Cloud platform data leakage path identification method based on graph computing technology
A leakage path and identification method technology, applied in the field of computer information systems, can solve the problems of leakage data (lack, inapplicability of logical evaluation range of influence, lack of methods and technical means, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be further described below with reference to the accompanying drawings.
[0025] In order to restore data leakage scenarios caused by operational behaviors on the cloud platform, it is first necessary to identify the relevant behavior paths that lead to data leakage scenarios. The implemented method for identifying data leakage path of cloud platform based on graph computing technology is mainly as follows: figure 1 First, set the data leakage trigger collection, then obtain the event impact path collection, and finally perform the data leakage behavior path search.
[0026] (1) Set the data leakage trigger set
[0027] The identification of data leakage behavior is firstly based on the scenario where the data has been leaked, and the possible triggering behavior is selected according to the data leakage scenario. The method of the present invention is to gradually restore the data leakage scene according to the way that the leakage result a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


