Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data underlay encryption method based on disk drive in cloud computing environment

A cloud computing environment and disk drive technology, applied in computing, electrical digital data processing, computer security devices, etc., can solve problems such as user inconvenience, restriction of user freedom of use, and burdensomeness, and achieve the effect of guaranteeing privacy

Active Publication Date: 2011-04-27
BEIJING 21VIANET DATA CENT
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the user-level encryption tool has a lot of options, it increases the user's operational burden, delays the user's normal data access process, and the user will feel very cumbersome and cumbersome.
[0007] The encrypted file system is indeed transparent to the user, but it has special requirements for the operating system used by the user. Not all operating systems support this encrypted file system, which will limit the user's freedom of use and give User inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data underlay encryption method based on disk drive in cloud computing environment
  • Data underlay encryption method based on disk drive in cloud computing environment
  • Data underlay encryption method based on disk drive in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The invention relates to a disk drive-based data bottom encryption method in a cloud computing environment, which is data encryption based on the disk I / O level. Therefore, here we first elaborate on the disk device driver model of xen. Xen is an open source virtualization product. Xen uses a software layer called a hypervisor to regulate access to real hardware, enabling multiple sub-operating systems (that is, multiple virtual machines) to run on a single computer. Xen virtualization technology is divided into full virtualization and paravirtualization. Correspondingly, the I / O subsystem can be divided into front-end and back-end drive modes, emulation devices and direct distribution devices. Xen refers to the client as a virtual domain (Domain), wherein virtual domain 0 provides system management services for the service domain as an extension of the monitoring program. The monitoring program owns some hardware IO resources such as timer devices, interrupt devices P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption underlay encryption method based on disk drive in the cloud computing environment, comprising the following steps of: (1) granting a page allocated by a memory space to an equipment virtual machine on which a rear-end drive is positioned through a front-end drive by using a grant table; (2) encrypting data in a buffer area by a front end; (3) placing a writing request of a disk into an annular buffer area shared with the rear-end drive and informing the writing request of the rear-end drive through an event channel; (4) after the rear-end drive is awaken, reading a writing disk request in the shared buffer area and mapping the granted page corresponding to the grant table to the own memory space to generate a real disk access request; and (5) after the disk request is finished, releasing the map by the rear-end drive, placing a response in the shared buffer area and simultaneously awaking the front-end drive through the event channel. The invention can ensure that important data stored by the user in a cloud memory are cipher texts and can still provide safety guarantee for private data of the user even if a storage cell is completely exposed.

Description

technical field [0001] The invention relates to a data bottom encryption method based on a disk drive in a cloud computing environment. Background technique [0002] Cloud computing is an Internet-oriented distributed computing service. Cloud storage is a new concept extended and developed from the concept of cloud computing. It refers to the collection of a large number of different types of storage devices in the network through application software through functions such as cluster applications, grid technology, or distributed file systems. A system that works together to provide data storage and business access functions to the outside world. When the core of cloud computing system computing and processing is the storage and management of large amounts of data, a large number of storage devices need to be configured in the cloud computing system, then the cloud computing system will be transformed into a cloud storage system, so cloud storage is a data storage and mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/80
Inventor 牛立新宋卓王鹏胡中沈启龙任海宝徐安
Owner BEIJING 21VIANET DATA CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products