WO2019006637A1 - 一种安全云计算系统 - Google Patents
一种安全云计算系统 Download PDFInfo
- Publication number
- WO2019006637A1 WO2019006637A1 PCT/CN2017/091585 CN2017091585W WO2019006637A1 WO 2019006637 A1 WO2019006637 A1 WO 2019006637A1 CN 2017091585 W CN2017091585 W CN 2017091585W WO 2019006637 A1 WO2019006637 A1 WO 2019006637A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cloud computing
- module
- data
- secure cloud
- user
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 28
- 238000013500 data storage Methods 0.000 claims abstract description 16
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000007726 management method Methods 0.000 claims description 45
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 5
- 230000005856 abnormality Effects 0.000 description 3
- 238000002955 isolation Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
Definitions
- the invention belongs to the field of information security, and in particular relates to a secure cloud computing system.
- Cloud computing is a new computing model that can more effectively use computing resources to provide users with various data services. It links a large number of computing resources, storage resources and software resources, and uses virtual technology to provide users with customizable Computing, storage, and application services to avoid the construction and maintenance of the user's own heavy infrastructure.
- the centrally managed cloud computing center will become the key target of hacker attacks. Due to unprecedented openness and complexity, its security is facing a more severe test than ever before.
- Cloud computing's big data resource access control is cloud computing security. At the core of the problem, access control is an important means to achieve confidentiality of information security big data resources and privacy protection.
- Embodiments of the present invention provide a secure cloud computing system, which aims to solve the problem of user data and information loss in an extreme case in the prior art.
- a secure cloud computing system including: a cloud center, a secure cloud computing server, and a proxy terminal, wherein the cloud center is connected to the secure cloud computing server, and the proxy terminal is installed in the Establishing a communication connection with the cloud center on the secure cloud computing server, where the cloud center includes a separate database, an isolated database, and a shared database, and a transport channel is provided between the independent database, the isolated database, and the shared database, and the independent database And the isolated database and the shared database exchange data through the transmission channel;
- the secure cloud computing server includes a user rights management module, an authentication management module, a security management module, and a cloud computing management center;
- the proxy terminal includes a data backup module and Data storage module.
- the secure cloud computing server further includes: a digital certificate computing storage IC module and a fingerprint verification module, the digital certificate computing storage IC module respectively corresponding to the user rights management module, the authentication management module, and the security
- the management module is connected; the fingerprint verification module is connected to the digital certificate operation storage IC module.
- each of the independent database, the isolated database, and the shared database is provided with an identification code
- the proxy terminal classifies and identifies the data to be transmitted to the cloud center according to the situation, and the identifier corresponds to the corresponding identification code.
- the user rights management module is configured to manage rights allocation of an administrator user and an end user;
- the authentication management module is configured to separately verify the authority information of the administrator and the authority information of the terminal user according to the authority allocation of the administrator user and the terminal user in the user rights management module;
- the security management module is configured to encrypt a session between the secure cloud computing server and the proxy terminal to prevent tampering; and ensure that a security protection mechanism is provided in the case of an attack by an illegal proxy terminal;
- the cloud computing management center is configured to manage and maintain the secure cloud computing server.
- the cloud computing management center comprises:
- a communication management unit configured to maintain communication between the secure cloud computing server and the proxy terminal, and ensure information consistency of information synchronization, and ensure normal operation of the disaster tolerance fault-tolerant solution under extreme conditions;
- a session management unit configured to manage and maintain a session between the secure cloud computing server and the proxy terminal, to ensure that the session is normal;
- a disaster-tolerant fault-tolerant unit is provided to provide a disaster-tolerant fault-tolerant solution in an extreme situation, manage and maintain the disaster-tolerant fault-tolerant solution, ensure the normal operation of the secure cloud computing server, and ensure the normal use of the agent terminal and the normal use of the data; as well as
- a logging unit that records related logs of operation logs, cloud centers, and agent terminals.
- the proxy terminal further includes:
- a resource calling module which is used to call a local resource for calculation and upload the calculation result to the cloud center;
- a session management module for managing a session between the agent terminal and the cloud center, and providing a session mechanism in an offline situation to ensure data availability
- a backup management module for backing up data information and applications of the agent terminal and saving them to the data backup module; backing up and saving local data and parameters to the data storage module;
- Local authentication management module for user authentication in online state and user authentication in offline state.
- the digital certificate operation storage IC module is configured to generate a unique device serial number.
- the fingerprint verification module is configured to verify the identity of the user according to the device serial number generated by the digital certificate operation storage IC module.
- a communication status monitoring module is disposed between the agent terminal and the cloud center, and the communication status monitoring module is configured to monitor a communication status between the agent terminal and the cloud center.
- the secure cloud computing system adopts a data storage form of three structures: an independent database, an isolated database, and a shared database, and can select a storage form according to the level of the data security level, thereby saving resources and reducing costs, and Data storage provides effective security assurance.
- it effectively solves the problem of leakage of user information caused by weak protection measures of cloud computing terminals through authentication, and prevents security risks such as identity loss, data theft, and information loss.
- the local backup area data information and the data and parameters of the local end data area can be used to prevent user data information from being lost in extreme cases.
- FIG. 1 is a schematic structural diagram of a secure cloud computing system according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a secure cloud computing server according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a cloud computing management center according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a proxy terminal according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of another secure cloud computing system according to an embodiment of the present invention.
- the secure cloud computing system adopts a data storage form of three structures: an independent database, an isolated database, and a shared database, and can select a storage form according to the level of the data security level, thereby saving resources and reducing costs, and Data storage provides effective security assurance.
- it effectively solves the problem of leakage of user information caused by weak protection measures of cloud computing terminals through authentication, and prevents security risks such as identity loss, data theft, and information loss.
- the local backup area data information and the data and parameters of the local end data area can be used to prevent user data information from being lost in extreme cases.
- a secure cloud computing system includes: a cloud center 100, a secure cloud computing server 200, and a proxy terminal 300.
- the cloud center 100 is connected to the secure cloud computing server 200.
- the agent terminal 300 is installed on the secure cloud computing server 200 and establishes a communication connection with the cloud center 100.
- the cloud center 100 includes an independent database 110, an isolation database 120, and a shared database 130.
- the independent database 110 A transport channel is provided between the quarantine database 120 and the shared database 130.
- the independent database 110, the quarantine database 120 and the shared database 130 interact with each other through a transport channel.
- the secure cloud computing server 200 includes a user rights management module.
- the data storage form of the three independent architectures, the isolated database and the shared database can select the storage form according to the level of the data security level, which can save resources, reduce costs, and provide effective security guarantee for data storage;
- the local side backup area data information and the data and parameters of the local end data area can be used to prevent user data information from being lost in extreme cases.
- the secure cloud computing server 200 further includes: a digital certificate computing storage IC module 250 and a fingerprint verification module 260, and the digital certificate computing storage IC module 250 respectively
- the user rights management module 210, the authentication management module 220, and the security management module 230 are connected; the fingerprint verification module 260 is connected to the digital certificate operation storage IC module 250, and the digital certificate operation storage IC
- the module 250 is configured to generate a unique device serial number; the fingerprint verification module 260 is configured to verify the user identity according to the device serial number generated by the digital certificate operation storage IC module; and calculate the storage IC by using a built-in digital certificate.
- the module generates a unique device serial number, and then the built-in fingerprint verification module verifies the identity of the user and completes the user's secure cloud computing operation;
- the independent database 110, the isolation database 120, and the shared database 130 are respectively provided with an identification code
- the proxy terminal 100 classifies and identifies the data to be transmitted to the cloud center according to the situation, and the identifier and Corresponding identification code corresponding, the proxy terminal 100 can transfer data between the independent database 110, the isolation database 120 and the shared database 130 according to the sent instructions, thereby saving resources, reducing costs, and requiring higher security levels.
- the data provides an effective security guarantee; in order to make the present invention more flexible, the present invention can flexibly transform the storage form according to the change of the data security level to achieve the optimal cost and protection.
- the user rights management module 210 is configured to manage the rights allocation of the administrator user and the terminal user;
- the authentication management module 220 is configured to use the administrator user and the user in the user rights management module.
- the security management module 230 is configured to encrypt the session between the secure cloud computing server and the agent terminal to prevent being Tampering; ensuring that a security protection mechanism is provided in the case of an attack by an illegal agent terminal;
- the cloud computing management center 240 is configured to manage and maintain the secure cloud computing server.
- the cloud computing management center 240 includes a communication management unit 241, configured to maintain communication and information synchronization guarantee information between the secure cloud computing server and the proxy terminal. Consistency, and ensure the normal operation of the disaster tolerance fault-tolerant solution in an extreme case; the session management unit 242 is configured to manage and maintain a session between the secure cloud computing server and the proxy terminal, and ensure that the session is normal; The fault tolerance unit 243 is configured to provide a disaster tolerance fault-tolerant solution in an extreme situation, manage and maintain the disaster tolerance fault-tolerant solution, ensure the normal operation of the secure cloud computing server, and ensure normal use of the proxy terminal and normal use of the data; And a logging unit 244, configured to record an operation log, a cloud center, and a related log of the agent terminal.
- the proxy terminal 300 further includes a resource invoking module 301, configured to invoke local resources for calculation and upload the calculation result to the cloud center; and the session management module 302 is configured to Manage the session between the agent terminal and the cloud center, and provide a session mechanism in the offline situation to ensure the availability of data; the backup management module 303 is configured to back up the data information and application of the agent terminal and save it to the data backup Module; backing up and saving local data and parameters to the data storage module; and local authentication management module 304 for user authentication in an online state and user authentication in an offline state.
- the proxy terminal 300 opens up a backup area and a data area on the local hard disk for providing backup of data information and applications, and the data area is used for providing storage of data and parameters.
- the backup area when the agent terminal 300 is first with the cloud center During normal communication, the backup area will automatically back up the data information and application program. If there is any change in subsequent use, it will be automatically updated. If there is communication abnormality or network interruption, the agent terminal will automatically restart and call the data information and application of the backup area. Program; for the data area, when the agent terminal 300 uses the application, the data and parameters are automatically saved in the data area and updated in real time, and the data and parameters are uploaded to the cloud center; if there is communication abnormality or network interruption, only the data is updated. And the parameters are not uploaded, and the upload is performed after the communication is normal.
- a communication status monitoring module 400 is disposed between the agent terminal 300 and the cloud center 100, and the communication status monitoring module 400 is configured to monitor the agent terminal 300 and The communication status between the cloud centers 100 further ensures the security of the system.
- the secure cloud computing system adopts a data storage form of three structures: an independent database, an isolated database, and a shared database.
- the storage format can be selected according to the level of the data security level, which can save resources and reduce costs, and Data storage provides effective security assurance.
- it effectively solves the problem of leakage of user information caused by weak protection measures of cloud computing terminals through authentication, and prevents security risks such as identity loss, data theft, and information loss.
- the local backup area data information and the data and parameters of the local end data area can be used to prevent user data information from being lost in extreme cases.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
一种安全云计算系统,包括:云中心(100)、安全云计算服务器(200)和代理终端(300),云中心(100)与安全云计算服务器(200)连接,代理终端(300)安装在安全云计算服务器(200)上且与云中心(100)建立通讯连接;采用独立数据库(110)、隔离数据库(120)和共享数据库(130)三种架构的数据存储形式,能根据数据安全级别的高低,选择存储形式,既能节省资源,降低成本,又对数据存储提供了有效的安全保证;同时,通过身份验证的方式、有效地解决了云计算终端防护措施薄弱造成用户信息泄露的状况,防止了身份失密、数据窃取、信息丢失等多方面的安全隐患,以及在出现通信异常或网络中断的情况下可使用本地端备份区数据信息和本地端数据区的数据和参数,防止极端情况下用户数据信息丢失。
Description
本发明属于信息安全领域,尤其涉及一种安全云计算系统。
云计算是一种可以更有效地利用计算资源为用户提供各种数据服务的新型计算模式,其将大量的计算资源、存储资源和软件资源链接在一起,运用虚拟技术,为用户提供可定制的计算、存储和应用服务,避免用户自身繁重的基础设施的构建和维护。然而,集中管理的云计算中心将成为黑客攻击的重点目标,由于前所未有的开放性与复杂性,其安全性面临着比以往更为严峻的考验,云计算的大数据资源访问控制是云计算安全问题的核心,访问控制是实现信息安全大数据资源机密性和进行隐私保护的重要手段。
本发明实施例提供一种安全云计算系统,旨在解决现有技术中极端情况下用户数据和信息丢失的问题。
本发明实施例是这样实现的,一种安全云计算系统,包括:云中心、安全云计算服务器和代理终端,所述云中心与所述安全云计算服务器连接,所述代理终端安装在所述安全云计算服务器上且与所述云中心建立通讯连接,所述云中心包括独立数据库、隔离数据库和共享数据库,所述独立数据库、隔离数据库和共享数据库之间设有传输信道,所述独立数据库、隔离数据库和共享数据库之间通过传输信道两两数据交互;所述安全云计算服务器包括用户权限管理模块、认证管理模块、安全管理模块以及云计算管理中心;所述代理终端包括数据备份模块和数据存储模块。
优选地,所述安全云计算服务器,还包括:数字证书运算存储IC模块和指纹验证模块,所述数字证书运算存储IC模块分别与所述用户权限管理模块、所述认证管理模块和所述安全管理模块连接;所述指纹验证模块与所述数字证书运算存储IC模块连接。
优选地,所述独立数据库、隔离数据库和共享数据库中分别设有一个标识码,所述代理终端把要传输至云中心的数据根据情况分类并标识,该标识和对应的标识码对应。
优选地,所述用户权限管理模块,用于管理管理员用户和终端用户的权限分配;
所述认证管理模块,用于根据所述用户权限管理模块中的管理员用户和终端用户的权限分配来分别验证管理员的权限信息和终端用户的权限信息;
所述安全管理模块,用于对所述安全云计算服务器与所述代理终端之间的会话进行加密,防止被篡改;确保在遇到非法代理终端的攻击的情况下提供安全保护机制;
所述云计算管理中心,用于于管理、维护所述安全云计算服务器。
优选地,所述云计算管理中心,包括:
通信管理单元,用于维护所述安全云计算服务器与所述代理终端之间的通信以及信息同步保证信息的一致性,并确保在极端情况下的容灾容错方案的正常运行;
会话管理单元,用于管理、维护所述安全云计算服务器与所述代理终端的会话,确保会话的正常进行;
容灾容错单元,用于在极端情况下提供容灾容错解决方案,管理、维护所述容灾容错解决方案,确保安全云计算服务器的正常工作以及确保代理终端的正常使用以及数据的正常使用;以及
日志记录单元,用于记录操作日志、云中心和代理终端的相关日志。
优选地,所述代理终端,还包括:
资源调用模块,用于调用本地的资源进行计算并将计算结果上传至云中心;
会话管理模块,用于管理代理终端与云中心之间的会话,并提供在离线情况下的会话机制保证数据的可用性;
备份管理模块,用于对代理终端的数据信息和应用程序进行备份并将其保存至数据备份模块;对本地的数据和参数进行备份并将其保存至数据存储模块;以及
本地认证管理模块,用于在线状态下的用户认证以及离线状态下的用户验证。
优选地,所述数字证书运算存储IC 模块用于产生唯一设备序号。
优选地,所述指纹验证模块用于根据所述数字证书运算存储IC 模块产生的设备序号验证用户身份。
优选地,所述代理终端与所述云中心之间设置有通信状态监控模块,所述通信状态监控模块用于监控所述代理终端与所述云中心之间的通信状况。
本发明实施例提供的安全云计算系统,采用独立数据库、隔离数据库和共享数据库三种架构的数据存储形式,能根据数据安全级别的高低,选择存储形式,既能节省资源,降低成本,又对数据存储提供了有效的安全保证;同时,通过身份验证的方式、有效地解决了云计算终端防护措施薄弱造成用户信息泄露的状况,防止了身份失密、数据窃取、信息丢失等多方面的安全隐患,以及在出现通信异常或网络中断的情况下可使用本地端备份区数据信息和本地端数据区的数据和参数,防止极端情况下用户数据信息丢失。
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
以下附图仅旨在于对本发明做示意性说明和解释,并不限定本发明的范围。
图1是本发明实施例提供的一种安全云计算系统的结构示意图;
图2是本发明实施例提供的安全云计算服务器的结构示意图;
图3是本发明实施例提供的云计算管理中心的结构示意图;
图4是本发明实施例提供的代理终端的结构示意图;
图5是本发明实施例提供的另一种的安全云计算系统的结构示意图。
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例提供的安全云计算系统,采用独立数据库、隔离数据库和共享数据库三种架构的数据存储形式,能根据数据安全级别的高低,选择存储形式,既能节省资源,降低成本,又对数据存储提供了有效的安全保证;同时,通过身份验证的方式、有效地解决了云计算终端防护措施薄弱造成用户信息泄露的状况,防止了身份失密、数据窃取、信息丢失等多方面的安全隐患,以及在出现通信异常或网络中断的情况下可使用本地端备份区数据信息和本地端数据区的数据和参数,防止极端情况下用户数据信息丢失。
以下结合具体实施例对本发明的具体实现进行详细描述。
如图1所示,在本发明实施例中,一种安全云计算系统,包括:云中心100、安全云计算服务器200和代理终端300,所述云中心100与所述安全云计算服务器200连接,所述代理终端300安装在所述安全云计算服务器200上且与所述云中心100建立通讯连接,所述云中心100包括独立数据库110、隔离数据库120和共享数据库130,所述独立数据库110、隔离数据库120和共享数据库130之间设有传输信道,所述独立数据库110、隔离数据库120和共享数据库130之间通过传输信道两两数据交互;所述安全云计算服务器200包括用户权限管理模块210、认证管理模块220、安全管理模块230以及云计算管理中心240;所述代理终端300包括数据备份模块310和数据存储模块320。采用独立数据库、隔离数据库和共享数据库三种架构的数据存储形式,能根据数据安全级别的高低,选择存储形式,既能节省资源,降低成本,又对数据存储提供了有效的安全保证;同时,通过身份验证的方式、有效地解决了云计算终端防护措施薄弱造成用户信息泄露的状况,防止了身份失密、数据窃取、信息丢失等多方面的安全隐患,以及在出现通信异常或网络中断的情况下可使用本地端备份区数据信息和本地端数据区的数据和参数,防止极端情况下用户数据信息丢失。
在本发明实施例中,如图2所示,所述安全云计算服务器200,还包括:数字证书运算存储IC模块250和指纹验证模块260,所述数字证书运算存储IC模块250分别与所述用户权限管理模块210、所述认证管理模块220和所述安全管理模块230连接;所述指纹验证模块260与所述数字证书运算存储IC模块250连接,所述数字证书运算存储IC
模块250用于产生唯一设备序号;所述指纹验证模块260用于根据所述数字证书运算存储IC 模块产生的设备序号验证用户身份;通过内置的数字证书运算存储IC
模块产生唯一设备序号,然后内置的指纹验证模块验证用户的身份,完成用户的安全云计算操作;
在本发明实施例中,所述独立数据库110、隔离数据库120和共享数据库130中分别设有一个标识码,所述代理终端100把要传输至云中心的数据根据情况分类并标识,该标识和对应的标识码对应,代理终端100可以根据发送的指令将数据在独立数据库110、隔离数据库120和共享数据库130之间相互转移,这样既能节省资源,降低成本,又能对安全级别要求较高的数据提供有效的安全保证;为了使本发明具有更大的灵活性,本发明可根据数据安全级别的变化,灵活的变换存储形式,以达到成本和保护两方面的最优。
在本发明实施例中,所述用户权限管理模块210,用于管理管理员用户和终端用户的权限分配;所述认证管理模块220,用于根据所述用户权限管理模块中的管理员用户和终端用户的权限分配来分别验证管理员的权限信息和终端用户的权限信息;所述安全管理模块230,用于对所述安全云计算服务器与所述代理终端之间的会话进行加密,防止被篡改;确保在遇到非法代理终端的攻击的情况下提供安全保护机制;所述云计算管理中心240,用于于管理、维护所述安全云计算服务器。
在发明本实施例中,如图3所示,所述云计算管理中心240,包括通信管理单元241,用于维护所述安全云计算服务器与所述代理终端之间的通信以及信息同步保证信息的一致性,并确保在极端情况下的容灾容错方案的正常运行;会话管理单元242,用于管理、维护所述安全云计算服务器与所述代理终端的会话,确保会话的正常进行;容灾容错单元243,用于在极端情况下提供容灾容错解决方案,管理、维护所述容灾容错解决方案,确保安全云计算服务器的正常工作以及确保代理终端的正常使用以及数据的正常使用;以及日志记录单元244,用于记录操作日志、云中心和代理终端的相关日志。
在本发明实施例中,如图4所示,所述代理终端300,还包括资源调用模块301,用于调用本地的资源进行计算并将计算结果上传至云中心;会话管理模块302,用于管理代理终端与云中心之间的会话,并提供在离线情况下的会话机制保证数据的可用性;备份管理模块303,用于对代理终端的数据信息和应用程序进行备份并将其保存至数据备份模块;对本地的数据和参数进行备份并将其保存至数据存储模块;以及本地认证管理模块304,用于在线状态下的用户认证以及离线状态下的用户验证。在本实施例中,代理终端300在本地硬盘开辟出备份区和数据区,所述备份区用于提供数据信息、应用程序的备份,所述数据区用于提供数据和参数的存储。对于备份区,当代理终端300第一次与云中心
正常通信时,备份区会自动备份数据信息和应用程序,在后续使用中若发现有变更则自动进行更新;若出现通信异常或网络中断,代理终端会自动重启并调用备份区的数据信息和应用程序;对于数据区,当代理终端300使用应用程序时,数据和参数会自动保存在数据区并实时更新,并将数据和参数上传至云中心;若出现通信异常或网络中断,则只更新数据和参数而不上传,待通信正常后再进行上传。
在本发明实施例中,如图5所示,所述代理终端300与所述云中心100之间设置有通信状态监控模块400,所述通信状态监控模块400用于监控所述代理终端300与所述云中心100之间的通信状况,进一步保证了系统的安全性。
上述发明实施例提供的安全云计算系统,采用独立数据库、隔离数据库和共享数据库三种架构的数据存储形式,能根据数据安全级别的高低,选择存储形式,既能节省资源,降低成本,又对数据存储提供了有效的安全保证;同时,通过身份验证的方式、有效地解决了云计算终端防护措施薄弱造成用户信息泄露的状况,防止了身份失密、数据窃取、信息丢失等多方面的安全隐患,以及在出现通信异常或网络中断的情况下可使用本地端备份区数据信息和本地端数据区的数据和参数,防止极端情况下用户数据信息丢失。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。
Claims (9)
- 一种安全云计算系统,其特征在于,包括:云中心、安全云计算服务器和代理终端,所述云中心与所述安全云计算服务器连接,所述代理终端安装在所述安全云计算服务器上且与所述云中心建立通讯连接,所述云中心包括独立数据库、隔离数据库和共享数据库,所述独立数据库、隔离数据库和共享数据库之间设有传输信道,所述独立数据库、隔离数据库和共享数据库之间通过传输信道两两数据交互;所述安全云计算服务器包括用户权限管理模块、认证管理模块、安全管理模块以及云计算管理中心;所述代理终端包括数据备份模块和数据存储模块。
- 如权利要求1所述的安全云计算系统,其特征在于,所述安全云计算服务器,还包括:数字证书运算存储IC模块和指纹验证模块,所述数字证书运算存储IC模块分别与所述用户权限管理模块、所述认证管理模块和所述安全管理模块连接;所述指纹验证模块与所述数字证书运算存储IC模块连接。
- 如权利要求1所述的安全云计算系统,其特征在于,所述独立数据库、隔离数据库和共享数据库中分别设有一个标识码,所述代理终端把要传输至云中心的数据根据情况分类并标识,该标识和对应的标识码对应。
- 如权利要求1所述的安全云计算系统,其特征在于,所述用户权限管理模块,用于管理管理员用户和终端用户的权限分配;所述认证管理模块,用于根据所述用户权限管理模块中的管理员用户和终端用户的权限分配来分别验证管理员的权限信息和终端用户的权限信息;所述安全管理模块,用于对所述安全云计算服务器与所述代理终端之间的会话进行加密,防止被篡改;确保在遇到非法代理终端的攻击的情况下提供安全保护机制;所述云计算管理中心,用于于管理、维护所述安全云计算服务器。
- 如权利要求1或4所述的安全云计算系统,其特征在于,所述云计算管理中心,包括:通信管理单元,用于维护所述安全云计算服务器与所述代理终端之间的通信以及信息同步保证信息的一致性,并确保在极端情况下的容灾容错方案的正常运行;会话管理单元,用于管理、维护所述安全云计算服务器与所述代理终端的会话,确保会话的正常进行;容灾容错单元,用于在极端情况下提供容灾容错解决方案,管理、维护所述容灾容错解决方案,确保安全云计算服务器的正常工作以及确保代理终端的正常使用以及数据的正常使用;以及日志记录单元,用于记录操作日志、云中心和代理终端的相关日志。
- 如权利要求1所述的安全云计算系统,其特征在于,所述代理终端,还包括:资源调用模块,用于调用本地的资源进行计算并将计算结果上传至云中心;会话管理模块,用于管理代理终端与云中心之间的会话,并提供在离线情况下的会话机制保证数据的可用性;备份管理模块,用于对代理终端的数据信息和应用程序进行备份并将其保存至数据备份模块;对本地的数据和参数进行备份并将其保存至数据存储模块;以及本地认证管理模块,用于在线状态下的用户认证以及离线状态下的用户验证。
- 如权利要求1所述的安全云计算系统,其特征在于,所述数字证书运算存储IC 模块用于产生唯一设备序号。
- 如权利要求7所述的安全云计算系统,其特征在于,所述指纹验证模块用于根据所述数字证书运算存储IC 模块产生的设备序号验证用户身份。
- 如权利要求1所述的安全云计算系统,其特征在于,所述代理终端与所述云中心之间设置有通信状态监控模块,所述通信状态监控模块用于监控所述代理终端与所述云中心之间的通信状况。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/091585 WO2019006637A1 (zh) | 2017-07-04 | 2017-07-04 | 一种安全云计算系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/091585 WO2019006637A1 (zh) | 2017-07-04 | 2017-07-04 | 一种安全云计算系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019006637A1 true WO2019006637A1 (zh) | 2019-01-10 |
Family
ID=64950526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/091585 WO2019006637A1 (zh) | 2017-07-04 | 2017-07-04 | 一种安全云计算系统 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019006637A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111885210A (zh) * | 2020-08-10 | 2020-11-03 | 上海上实龙创智能科技股份有限公司 | 一种基于最终用户环境的云计算网络监控系统 |
CN113420343A (zh) * | 2021-07-15 | 2021-09-21 | 江苏晟晖信息科技有限公司 | 大数据网络环境下的云计算数据安全防护系统 |
CN113672972A (zh) * | 2021-07-01 | 2021-11-19 | 国网浙江省电力有限公司建设分公司 | 一种基于中台的重要资产安全监控方法 |
CN114757582A (zh) * | 2022-05-19 | 2022-07-15 | 北京奥康达体育产业股份有限公司 | 一种基于云计算的体育设施智慧管理系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030475A1 (en) * | 2010-08-02 | 2012-02-02 | Ma Felix Kuo-We | Machine-machine authentication method and human-machine authentication method for cloud computing |
CN104092728A (zh) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | 一种安全云计算系统 |
CN104468106A (zh) * | 2013-09-17 | 2015-03-25 | 上海俊悦光纤网络科技有限公司 | 一种云计算终端认证方法 |
CN105450636A (zh) * | 2015-11-06 | 2016-03-30 | 长春智信创联科技有限公司 | 一种云计算管理系统及云计算管理系统的管理方法 |
-
2017
- 2017-07-04 WO PCT/CN2017/091585 patent/WO2019006637A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030475A1 (en) * | 2010-08-02 | 2012-02-02 | Ma Felix Kuo-We | Machine-machine authentication method and human-machine authentication method for cloud computing |
CN104468106A (zh) * | 2013-09-17 | 2015-03-25 | 上海俊悦光纤网络科技有限公司 | 一种云计算终端认证方法 |
CN104092728A (zh) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | 一种安全云计算系统 |
CN105450636A (zh) * | 2015-11-06 | 2016-03-30 | 长春智信创联科技有限公司 | 一种云计算管理系统及云计算管理系统的管理方法 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111885210A (zh) * | 2020-08-10 | 2020-11-03 | 上海上实龙创智能科技股份有限公司 | 一种基于最终用户环境的云计算网络监控系统 |
CN113672972A (zh) * | 2021-07-01 | 2021-11-19 | 国网浙江省电力有限公司建设分公司 | 一种基于中台的重要资产安全监控方法 |
CN113672972B (zh) * | 2021-07-01 | 2024-04-05 | 国网浙江省电力有限公司建设分公司 | 一种基于中台的重要资产安全监控方法 |
CN113420343A (zh) * | 2021-07-15 | 2021-09-21 | 江苏晟晖信息科技有限公司 | 大数据网络环境下的云计算数据安全防护系统 |
CN114757582A (zh) * | 2022-05-19 | 2022-07-15 | 北京奥康达体育产业股份有限公司 | 一种基于云计算的体育设施智慧管理系统 |
CN114757582B (zh) * | 2022-05-19 | 2022-11-15 | 北京奥康达体育产业股份有限公司 | 一种基于云计算的体育设施智慧管理系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021203733A1 (zh) | 电力边缘网关设备及基于该设备的传感数据上链存储方法 | |
CN112583802B (zh) | 基于区块链的数据共享平台系统、设备以及数据共享方法 | |
WO2019006637A1 (zh) | 一种安全云计算系统 | |
CN107197041A (zh) | 一种安全云计算系统 | |
CN105656902A (zh) | 一种基于光传输的单向可靠传输及控制系统 | |
CN103761600A (zh) | 一种电子政务综合应用平台及方法 | |
CN102195930B (zh) | 设备间安全接入方法和通信设备 | |
CN107295312A (zh) | 一种基于ssl vpn的无线视频安全接入系统 | |
CN113596009A (zh) | 零信任访问方法、系统、零信任安全代理、终端及介质 | |
CN103237059B (zh) | 交通信息数据与命令交互方法 | |
CN109842624A (zh) | 一种交换机安全代理通信方法及系统 | |
CN112929180A (zh) | 一种Kubernetes零信任网络安全系统及其实现方法 | |
WO2021096001A1 (ko) | 프라이빗 블록체인 기반 모바일 디바이스 관리 방법 및 시스템 | |
CN201491036U (zh) | 主机监控与审计系统 | |
CN114866346A (zh) | 一种基于分散式的密码服务平台 | |
CN209086928U (zh) | 一种数据库审计的部署结构 | |
CN112311555A (zh) | 一种企业信息监测校核系统和方法 | |
CN116647326A (zh) | 基于区块链的嵌入式网关系统 | |
CN114448748B (zh) | 一种系统中心部署化网络系统 | |
US20230198738A1 (en) | Method to eliminate clock synchronization from undesired clock sources | |
CN109120619A (zh) | 一种计算机网络通信系统 | |
CN104580997A (zh) | 一种视频监控管理系统 | |
CN107104963B (zh) | 面向云环境多租户网络的可信控制器架构及其操作方法 | |
Ji | Strategic Analysis and Research of Network Communication Security in the Age of Big Data | |
CN110611594A (zh) | 特权系统多路访问与故障切换主节点的方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17916968 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17916968 Country of ref document: EP Kind code of ref document: A1 |