Safety isolation method for cloud side multi-tenant data storage

A data storage and security isolation technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve tenants' unauthorized access, illegal viewing, hidden dangers of data leakage, etc., to solve unauthorized viewing and improve security performance, and the effect of ensuring safety

Inactive Publication Date: 2014-10-15
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of cloud computing and changes in business models, "data" is the cornerstone of survival, with a wide variety, complex applications, and frequent leaks. Data security issues have become increasingly prominent. Data security in the cloud has become the most important issue for users. The concerns mainly focus on two aspects: one is worrying about cloud operators or cloud operation and maintenance personnel illegally viewing, using or leaking cloud data; the other

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety isolation method for cloud side multi-tenant data storage

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0011] The security isolation method for cloud multi-tenant data storage of the present invention will be described in detail below with reference to the drawings in the specification.

[0012] When cloud tenant A wants to access 1G data, it first encrypts the private data through the key mechanism of the multi-tenant data storage isolation suite as needed. When the tenant virtual machine passes the system security authentication, an SSL encrypted connection is established and the encrypted information is transmitted. In the cloud data center, the cloud storage software divides the data into pieces according to a specific algorithm. For example, if each piece is 128M in size, the data is divided into 8 pieces, and then the data is transferred to different isolated spaces scattered in different physical locations. . When a tenant reads data or queries data, after the cloud storage server passes the identity verification, the tenant completes data query, read or delete operations t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety isolation method for cloud side multi-tenant data storage. According to the safety isolation method for cloud side multi-tenant data storage, isolated distributed storage is applied to multi-tenant data storage, when a tenant applies for a data storage space, storage software API provided by an operator is called, a specific virtual storage area is provided for the tenant through division according to the ID of the tenant, the storage area of each tenant is relatively independent and isolated, and when a tenant uses private data, the distributive storage software collects tenant data from a private space in a disk array on the physical layer according to the ID of the user and provides a data service for the tenant in a concentrated mode; for each tenant, the data isolated distributed storage process is automatically completed by a system, transparent encryption and decryption is conducted on the volume levels, of cloud side multi-tenant data, in the storage disk array on the physical layer, safety isolation of the multi-tenant data in the cloud computing environment is achieved, and the problem that a cloud service provider administrator views, tampers and deletes sensitive data of the tenants without authorization is solved.

Description

technical field [0001] The present invention relates to the technical field of computer applications, in particular to a cloud multi-tenant data storage security isolation method. Background technique [0002] With the rapid development of cloud computing and changes in business models, "data" is the cornerstone of survival, with a wide variety, complex applications, and frequent leaks. Data security issues have become increasingly prominent. Data security in the cloud has become the most important issue for users. The concerns mainly focus on two aspects: one is worrying about cloud operators or cloud operation and maintenance personnel illegally viewing, using or leaking cloud data; the other is worrying about other tenants’ unauthorized access to their own data, or worrying about data migration under the tenant’s usage mode Or after the service is cancelled, the deletion of tenant data is not complete, causing key data leakage risks. At present, there are many types of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/08
Inventor 赵媛蔡一兵宋桂香
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products