Cloud resource pool data security detection method and system

A data security and detection method technology, applied in the field of information security, to achieve the effect of flexible system framework and good scalability

Inactive Publication Date: 2017-05-31
AKSU PREFECTURE BRANCH OF CHINA MOBILE GRP XINJIANG
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no technical protection and monitoring for the security of medium and sensitive data in the cloud resource pool environment. For the transmission, storage and data protection of sensitive data in the virtual resource pool, a complete construction plan is urgently needed to realize the security of sensitive data. Security Protection and Monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud resource pool data security detection method and system
  • Cloud resource pool data security detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples and accompanying drawings. As a limitation of the present invention.

[0057] In the cloud resource pool, virtual hosts are dynamically generated using shared resources. There is a possibility that data is not erased before sharing, data is not encrypted for transmission, and sensitive data may be leaked through data monitoring and recovery technologies. Realize the full life cycle security management and control of the creation, production, use, and destruction of all kinds of sensitive data in the cloud computing environment, such as the retrieval and transmission of intra-domain and cross-domain virtual machine business data, and the creation, production, use, and destruction of various sensitive data during the migration process. Monitor what kind of sensitive data is invol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud resource pool data security detection method comprising the steps of acquiring established sensitive data; acquiring export data drained from a cloud resource pool; scanning and recognizing the sensitive data in the export data; building a sensitive data life cycle, and hierarchically managing the sensitive data; capturing a host virtual machine of the sensitive data in a cloud resource environment, and monitoring traffic of the virtual machine; and analyzing the sensitive data and abnormal operation behaviors of the host virtual machine of the sensitive data, and giving an alarm. In addition, the invention also provides a cloud resource pool sensitive data security detection system comprising a control module, a collection module, a processing module, a supervising module and an auditing module. By using the method provided by the invention, a full life cycle security control on links such as building, generation, utilization and destroying of various kinds of sensitive data during business data calling and transmission, and business interaction and migration processes under the cloud computing environment is achieved, and thus abnormal and illegal behaviors can be found.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a cloud resource pool data security detection and protection system and a method thereof. Background technique [0002] The main difference between cloud resource pool and traditional platform construction in terms of system composition is that resources are virtualized to form a unified resource pool, which simplifies resource configuration and management, improves hardware utilization, and realizes the flexibility and elasticity of cloud computing. The introduction of the virtual layer makes the security protection system with access control as the core very different from the traditional business platform construction protection system. In addition to traditional host security, network security, etc., it also needs to include special virtualization security in cloud computing. . [0003] In the cloud resource pool, CRM and other business system hosts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1425H04L67/10
Inventor 黎新川林强方艺窦胜军
Owner AKSU PREFECTURE BRANCH OF CHINA MOBILE GRP XINJIANG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products