Cloud data security protection method

A data security and cloud technology, applied in electrical components, transmission systems, etc., can solve the problems of using leaked cloud data, protection loopholes, unauthorized access by tenants, etc., to improve security, realize security protection, and solve user privacy leakage. Effect

Inactive Publication Date: 2015-07-08
INSPUR GROUP CO LTD
5 Cites 32 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] With the development of cloud computing, data is stored in the cloud, and data security has become the most worrying issue for users. It mainly focuses on two aspects: one is to worry about illegal viewing, use or disclosure of cloud data by cloud operators or cloud operation and maintenance personnel; the other is to worry about Other tenants have unauthorized access to their own data, or worry that after data migration or service cancellation under the tenant’s usage mode, the tenant’s data will not be deleted completely, causing key data leakage risks
[000...
View more

Method used

As shown in accompanying drawing 1, cloud data security protection method of the present invention is through measures such as cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention and service firewall, deep protection cloud data security, can operate from Four layers of system layer, logical storage layer, data layer, and data service layer realize all-round security protection for cloud data.
Cloud host security enhancement suite can improve server host self security, utilizes mandatory access control technology to realize the security reinforcement functions such as access control, security mark, file integrity detection, system resource monitoring of process; Cloud host security enhancement suite passes cloud The data security management platform conducts centralized ma...
View more

Abstract

The invention discloses a cloud data security protection method, and belongs to the field of data security. The cloud data security protection method comprises the steps that the leakage protection to cloud data is achieved through data leakage protection; through cloud multi-tenant data security isolation, the leakage prevention of multi-tenant data is achieved, and the problem that a service provider manager views, interpolates and deletes user sensitive data without being authorized is solved; the self-security of a server host is promoted through cloud host security enhancement measures; malicious attack detection, service unified authorization and access control, service request identification and service parameter security check of data services are conducted through a service firewall suite, the security protection to big data is achieved, and the problem of user privacy leakage is solved. Compared with the prior art, according to the cloud data security protection method, all-dimensional security protection to the cloud data can be achieved from four levels, namely, the operation system level, the logical storage level, the data level and the data service level, and the cloud data security protection method has good application and popularization value.

Application Domain

Transmission

Technology Topic

AuthorizationSecurity enhancement +11

Image

  • Cloud data security protection method

Examples

  • Experimental program(1)
  • Effect test(1)

Example Embodiment

[0021] Examples:
[0022] As attached figure 1 As shown, the cloud data security protection method of the present invention deeply protects the security of cloud data through cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention, and service firewall. It can protect cloud data security from the operating system layer, logical storage layer, The four levels of data layer and data service layer realize all-round security protection of cloud data.
[0023] The cloud data security protection method proposed by the present invention can be implemented by four types of security suites: cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention and service firewall.
[0024] The service firewall uses service access control technology to realize the security management and control of data services and the protection of service availability. Mainly by the service interface interception, strong authentication and authorization, protocol compliance check, attack filtering, unified security audit and authorization library, strategy library and other modules.
[0025] The service firewall is deployed in the PaaS platform of the cloud data center in the form of software, and completes the function of service access control by intercepting application requests for services.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Multifunctional carry-on power supply

InactiveCN101202462Aimprove securityIncrease charging capacity
Owner:NANKAI UNIV

Classification and recommendation of technical efficacy words

  • Solve user privacy leakage
  • improve security

Video acquisition method for privacy protection and corresponding playing method thereof

PendingCN114422117ASolve user privacy leakageAvoid Key Disclosure or Loss
Owner:杭州宇链科技有限公司

Trajectory data collection method and system meeting local differential privacy

PendingCN114091100ASolve user privacy leakage
Owner:BEIJING UNIV OF POSTS & TELECOMM

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products