A kind of data sharing method based on cloud computingTechnical field
The present invention relates to data sharing method technical field more particularly to a kind of data sharing methods based on cloud computing.
Background technique
Cloud computing is the increase, use and delivery mode of related service Internet-based, is usually directed to and passes through internetCome provide dynamic easily extension and often virtualization resource, currently, the used data sharing method under cloud computing environmentSafety is poor, easily makes data information generate the case where divulging a secret during shared, and be unable to ensure individual subscriberData whether obtained safeguard protection, if by unauthorized party use or modify, if illegally leaked.Therefore, for upperProblem is stated, needs to innovate it improvement.
Summary of the invention
The purpose of the present invention is to solve disadvantages existing in the prior art, and a kind of number based on cloud computing proposedAccording to sharing method.
To achieve the goals above, present invention employs following technical solutions:
A kind of data sharing method based on cloud computing is designed, is included the following steps:
S1), send data sharing request: being first arranged between the total data system under user terminal system and cloud computing environment and be used forThe data channel of data transmission, when user, which sends data sharing to the total data system under cloud computing environment, to be requested, data are totalEnjoy the total data system that request can be transferred under cloud computing environment by data channel;
S2), Data Detection: the data for data transmission between the total data system under user terminal system and cloud computing environmentChannel can carry out safety detection to the data sharing solicited message that user sends, using the information of determining transmission as security information, such asFruit is security information, and the total data system under cloud computing environment will receive this data sharing request information, if it is depositingIn the information of security risk, data channel will be masked directly;
S3), data query: the total data system under cloud computing environment is successfully received the request of data sharing transmitted by userWhen, will obtain user instruction, and user inquiring system is set automatically, then send user terminal for inquiry system, work as userAfter the data inquired needed for having input in inquiry system, the total data system under cloud computing environment will start progress data and adoptCollection;
S4), data store: the total storage platform of data can be first arranged in the total data system under cloud computing environment, then can incite somebody to actionS3) in institute collected user demand data storage into the total storage platform of data;
S5), data encryption: when collected user demand data store into data total storage platform after, cloud computing ringThe data of storage can be encrypted in total data system under border;
S6), data are extracted: needed for user needs to extract when shared data, user is first inputted in user inquiring systemKeyword in required shared data, then the data processing server in the total data system under cloud computing environment can receiveThen these keywords can arrange these keywords, handled and be analyzed, and extend multiple and these keys with thisThe relevant data information of word;
S7), data deciphering;
S8), Information Proofreading: after to the decryption of shared data information, the total data system under cloud computing environment can be sent out to user terminalUserspersonal information is sent to check demand, if userspersonal information checks successfully, the total data system under cloud computing environment can be incited somebody to actionShared data transmission is to user terminal, if userspersonal information checks failure, the total data system under cloud computing environment would notBy shared data transmission to user terminal;
S9), data sharing: if userspersonal information checks successfully, user terminal can receive total under cloud computing environmentThe shared data of data system transmission, shared information needed for realizing user, if userspersonal information checks failure, cloud meterUserspersonal information's verification demand can be sent again by calculating the total data system under environment, if continuous all verification failures three times, cloud meterThe total data system calculated under environment will encrypt again shared data, and the data extraction token of user terminal also can be certainlyDynamic failure, if once checking within three times successfully, user terminal, which can receive shared data and realize, to be shared.
Preferably, in S3) in, data acquisition specifically includes following several: text data acquisition, image data acquisition, languageAudio, video data acquisition, O2O | LBS data acquire and use questionnaire investigation, so that the range of data acquisition is widerMore comprehensively, more comprehensive shared data platform can be provided for user.
Preferably, in S4) in, data storage specifically comprises the following steps: first to S3) in collected user demandData carry out compression forms compressed data information, then compressed data information is read out, is parsed, is analyzed, is optimized, classify withAnd information is then extracted and is carried out in the form of binary the storage of data by caching.
Preferably, in S4) in, it specifically includes two kinds of memory spaces in total storage platform: privately owned memory space and publicly-owned depositingStore up space.
Preferably, in S5) in, encryption specifically comprises the following steps: first to storage to the compression in total storage platformData file performs intrusion detection, and firewall is then added on compression data file, to complete to compression data fileSafety encryption.
Preferably, in S7) in, data deciphering specifically comprises the following steps: to input keyword in inquiry system as userWhen carrying out data extraction, the total data system under cloud computing environment can send data to user terminal and extract token, and user uses numberAccording to extracting after token determines and need to carry out data extraction, total data system under cloud computing environment can be to being stored in total storage platformIn encryption shared information be decrypted.
Preferably, in S8) in, the mode of transmission specifically using wireless communication by the way of, and wireless communication specifically include asUnder: short message, wechat and Tencent QQ.
A kind of data sharing method based on cloud computing proposed by the present invention, beneficial effect are: should be based on cloud computingThe range that data sharing method can not only make data acquire is wider more comprehensively, can provide for user more comprehensive sharedData platform, and during shared data, it can be ensured that the safety of shared data does not appear in shared dataThe case where leaking in transmission process, which, which also increases, devises Information Proofreading, so as to userPeople's information is checked, and then effectively carries out safeguard protection to the data information of user, effectively avoids the occurrence of shared dataUsed or modified by unauthorized party, the case where being more not in illegal leakage, ensure that user data safety andThe integrality of shared data.
Specific embodiment
Here is that technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementationExample is only a part of the embodiment of the present invention, instead of all the embodiments.
A kind of data sharing method based on cloud computing, includes the following steps:
S1), send data sharing request: being first arranged between the total data system under user terminal system and cloud computing environment and be used forThe data channel of data transmission, when user, which sends data sharing to the total data system under cloud computing environment, to be requested, data are totalEnjoy the total data system that request can be transferred under cloud computing environment by data channel;
S2), Data Detection: the data for data transmission between the total data system under user terminal system and cloud computing environmentChannel can carry out safety detection to the data sharing solicited message that user sends, using the information of determining transmission as security information, such asFruit is security information, and the total data system under cloud computing environment will receive this data sharing request information, if it is depositingIn the information of security risk, data channel will be masked directly;
S3), data query: the total data system under cloud computing environment is successfully received the request of data sharing transmitted by userWhen, will obtain user instruction, and user inquiring system is set automatically, then send user terminal for inquiry system, work as userAfter the data inquired needed for having input in inquiry system, the total data system under cloud computing environment will start progress data and adoptCollection;
In S3) in, data acquisition specifically includes following several: text data acquisition, image data acquisition, voice and video data are adoptedCollection, O2O | LBS data acquire and use questionnaire investigation, so that the range of data acquisition is wider more comprehensively, it canMore comprehensive shared data platform is provided for user.
S4), data store: the total storage platform of data can be first arranged in the total data system under cloud computing environment, thenIt can be by the data storage of the collected user demand of institute in S3) into the total storage platform of data;
In S4) in, data storage specifically comprises the following steps: first to S3) in the data of collected user demand pressContracting forms compressed data information, is then read out, parses, analyzes, optimizes, classifies and caches to compressed data information, connects, information is extracted to and is carried out in the form of binary the storage of data.
In S4) in, two kinds of memory spaces: privately owned memory space and publicly-owned memory space are specifically included in total storage platform.
S5), data encryption: when collected user demand data store into data total storage platform after, cloud meterThe data of storage can be encrypted in the total data system calculated under environment;
In S5) in, encryption specifically comprises the following steps: first to carry out storage to the compression data file in total storage platformThen firewall is added in intrusion detection on compression data file, to complete to encrypt the safety of compression data file, pass throughThis kind design is not in the case where data information leaks so as to ensure the safety during shared data.
S6), data are extracted: needed for user needs to extract when shared data, user is first in user inquiring systemKeyword in shared data needed for inputting, then the data processing server in the total data system under cloud computing environment can connectReceive these keywords, then these keywords can be arranged, handled and analyzed, and with this extend it is multiple and theseThe relevant data information of keyword;
S7), data deciphering;
In S7) in, data deciphering specifically comprises the following steps: to carry out data extraction when user inputs keyword in inquiry systemWhen, the total data system under cloud computing environment can send data to user terminal and extract token, and it is true that user using data extracts tokenSurely after needing to carry out data extraction, the total data system under cloud computing environment can be shared to the encryption being stored in total storage platformInformation is decrypted.
S8), Information Proofreading: after to the decryption of shared data information, the total data system under cloud computing environment can be to userEnd sends userspersonal information and checks demand, the total data system if userspersonal information checks successfully, under cloud computing environmentCan be by shared data transmission to user terminal, if userspersonal information checks failure, the total data system under cloud computing environment is justIt will not be by shared data transmission to user terminal;
In S8) in, the mode of transmission specifically using wireless communication by the way of, and wireless communication specifically include it is as follows: short message, wechatAnd Tencent QQ, design is increased by Information Proofreading, so as to check userspersonal information, so that it is effectively rightThe data information of user carries out safeguard protection, effectively avoids the occurrence of shared data and is used or modified by unauthorized party, lessThe case where will appear illegal leakage, ensures that the safety of user data and the integrality of shared data.
S9), data sharing: if userspersonal information checks successfully, user terminal can be received under cloud computing environmentTotal data system transmission shared data, shared information needed for realizing user, if userspersonal information check failure,Total data system under cloud computing environment can send userspersonal information again and check demand, if continuous all verification failures three times,Total data system under cloud computing environment will encrypt again shared data, and the data of user terminal extract tokenIt can cease to be in force automatically, if once checking within three times successfully, user terminal, which can receive shared data and realize, to be shared.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and itsInventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.