Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud data protection method, cloud server, system

A cloud server and cloud data technology, applied in the field of network security, can solve problems such as no solutions, data security threats on the cloud, etc., to achieve the effect of improving security and enhancing protection

Active Publication Date: 2022-04-08
ZHEJIANG DAHUA TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security protection methods for program loading and file reading and writing on the cloud server in related technologies are mainly for protection against intrusions outside the system, for example, to authenticate visitors; malicious behaviors from inside the cloud server system are still It will pose a security threat to data on the cloud. For example, an intruder can easily access files on the cloud server after obtaining administrator rights; the administrator of the cloud server can also read and write all important files deployed on the cloud
[0003] In related technologies, there is no effective solution to the problem of illegally accessing data on the cloud by using the identity of the system or device administrator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data protection method, cloud server, system
  • Cloud data protection method, cloud server, system
  • Cloud data protection method, cloud server, system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0044] The kernel-based cloud data protection method provided by this application, figure 1 It is a schematic diagram of an application scenario of a kernel-based cloud data protection method according to an embodiment of the present invention, the above method can be applied to such as figure 1shown in the application environment. Wherein, the cloud server 102 communicates with the cloud management machine 104 through the network. Wherein, the cloud server 102 is a program acting as a virtual computer running on the operating system of the management machine 104 in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a kernel-based cloud data protection method, cloud server, system, computer equipment and storage medium, the method includes: the kernel program of the cloud server obtains a security policy and takes over the file operation function of the cloud server, wherein the security policy The permission array in is the corresponding relationship between the process and the folder permission. Obtain the first process identification number of the first process, query the permission array, and judge whether the first process identification number exists in the permission array. If so, judge the first process identification number. Whether the folder is a folder that is allowed to be accessed by the first process identification number, and if so, the file operation function allows the first process to operate on the first folder. According to the above method, the file operation authority can be separated from the administrator authority, and only associated with the user, which enhances the protection of the data on the cloud and improves the security of the data on the cloud.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a kernel-based cloud data protection method, cloud server, system, computer equipment and storage medium. Background technique [0002] With the development of network technology, cloud storage technology has appeared. At present, many enterprises and individuals have used the cloud to store data on a large scale. The information security of these cloud data is particularly important. In related technologies, authority control is usually used to Protect important files from illegal access. In addition, various encryption technologies are also applied to encrypt important files to protect the plaintext of important files from being obtained maliciously. However, the security protection methods for program loading and file reading and writing on the cloud server in related technologies are mainly for protection against intrusions outside the system, for example, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2141
Inventor 赵树升
Owner ZHEJIANG DAHUA TECH CO LTD