Safety isolation method for cloud side multi-tenant data storage
A data storage and security isolation technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve tenants' unauthorized access, illegal viewing, hidden dangers of data leakage, etc., to solve unauthorized viewing and improve security performance, and the effect of ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0011] The security isolation method for cloud multi-tenant data storage of the present invention will be described in detail below with reference to the drawings in the specification.
[0012] When cloud tenant A wants to access 1G data, it first encrypts the private data through the key mechanism of the multi-tenant data storage isolation suite as needed. When the tenant virtual machine passes the system security authentication, an SSL encrypted connection is established and the encrypted information is transmitted. In the cloud data center, the cloud storage software divides the data into pieces according to a specific algorithm. For example, if each piece is 128M in size, the data is divided into 8 pieces, and then the data is transferred to different isolated spaces scattered in different physical locations. . When a tenant reads data or queries data, after the cloud storage server passes the identity verification, the tenant completes data query, read or delete operations t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap