如何访问云服务器 [英] how to access cloud server

查看:121
本文介绍了如何访问云服务器的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

朋友们,
我想有一个基于云计算的项目.在该项目中,我想使用Windows Azure或Amazon之类的云平台或任何其他服务.

主要概念是我想证明客户端的数据是安全的.服务器或其他任何人都不会更改它.为此,我想应用我的数据验证算法,该算法将在服务器端运行并生成数据证明是否安全,然后将该证明发送给客户端,然后由客户端检查该证明是否正确.

因此,在我的项目中,我想访问服务器,这意味着我想在服务器中部署我的项目,并且当任何客户端请求检查其数据时,服务器将执行该项目.

是否有任何方法或API可以将我的项目部署到azure的服务器中并在其中运行,或者有任何方法或方法可以帮助我完成我想要的基本指南.

我有一个创建自己的平台的想法,那就是创建一个服务器客户端应用程序并将其用作cloud.是否可以?


谢谢,请帮助我.

Hi friends,
I want to have a project and it is based on cloud computing. In that project I want to use cloud platform like Windows Azure or Amazon or any other service.

The main concept is I want to prove the the data of client is secure ie. it is not getting changed by server or anyone else. For that I want to apply my algorithm of data verification which will run on server side & generate a proof of data is secure or not & send that proof to client & then client check whether that prove is true or not.

So in my project I want to access the server, I mean I want to deploy my project in server & server will execute that project when any client request for checking proof his data.

Is there any method or any API to deploy my project in azure''s server & run on there or can any one help me for this a basic guide line I want.

I have one idea to create my one platform means creating a server client application & use it as cloud.is it possible?


Please help me, thanks.

推荐答案

我认为您是在谈论简单的哈希要求.

在写clound时
1)您保留要发送到服务器的数据
2)您会根据此数据生成哈希值
3)您将数据和哈希写入服务器

从云端读取时
4)您读取了数据
5)您重新生成哈希值
6)您将新哈希与存储的哈希进行比较
7)如果哈希匹配,则数据不会更改;如果哈希不匹配,则数据或存储的哈希已被修改

之所以有效,是因为只有您知道如何推导哈希值以及所使用的所有秘密盐.除非对方知道您如何做以及您使用什么盐,否则几乎不可能远程修改数据并能够重新生成正确的哈希值.
I think you are talking about a simple Hash requirement.

When writing to the clound
1) You hold the data to be sent to the server
2) You generate a hash based on this data
3) You write the data and the hash to the server

When reading from the cloud
4) You read the data
5) You re-generate the hash
6) You compare new hash with stored hash
7) If the hash match, the data is not changed, if the hash don''t match, the data or the stored hash has been modified

This works because only you know how you derived the hash, and any secret salts used. Probability of a remote party modifying the data and being able to regenerate a correct hash is next to impossible unless they know how you do it and what salt you use.


这篇关于如何访问云服务器的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆