Cloud database security audit method based on Docker virtualization

A security audit and database technology, applied in the field of cloud database security audit based on Docker virtualization, can solve problems such as immature technology, and achieve the effect of improving security and ensuring security

Inactive Publication Date: 2017-12-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Coupled with immature technology, cloud databases still have some flaws in terms of security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud database security audit method based on Docker virtualization
  • Cloud database security audit method based on Docker virtualization
  • Cloud database security audit method based on Docker virtualization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0032] The technical scheme that the present invention solves the problems of the technologies described above is:

[0033] figure 1 It is a schematic diagram of a network architecture in related technologies, see figure 1 , There are multiple database images configured in the Docker container, such as MySQL, Redis, MongoDB, etc. Download the Linux image in the Docker public warehouse, load the login and audit platform, repackage and enable it. Each client needs to access the above-mentioned database through the platform, so as to realize the audit of the access of each client.

[0034] Take the MySQL database as an example. When client 1 accesses the MySQL database in Docker, it can send a request me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud database security audit method based on Docker virtualization. The method comprises the following steps: S1, receiving a database name to be accessed and user login information; S2, analyzing the received user input information to obtain a user login account password, a database address and the database name, and generating a database connection instruction according to the information; S3, invoking the database connection instruction, and verifying the user login information; S4, starting a security audit module, monitoring a data stream between a user and a database container between the user and a cloud database to obtain a data source, analyzing requests of the user, and distinguishing a normal request from a malicious request so as to realize secure audit of the cloud database; and S5, operating the database by the user, if user authentication is successful, establishing a stable connection with the security audit module, and operating the database through the security audit module. The method improves the security.

Description

technical field [0001] The invention belongs to the field of cloud database security, in particular to a cloud database security audit method based on Docker virtualization. Background technique [0002] Docker is a virtualization technology built on top of LXC (Linux Container) and is a lightweight virtualization solution based on process containers. Docker uses the Docker container as the basic unit of resource segmentation and scheduling, and encapsulates the entire software runtime environment, allowing developers to package their applications and dependent packages into a portable container, and then publish it to any popular Linux machine. The container fully uses the sandbox mechanism, does not depend on any language, framework, or system, and will not have any interfaces with each other. There is almost no performance overhead and can be easily run in data centers. [0003] The container-based cloud database technology represented by Docker is currently a hot spot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/0631H04L63/02H04L63/0218H04L63/0815H04L63/083H04L63/0876H04L63/10H04L63/1466H04L67/1095H04L67/1097
Inventor 杜江陈雷行
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products