性证明函数所对应的属性号到应用层,应用层与硬件层实现通讯,应用层直接通过属性号实现所有功能在硬件层的执行,应用层对属性号进行解析,进入属性解析器,解析为字符形式的属性参数。
PCT/CN2016/113393 2016-12-30 2016-12-30 一种云数据平台密匙设置方法 WO2018119990A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/113393 WO2018119990A1 (zh) 2016-12-30 2016-12-30 一种云数据平台密匙设置方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/113393 WO2018119990A1 (zh) 2016-12-30 2016-12-30 一种云数据平台密匙设置方法

Publications (1)

Publication Number Publication Date
WO2018119990A1 true WO2018119990A1 (zh) 2018-07-05

Family

ID=62707776

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/113393 WO2018119990A1 (zh) 2016-12-30 2016-12-30 一种云数据平台密匙设置方法

Country Status (1)

Country Link
WO (1) WO2018119990A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244684A (zh) * 2011-07-29 2011-11-16 电子科技大学 基于usbkey的efi可信云链引导方法
CN104202421A (zh) * 2014-09-19 2014-12-10 浪潮电子信息产业股份有限公司 一种基于云计算的密码服务系统
CN104239802A (zh) * 2014-10-15 2014-12-24 浪潮电子信息产业股份有限公司 一种基于云数据中心的可信服务器设计方法
US20150188944A1 (en) * 2013-12-27 2015-07-02 Trapezoid, Inc. System and method for hardware-based trust control management
CN106452753A (zh) * 2016-10-26 2017-02-22 泰山医学院 云计算环境下终端可信平台构建方法
CN106506166A (zh) * 2016-10-26 2017-03-15 泰山医学院 云计算环境下终端可信平台系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244684A (zh) * 2011-07-29 2011-11-16 电子科技大学 基于usbkey的efi可信云链引导方法
US20150188944A1 (en) * 2013-12-27 2015-07-02 Trapezoid, Inc. System and method for hardware-based trust control management
CN104202421A (zh) * 2014-09-19 2014-12-10 浪潮电子信息产业股份有限公司 一种基于云计算的密码服务系统
CN104239802A (zh) * 2014-10-15 2014-12-24 浪潮电子信息产业股份有限公司 一种基于云数据中心的可信服务器设计方法
CN106452753A (zh) * 2016-10-26 2017-02-22 泰山医学院 云计算环境下终端可信平台构建方法
CN106506166A (zh) * 2016-10-26 2017-03-15 泰山医学院 云计算环境下终端可信平台系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LIANG, YUAN: "The Trusted Platform Design Based on Cloud Computing", CHINA DOCTORAL DISSERTATIONS FULL-TEXT DATABASE (INFORMATION SCIENCE AND TECHNOLOGY), vol. 11, 15 November 2013 (2013-11-15) *

Similar Documents

Publication Publication Date Title
US10095549B1 (en) Ownership transfer account service in a virtual computing environment
US10484385B2 (en) Accessing an application through application clients and web browsers
Zhou et al. Security and privacy in cloud computing: A survey
JP2021533448A (ja) ハイパーレッジャファブリックブロックチェーンにおいてsqlベースのリッチクエリをサポートするためのシステムおよび方法
CN107579998A (zh) 基于区块链、数字身份和智能合约的个人数据中心及数字身份认证方法
EP3610623B1 (en) Protocol-level identity mapping
US20150215308A1 (en) Secure communication between processes in cloud
US10291401B1 (en) Stateless service-mediated security module
JP2017507563A (ja) トラフィックポリシーの実施をサポートするエンティティハンドルレジストリ
Prajapati et al. All about cloud: A systematic survey
CN112583887A (zh) 一种基于区块链的数据可信共享方法
Mukundrao et al. Enhancing security in cloud computing
Shamim et al. A review on mobile cloud computing
US20210243246A1 (en) Mechanism for a work node scan process to facilitate cluster scaling
Prasadreddy et al. A threat free architecture for privacy assurance in cloud computing
WO2018119990A1 (zh) 一种云数据平台密匙设置方法
Jangra et al. Spectrum of cloud computing architecture: Adoption and avoidance issues
Kaur et al. Cloud Computing Security Issues and Challenges
Shenai et al. A federated cloud computing model with self-organizing capability using trust negotiation
US20230153457A1 (en) Privacy data management in distributed computing systems
Zhang et al. An authorization model for multi-tenancy services in cloud
US11764978B2 (en) Method and system for certificate management
US20230153450A1 (en) Privacy data management in distributed computing systems
Seth et al. Design and Development of Optimized Scheduling Algorithm for Software As A Service Based Applications in Secure Cloud Environment
Sivakumar et al. SAAS Application-Running Large Scale Application in Lightweight Cloud with Strong Privacy Protection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16924978

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 19/09/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16924978

Country of ref document: EP

Kind code of ref document: A1