Movatterモバイル変換


[0]ホーム

URL:


CN110287717A - A kind of data sharing method based on cloud computing - Google Patents

A kind of data sharing method based on cloud computing
Download PDF

Info

Publication number
CN110287717A
CN110287717ACN201910574331.9ACN201910574331ACN110287717ACN 110287717 ACN110287717 ACN 110287717ACN 201910574331 ACN201910574331 ACN 201910574331ACN 110287717 ACN110287717 ACN 110287717A
Authority
CN
China
Prior art keywords
data
cloud computing
total
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910574331.9A
Other languages
Chinese (zh)
Inventor
奚玉良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Yisi Network Technology Co Ltd
Original Assignee
Wenzhou Yisi Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Yisi Network Technology Co LtdfiledCriticalWenzhou Yisi Network Technology Co Ltd
Priority to CN201910574331.9ApriorityCriticalpatent/CN110287717A/en
Publication of CN110287717ApublicationCriticalpatent/CN110287717A/en
Withdrawnlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present invention relates to data sharing method technical fields, especially a kind of data sharing method based on cloud computing includes the following steps: to send data sharing request, Data Detection, data query, data storage, data encryption, data extraction, data deciphering, Information Proofreading and data sharing.The range that the data sharing method based on cloud computing can not only make data acquire is wider more comprehensively, more comprehensive shared data platform can be provided for user, and during shared data, it can ensure the safety of shared data, the case where leaking in the transmission process of shared data is not appeared in, the data sharing method, which also increases, devises Information Proofreading, so as to check userspersonal information, and then safeguard protection effectively is carried out to the data information of user, it effectively avoids the occurrence of shared data and is used or modified by unauthorized party, the case where being more not in illegal leakage.

Description

A kind of data sharing method based on cloud computing
Technical field
The present invention relates to data sharing method technical field more particularly to a kind of data sharing methods based on cloud computing.
Background technique
Cloud computing is the increase, use and delivery mode of related service Internet-based, is usually directed to and passes through internetCome provide dynamic easily extension and often virtualization resource, currently, the used data sharing method under cloud computing environmentSafety is poor, easily makes data information generate the case where divulging a secret during shared, and be unable to ensure individual subscriberData whether obtained safeguard protection, if by unauthorized party use or modify, if illegally leaked.Therefore, for upperProblem is stated, needs to innovate it improvement.
Summary of the invention
The purpose of the present invention is to solve disadvantages existing in the prior art, and a kind of number based on cloud computing proposedAccording to sharing method.
To achieve the goals above, present invention employs following technical solutions:
A kind of data sharing method based on cloud computing is designed, is included the following steps:
S1), send data sharing request: being first arranged between the total data system under user terminal system and cloud computing environment and be used forThe data channel of data transmission, when user, which sends data sharing to the total data system under cloud computing environment, to be requested, data are totalEnjoy the total data system that request can be transferred under cloud computing environment by data channel;
S2), Data Detection: the data for data transmission between the total data system under user terminal system and cloud computing environmentChannel can carry out safety detection to the data sharing solicited message that user sends, using the information of determining transmission as security information, such asFruit is security information, and the total data system under cloud computing environment will receive this data sharing request information, if it is depositingIn the information of security risk, data channel will be masked directly;
S3), data query: the total data system under cloud computing environment is successfully received the request of data sharing transmitted by userWhen, will obtain user instruction, and user inquiring system is set automatically, then send user terminal for inquiry system, work as userAfter the data inquired needed for having input in inquiry system, the total data system under cloud computing environment will start progress data and adoptCollection;
S4), data store: the total storage platform of data can be first arranged in the total data system under cloud computing environment, then can incite somebody to actionS3) in institute collected user demand data storage into the total storage platform of data;
S5), data encryption: when collected user demand data store into data total storage platform after, cloud computing ringThe data of storage can be encrypted in total data system under border;
S6), data are extracted: needed for user needs to extract when shared data, user is first inputted in user inquiring systemKeyword in required shared data, then the data processing server in the total data system under cloud computing environment can receiveThen these keywords can arrange these keywords, handled and be analyzed, and extend multiple and these keys with thisThe relevant data information of word;
S7), data deciphering;
S8), Information Proofreading: after to the decryption of shared data information, the total data system under cloud computing environment can be sent out to user terminalUserspersonal information is sent to check demand, if userspersonal information checks successfully, the total data system under cloud computing environment can be incited somebody to actionShared data transmission is to user terminal, if userspersonal information checks failure, the total data system under cloud computing environment would notBy shared data transmission to user terminal;
S9), data sharing: if userspersonal information checks successfully, user terminal can receive total under cloud computing environmentThe shared data of data system transmission, shared information needed for realizing user, if userspersonal information checks failure, cloud meterUserspersonal information's verification demand can be sent again by calculating the total data system under environment, if continuous all verification failures three times, cloud meterThe total data system calculated under environment will encrypt again shared data, and the data extraction token of user terminal also can be certainlyDynamic failure, if once checking within three times successfully, user terminal, which can receive shared data and realize, to be shared.
Preferably, in S3) in, data acquisition specifically includes following several: text data acquisition, image data acquisition, languageAudio, video data acquisition, O2O | LBS data acquire and use questionnaire investigation, so that the range of data acquisition is widerMore comprehensively, more comprehensive shared data platform can be provided for user.
Preferably, in S4) in, data storage specifically comprises the following steps: first to S3) in collected user demandData carry out compression forms compressed data information, then compressed data information is read out, is parsed, is analyzed, is optimized, classify withAnd information is then extracted and is carried out in the form of binary the storage of data by caching.
Preferably, in S4) in, it specifically includes two kinds of memory spaces in total storage platform: privately owned memory space and publicly-owned depositingStore up space.
Preferably, in S5) in, encryption specifically comprises the following steps: first to storage to the compression in total storage platformData file performs intrusion detection, and firewall is then added on compression data file, to complete to compression data fileSafety encryption.
Preferably, in S7) in, data deciphering specifically comprises the following steps: to input keyword in inquiry system as userWhen carrying out data extraction, the total data system under cloud computing environment can send data to user terminal and extract token, and user uses numberAccording to extracting after token determines and need to carry out data extraction, total data system under cloud computing environment can be to being stored in total storage platformIn encryption shared information be decrypted.
Preferably, in S8) in, the mode of transmission specifically using wireless communication by the way of, and wireless communication specifically include asUnder: short message, wechat and Tencent QQ.
A kind of data sharing method based on cloud computing proposed by the present invention, beneficial effect are: should be based on cloud computingThe range that data sharing method can not only make data acquire is wider more comprehensively, can provide for user more comprehensive sharedData platform, and during shared data, it can be ensured that the safety of shared data does not appear in shared dataThe case where leaking in transmission process, which, which also increases, devises Information Proofreading, so as to userPeople's information is checked, and then effectively carries out safeguard protection to the data information of user, effectively avoids the occurrence of shared dataUsed or modified by unauthorized party, the case where being more not in illegal leakage, ensure that user data safety andThe integrality of shared data.
Specific embodiment
Here is that technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementationExample is only a part of the embodiment of the present invention, instead of all the embodiments.
A kind of data sharing method based on cloud computing, includes the following steps:
S1), send data sharing request: being first arranged between the total data system under user terminal system and cloud computing environment and be used forThe data channel of data transmission, when user, which sends data sharing to the total data system under cloud computing environment, to be requested, data are totalEnjoy the total data system that request can be transferred under cloud computing environment by data channel;
S2), Data Detection: the data for data transmission between the total data system under user terminal system and cloud computing environmentChannel can carry out safety detection to the data sharing solicited message that user sends, using the information of determining transmission as security information, such asFruit is security information, and the total data system under cloud computing environment will receive this data sharing request information, if it is depositingIn the information of security risk, data channel will be masked directly;
S3), data query: the total data system under cloud computing environment is successfully received the request of data sharing transmitted by userWhen, will obtain user instruction, and user inquiring system is set automatically, then send user terminal for inquiry system, work as userAfter the data inquired needed for having input in inquiry system, the total data system under cloud computing environment will start progress data and adoptCollection;
In S3) in, data acquisition specifically includes following several: text data acquisition, image data acquisition, voice and video data are adoptedCollection, O2O | LBS data acquire and use questionnaire investigation, so that the range of data acquisition is wider more comprehensively, it canMore comprehensive shared data platform is provided for user.
S4), data store: the total storage platform of data can be first arranged in the total data system under cloud computing environment, thenIt can be by the data storage of the collected user demand of institute in S3) into the total storage platform of data;
In S4) in, data storage specifically comprises the following steps: first to S3) in the data of collected user demand pressContracting forms compressed data information, is then read out, parses, analyzes, optimizes, classifies and caches to compressed data information, connects, information is extracted to and is carried out in the form of binary the storage of data.
In S4) in, two kinds of memory spaces: privately owned memory space and publicly-owned memory space are specifically included in total storage platform.
S5), data encryption: when collected user demand data store into data total storage platform after, cloud meterThe data of storage can be encrypted in the total data system calculated under environment;
In S5) in, encryption specifically comprises the following steps: first to carry out storage to the compression data file in total storage platformThen firewall is added in intrusion detection on compression data file, to complete to encrypt the safety of compression data file, pass throughThis kind design is not in the case where data information leaks so as to ensure the safety during shared data.
S6), data are extracted: needed for user needs to extract when shared data, user is first in user inquiring systemKeyword in shared data needed for inputting, then the data processing server in the total data system under cloud computing environment can connectReceive these keywords, then these keywords can be arranged, handled and analyzed, and with this extend it is multiple and theseThe relevant data information of keyword;
S7), data deciphering;
In S7) in, data deciphering specifically comprises the following steps: to carry out data extraction when user inputs keyword in inquiry systemWhen, the total data system under cloud computing environment can send data to user terminal and extract token, and it is true that user using data extracts tokenSurely after needing to carry out data extraction, the total data system under cloud computing environment can be shared to the encryption being stored in total storage platformInformation is decrypted.
S8), Information Proofreading: after to the decryption of shared data information, the total data system under cloud computing environment can be to userEnd sends userspersonal information and checks demand, the total data system if userspersonal information checks successfully, under cloud computing environmentCan be by shared data transmission to user terminal, if userspersonal information checks failure, the total data system under cloud computing environment is justIt will not be by shared data transmission to user terminal;
In S8) in, the mode of transmission specifically using wireless communication by the way of, and wireless communication specifically include it is as follows: short message, wechatAnd Tencent QQ, design is increased by Information Proofreading, so as to check userspersonal information, so that it is effectively rightThe data information of user carries out safeguard protection, effectively avoids the occurrence of shared data and is used or modified by unauthorized party, lessThe case where will appear illegal leakage, ensures that the safety of user data and the integrality of shared data.
S9), data sharing: if userspersonal information checks successfully, user terminal can be received under cloud computing environmentTotal data system transmission shared data, shared information needed for realizing user, if userspersonal information check failure,Total data system under cloud computing environment can send userspersonal information again and check demand, if continuous all verification failures three times,Total data system under cloud computing environment will encrypt again shared data, and the data of user terminal extract tokenIt can cease to be in force automatically, if once checking within three times successfully, user terminal, which can receive shared data and realize, to be shared.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and itsInventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

CN201910574331.9A2019-06-282019-06-28A kind of data sharing method based on cloud computingWithdrawnCN110287717A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910574331.9ACN110287717A (en)2019-06-282019-06-28A kind of data sharing method based on cloud computing

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910574331.9ACN110287717A (en)2019-06-282019-06-28A kind of data sharing method based on cloud computing

Publications (1)

Publication NumberPublication Date
CN110287717Atrue CN110287717A (en)2019-09-27

Family

ID=68019487

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910574331.9AWithdrawnCN110287717A (en)2019-06-282019-06-28A kind of data sharing method based on cloud computing

Country Status (1)

CountryLink
CN (1)CN110287717A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111611291A (en)*2020-04-142020-09-01陕西天泽中孚实业有限公司Geographic information fusion sharing and recognition system
CN112987652A (en)*2019-12-022021-06-18智能云科信息科技有限公司Machine tool data acquisition method and device and machine tool data sharing method and device
CN115203136A (en)*2022-09-142022-10-18南方电网调峰调频发电有限公司Artificial intelligence management system based on big data

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112987652A (en)*2019-12-022021-06-18智能云科信息科技有限公司Machine tool data acquisition method and device and machine tool data sharing method and device
CN112987652B (en)*2019-12-022023-01-24智能云科信息科技有限公司 Machine tool data collection method and device, machine tool data sharing method and device
CN111611291A (en)*2020-04-142020-09-01陕西天泽中孚实业有限公司Geographic information fusion sharing and recognition system
CN111611291B (en)*2020-04-142024-10-15陕西天泽中孚实业有限公司Geographic information fusion sharing and identifying system
CN115203136A (en)*2022-09-142022-10-18南方电网调峰调频发电有限公司Artificial intelligence management system based on big data

Similar Documents

PublicationPublication DateTitle
CN103457733B (en)A kind of cloud computing environment data sharing method and system
CN112131564B (en)Method, device, equipment and medium for encrypting data communication
CN104113534B (en)The login system and method for application APP
WO2020237868A1 (en)Data transmission method, electronic device, server and storage medium
CN102271035B (en)Password transmission method and device
CN104378379B (en)A kind of digital content encrypted transmission method, equipment and system
CN111104691A (en)Sensitive information processing method and device, storage medium and equipment
CN115118419B (en)Data transmission method of security chip, security chip device, equipment and medium
CN110891065A (en)Token-based user identity auxiliary encryption method
CN110287717A (en)A kind of data sharing method based on cloud computing
CN109274644A (en) Data processing method, terminal and watermark server
CN105187389A (en)Webpage access method and system based on digital mixed encryption
CN104283686A (en)Digital right management method and system
CN109873819A (en)Method and system for preventing illegal access to server
CN106330968B (en)Identity authentication method and device for access equipment
CN117349895A (en)Block chain-based automobile financial digital archive management method and device
CN106685995B (en)Leakage account data query system based on hardware encryption
TWI422206B (en)Tolerant key verification method
CN115442117A (en) Information processing method, device, equipment and medium
CN110572392A (en)Identity authentication method based on HyperLegger network
KR20130085537A (en)System and method for accessing to encoded files
CN116709325B (en)Mobile equipment security authentication method based on high-speed encryption algorithm
CN110968881A (en)System authentication and data encryption method based on artificial intelligence
CN111010491A (en)Image data transmission method, device and system based on hiding technology
CN116708016A (en)Sensitive data transmission method, server and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication

Application publication date:20190927

WW01Invention patent application withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp