Cloud data security protection method
A data security and cloud technology, applied in electrical components, transmission systems, etc., can solve the problems of using leaked cloud data, protection loopholes, unauthorized access by tenants, etc., to improve security, realize security protection, and solve user privacy leakage. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0021] Examples:
[0022] As attached figure 1 As shown, the cloud data security protection method of the present invention deeply protects the security of cloud data through cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention, and service firewall. It can protect cloud data security from the operating system layer, logical storage layer, The four levels of data layer and data service layer realize all-round security protection of cloud data.
[0023] The cloud data security protection method proposed by the present invention can be implemented by four types of security suites: cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention and service firewall.
[0024] The service firewall uses service access control technology to realize the security management and control of data services and the protection of service availability. Mainly by the service interface interception, strong authentication ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap