Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for randomly simulating sensitive information in cloud database

A sensitive information and database technology, applied in the field of information security, can solve problems such as sensitive information leakage, and achieve the effect of overcoming simplicity and directness, increasing the cost of attacks, and increasing the cost of attacks

Active Publication Date: 2015-10-07
ZHEJIANG UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the problem of sensitive information leakage in the current cloud database, the present invention provides a method for randomizing sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for randomly simulating sensitive information in cloud database
  • Method for randomly simulating sensitive information in cloud database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following is based on a real attack scenario, combined with figure 1 and figure 2 , the present invention is described in detail through an example of applying the randomized mimicry method.

[0018] like figure 1 As shown, the method of the present invention solidifies or implants the randomized mimetic method into the application layer Nginx gateway corresponding to the server where the cloud database is located. After the attacker sends an HTTP request to the server, the server's HTTP response header and package body will pass through the application layer gateway, randomize the content of the package body, and finally return the fake package body content to the malicious attacker. Specifically include the following steps:

[0019] (1) Provide a configuration interface to the database administrator in the application layer gateway corresponding to the server where the cloud database is located. This interface is used to formulate rules for determining whether...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for randomly simulating sensitive information in a cloud database. By adopting the method, the content of real sensitive information collected by an attacker can be replaced through a random simulating algorithm, the replacing simulated sensitive information is strictly generated according to the format of the context grammar of the real sensitive information, the attacker may take the simulated sensitive information as the real sensitive information, so the cost of attack can be raised to a certain extent. Valid users do not need the sensitive information or need a series of standard authorization processes to get the sensitive information, so the method will not influence valid users during usage.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for randomizing sensitive information in a cloud database. Background technique [0002] At present, with the increasing development of cloud computing technology, many ordinary users will store their personal data and various account passwords and other sensitive information in the cloud databases of large, medium and small enterprises. However, various types of enterprises have uneven technical levels in terms of security, resulting in a large number of loopholes in the architecture and configuration of cloud databases. When malicious attackers resort to certain attack methods (such as SQL injection attacks, crawler attacks, etc.), that is, It is relatively easy to collect sensitive information of users inside the database, causing serious economic losses or leakage of personal privacy to the majority of normal users. [0003] Most of the existing technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6263
Inventor 吴春明邢骏驰
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products