Cloud platform data access safety isolation method

A data access and security isolation technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve the problems of data access platform authority and access security isolation, and achieve good security isolation effect

Inactive Publication Date: 2014-12-03
SHANGHAI TRIMAN INFORMATION & TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a cloud platform data access security isolation method to solve the problem of imperfect isolation of data access platform authority and access security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud platform data access safety isolation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0015] In response to the needs of hierarchical administrative departments, there are a large number of users performing different business operations on the same platform at the same time on the information resource management cloud application platform, and the cloud application platform needs to run various applications. However, due to the particularity of the administrative management business, users are required to operate independently without the intersection of data and calculation.

[0016] Therefore, aiming at the requirements of the above-mentioned application and terminal user isolation security, the present invention proposes a layered user isolation technology of one-way pointer of directory mapping. This directory mapping method adopts a one-way pointer tree structure organization. The access right to the syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud platform data access safety isolation method. The method includes the following steps: 1, creating an access-right tree of all users according to different user levels, wherein the access-right tree is of a one-way pointer multilayer tree structure, users with high access rights are positioned on root nodes on low layers, and users with low access rights are positioned on leaf nodes on upper layers; 2, creating different inquiry sentences for the nodes on different layers, wherein the inquiry sentences of the root nodes can downwards inquire data of the leaf nodes at the same time, and the inquiry sentences of the leaf nodes cannot upwards inquire data of the root nodes and cannot inquire data of the nodes on same layers. By adopting the technical scheme, access-right management can be customized for graded administrative departments, so that safety isolation under different access rights during data access is realized better.

Description

technical field [0001] The invention relates to a data access method, and more specifically, to a cloud platform data access security isolation method. Background technique [0002] The most critical issues supporting the platform under the cloud architecture system are the virtualization of computing resources and storage resources, as well as the distribution and call of virtual resources and the balance of distributed computing. With the development of modern information technology, many manufacturers are currently researching and developing a large number of cloud computing and virtualization system products, including network equipment, servers, storage equipment, software products, etc., but these products do not necessarily meet various application requirements. Realization, especially in the current market manufacturers make "cloud computing" products hype. [0003] In addition, for multi-level and multi-user usage scenarios, the existing cloud computing has various...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L29/08
CPCG06F16/2453G06F16/2246G06F16/24537H04L67/025H04L67/06H04L67/08
Inventor 顾永立高念高王战英须秋梦
Owner SHANGHAI TRIMAN INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products