System and method for multi-layered sensitive data protection in a virtual computing environment

a virtual computing environment and multi-layered technology, applied in computing, instruments, electric digital data processing, etc., can solve the problem of heightened security risks of sensitive data

Active Publication Date: 2014-04-03
CA TECH INC
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0002]Provided herein are systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering to guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys

Problems solved by technology

However, because the user's data on the guest virtual machine exists in the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for multi-layered sensitive data protection in a virtual computing environment
  • System and method for multi-layered sensitive data protection in a virtual computing environment
  • System and method for multi-layered sensitive data protection in a virtual computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011]The systems and methods provided herein utilize multiple security layers to protect sensitive information stored within virtual machines from unauthorized access. Not only is protection from within running virtual machines used, but sensitive data is protected outside of the virtual machine environment (i.e., offline protection) for instances wherein, for example, data is copied or moved from one virtual machine to another. Furthermore, traditional sensitive data protection is non-transparent, and in some instances, users need to be aware of protection schemes and specific user associated data for enforcement to occur. Accordingly, the sensitive data protection provided herein combines internal data protection with transparent protection from unauthorized access attempts originating outside an original virtual machine. Additionally, methods for sharing sensitive data on virtual discs with other trusted virtual machines are enabled.

[0012]Accordingly, the systems and methods pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection.

Description

BACKGROUND[0001]When users in virtual computing environments obtain guest virtual machines for their use, protection of sensitive data equal to or above that provided in a traditional computing environment is beneficial. However, because the user's data on the guest virtual machine exists in the cloud environment, certain security risks for sensitive data may be heightened. Data security policies internal to a cloud provider apply to the virtual machine environment only. Accordingly, an intruder may copy the guest virtual machine's virtual disc, mount it on a separate machine and attempt to access the data. Accordingly, the intruder is able to bypass the file protection rules that apply inside the running virtual machine.BRIEF SUMMARY[0002]Provided herein are systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering to guest virtual mach...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24
CPCG06F9/45558G06F21/6218G06F2009/45587G06F2221/2115G06F9/45545G06F21/64
Inventor KORTHNY, ALEXBARAK, NIRJERBI, AMIR
Owner CA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products