Cloud data security protection method
A data security and cloud technology, applied in electrical components, transmission systems, etc., can solve the problems of using leaked cloud data, protection loopholes, unauthorized access by tenants, etc., to improve security, realize security protection, and solve user privacy leakage. Effect
Inactive Publication Date: 2015-07-08
INSPUR GROUP CO LTD
5 Cites 32 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention discloses a cloud data security protection method, and belongs to the field of data security. The cloud data security protection method comprises the steps that the leakage protection to cloud data is achieved through data leakage protection; through cloud multi-tenant data security isolation, the leakage prevention of multi-tenant data is achieved, and the problem that a service provider manager views, interpolates and deletes user sensitive data without being authorized is solved; the self-security of a server host is promoted through cloud host security enhancement measures; malicious attack detection, service unified authorization and access control, service request identification and service parameter security check of data services are conducted through a service firewall suite, the security protection to big data is achieved, and the problem of user privacy leakage is solved. Compared with the prior art, according to the cloud data security protection method, all-dimensional security protection to the cloud data can be achieved from four levels, namely, the operation system level, the logical storage level, the data level and the data service level, and the cloud data security protection method has good application and popularization value.
Application Domain
Transmission
Technology Topic
AuthorizationSecurity enhancement +11
Image
Examples
- Experimental program(1)
- Effect test(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Foodstuff monitoring method and device
Owner:XIAOMI INC
Cookie-based secure single sign-on method and unified authentication service system thereof
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD
Method, device and system for carrying out service access control on third-party application
Owner:ALIBABA GRP HLDG LTD
Multifunctional carry-on power supply
Owner:NANKAI UNIV
Classification and recommendation of technical efficacy words
- Solve user privacy leakage
- improve security
Video acquisition method for privacy protection and corresponding playing method thereof
PendingCN114422117ASolve user privacy leakageAvoid Key Disclosure or Loss
Owner:杭州宇链科技有限公司
Trajectory data collection method and system meeting local differential privacy
PendingCN114091100ASolve user privacy leakage
Owner:BEIJING UNIV OF POSTS & TELECOMM