Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage security access method based on sandbox technology

A technology of secure access and cloud storage, applied in the field of cloud storage security, can solve problems such as security risks, theft, and leakage of enterprise internal data, and achieve the effect of ensuring safe access

Inactive Publication Date: 2018-06-08
北京京航计算通讯研究所
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the characteristics of distributed and resource pools under the cloud storage architecture also bring great security risks. There are many ways of information leakage during the use of data files in cloud storage, such as Trojan horse virus theft, and users maliciously passing through the network. and external devices to leak internal enterprise data, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage security access method based on sandbox technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0019] In order to solve the problems of the prior art, the present invention provides a cloud storage security access method based on sandbox technology, such as figure 1 Said, the method is applied in the cloud storage environment, implemented based on the access isolation sandbox in the cloud storage environment, and the access isolation sandbox is provided with a cloud storage space and a trusted process module;

[0020] The method comprises the steps of:

[0021] Step 1: After the cloud storage user successfully logs in through the trusted environment, a corresponding access isolation sandbox is automatically created for it, and the cloud storage space corresponding to the user is loaded in it;

[0022] Step 2: O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud storage security, and particularly relates to a cloud storage security access method based on a sandbox technology. The method is applied to a cloud storage environment and implemented based on an access isolation sandbox under the cloud storage environment, and a cloud storage space and a trusted process module are arranged in the access isolation sandbox; compared with the prior art, the cloud storage security access method solves the problem of the cloud storage environment how to access storage resources safely and reliably. The accessisolation sandbox is introduced to restrict the use of trusted processes and cloud storage data and isolate a risk environment and risk processes, and thereby safeguarding the data security access under the cloud storage environment.

Description

technical field [0001] The invention belongs to the technical field of cloud storage security, and in particular relates to a method for secure access to cloud storage based on sandbox technology (Sandbox). storage environment. Background technique [0002] With the in-depth development of the concept of cloud storage, more and more enterprises have begun to build their own cloud storage systems to provide storage services for enterprises. For enterprise units, cloud storage can centralize storage, real-time synchronization and sharing of electronic files on the internal terminal host of the enterprise, and can support mobile and collaborative office, so that the terminal does not keep secrets, and has a very large application prospect. However, the characteristics of distributed and resource pools under the cloud storage architecture also bring great security risks. There are many ways of information leakage during the use of data files in cloud storage, such as Trojan hor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/78G06F21/71
CPCG06F21/71G06F21/78
Inventor 朱英泮张彤李姝梁小英周羽李世成张永静李景田郑春一
Owner 北京京航计算通讯研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products