Access mode leakage prevention data safety isolation and sharing realization method

A data security and access mode technology, applied to electrical components, transmission systems, etc., can solve problems such as being hacked, not hiding user access modes, and difficult data sharing between users, so as to achieve the effect of ensuring safe isolation

Inactive Publication Date: 2017-11-10
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing cloud data storage solutions basically do not hide the user's access mode
[0004] When user data is stored on the server, in order to ensure security, it must be encrypted with its own key and then stored, which causes the problem of data sharing among users
[0005] Virtualization technology implements resource pooling. Although resource isolation can be achieved through mechanisms such as SELinux-sVirt, there is still the possibility of being compromised.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access mode leakage prevention data safety isolation and sharing realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Below with reference to shown in accompanying drawing, the present invention is further described by specific embodiment:

[0016] A method for implementing data security isolation and sharing that is resistant to access mode leakage. The method implements data security isolation and sharing with the help of proxy encryption technology on the basis of physical isolation, and changes the original storage form of data. Ensure that the access mode is not disclosed during the data access process, thereby successfully protecting user privacy. The above three parts work together to build a data security isolation and sharing implementation method that resists access mode leakage.

[0017] In order to avoid the risk of resource isolation being breached by mechanisms such as SELinux-sVirt, each department that requires data isolation is allocated one or more independent physical servers to achieve physical isolation and ensure the security isolation of data between departments ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access mode leakage prevention data safety isolation and sharing realization method. According to the method, based on physical isolation, the agent encryption technology is utilized to realize data safety isolation and sharing, an original data storage mode is changed, a binary tree storage mode is utilized to guarantee that an access mode in a data access process is not leaked, and user privacy can be successfully protected. The method is advantaged in that safety risks caused by data sharing among users, attack possibility existing in virtual resource pooling and no user access mode hiding in a cloud data storage scheme can be successfully solved, through agent introduction, the data sharing function among the users in a department is realized, data safety isolation among departments is guaranteed in a physical mode, data storage is realized through employing a binary tree mode, and a user access mode is successfully hidden.

Description

technical field [0001] The invention relates to the technical field of cloud storage security and confidentiality, in particular to a method for implementing data security isolation and sharing against access mode leakage. Background technique [0002] With the popularity of cloud computing, its low cost and other advantages have attracted more and more enterprises. Since user data is no longer controlled by themselves, but stored on cloud servers, users attach great importance to data security, and must enhance the security of data storage and access. [0003] As early as 2010, Pinkas introduced the concept of access mode leakage and the security threats brought about in detail. Through long-term eavesdropping on user behavior, it is possible to grasp the address sequence and follow-up actions of the data received by the user for enough access operations. After analyzing the information, It is found that when a user accesses the data corresponding to a certain address sequ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0281H04L67/1097
Inventor 孙大军孙晓妮元河清刘怀泉李若寒
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products