Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for customizing database security audit in cloud environment

A security audit and database technology, applied in the computer field, can solve the problem of high operation and maintenance cost of database security audit system

Pending Publication Date: 2021-02-05
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, device, computer equipment, and computer-readable storage medium for customizing database security auditing in a cloud environment, so as to at least solve the problem of high operation and maintenance costs of database security auditing systems in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for customizing database security audit in cloud environment
  • Method for customizing database security audit in cloud environment
  • Method for customizing database security audit in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0098] As an implementable manner, the above-mentioned method also includes:

[0099] Allocating computing resources to the cloud tenant according to the cloud tenant information.

[0100] As an implementable manner, the above-mentioned method also includes:

[0101] Send the audit result to the log storage terminal according to the tenant flag.

[0102] As an implementable manner, before the acquisition of cloud tenant database traffic and cloud tenant information, it also includes:

[0103] Install proxy service on client or cloud.

[0104] As an implementable manner, in the above S3, according to the cloud tenant information, add the tenant flag of the cloud tenant to the log information, and based on the key-value pair information and the Audit the log information and obtain the audit results, which can be achieved in the following ways:

[0105] Based on the payment information in the cloud tenant information, add the tenant logo of the cloud tenant to the log, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a customized database security auditing method and device in a cloud environment, computer equipment and a computer readable storage medium. The method comprises the steps: obtaining the database flow and cloud tenant information of a cloud tenant; analyzing the database flow to obtain log information and key value pair information of the cloud tenant; and according to thecloud tenant information, adding a tenant mark of the cloud tenant into the log information, and auditing the information and the log information with the tenant mark based on the key value to obtainan auditing result. The method can solve the problem of high operation and maintenance cost of a database security auditing system in the related technology, and improving the security of the database security auditing system. Therefore, the cloud tenants do not need to employ security personnel to maintain the database auditing system, so that the operation and maintenance cost is saved.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a method, device, computer equipment and computer-readable storage medium for customizing database security auditing in a cloud environment. Background technique [0002] Database security audit system (DAS, Database security Audit System) is mainly used to monitor and record various operations on the database server, analyze network data in real time and intelligently analyze various operations on the database server, and record Into the audit database for future query, analysis, filtering, to achieve monitoring and auditing of user operations on the target database system. [0003] In related technologies, enterprises that need to use database security audit services need to purchase database security audit systems from security vendors, and need to purchase maintenance services from security vendors and hire specialized security personnel, resulting in high operation and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/21G06F16/28G06F16/25
CPCG06F16/21G06F16/284G06F16/25
Inventor 王飞飞范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD