Supercharge Your Innovation With Domain-Expert AI Agents!

Tenant-driven security system and method in storage cloud

A tenant, secure technology, applied in the field of cloud computing, which can solve the problem of customers not fully trusting data and so on

Inactive Publication Date: 2016-06-22
INT BUSINESS MASCH CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, even with this security architecture, customers may still not fully trust that their data is safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tenant-driven security system and method in storage cloud
  • Tenant-driven security system and method in storage cloud
  • Tenant-driven security system and method in storage cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention relates generally to cloud computing and, more particularly, to tenant-driven security in storage clouds. In an embodiment, the present invention includes an Intelligent Tenant Drive Security Steward (ITDSS) system that provides control over one or more tenants or customers (eg, companies) of one or more cloud services to share data security. The ITDSS system may include a hard (eg, physical) key assigned to each tenant and a Key Hook Substrate (KHS) with a slot suitable for the corresponding hard key. The ITDSS system may also include a hard key controller or "core ITDSS" located in the KHS, which works together with the hard disk controller of at least one hard disk provided by the cloud service.

[0017] In one implementation, to ensure data security in the cloud service, the hard disk controller defaults to Access is denied until the tenant puts the corresponding hard key in the slot. Once this happens, the KHS and / or hard key controller will...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides tenant-driven security in a storage cloud. One method includes determining whether the tenant has placed a physical key into a slot associated with a hard disk provided by the service provider. The method also includes allowing the tenant to access the hard disk after determining that the tenant has placed the physical key in the slot.

Description

technical field [0001] The present disclosure relates generally to cloud computing, and more specifically, to tenant-driven security in storage clouds. Background technique [0002] Information technology is changing rapidly and is now creating an invisible layer that increasingly touches almost every aspect of business and social life. An emerging computer model called cloud computing addresses the explosive growth of Internet-connected devices and complements the increasing presence of technology in today's world. Cloud computing is a service delivery model for convenient, on-demand networking of shared pools of configurable computing resources (such as networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) Access, the configurable computing resources can be quickly provisioned and released with minimal management costs or minimal interaction with service providers. [0003] Cloud computing is massively scalable, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78
CPCG06F21/80G06F21/78G06F12/1408G06F21/34G06F21/77H04L63/0853H04L63/10
Inventor B·P·加恩S·R·帕蒂尔S·拉马纳桑G·西瓦库马尔M·B·特雷瓦桑
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More