Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety isolation method for cloud side multi-tenant data storage

A data storage and security isolation technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve tenants' unauthorized access, illegal viewing, hidden dangers of data leakage, etc., to solve unauthorized viewing and improve security performance, and the effect of ensuring safety

Inactive Publication Date: 2014-10-15
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of cloud computing and changes in business models, "data" is the cornerstone of survival, with a wide variety, complex applications, and frequent leaks. Data security issues have become increasingly prominent. Data security in the cloud has become the most important issue for users. The concerns mainly focus on two aspects: one is worrying about cloud operators or cloud operation and maintenance personnel illegally viewing, using or leaking cloud data; the other is worrying about other tenants’ unauthorized access to their own data, or worrying about data migration under the tenant’s usage mode Or after the service is cancelled, the deletion of tenant data is not complete, causing key data leakage risks
At present, there are many types of data security products in the domestic and foreign markets, mainly to solve traditional data security problems, and the multi-tenant data security problems brought about by cloud computing need to be dealt with urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety isolation method for cloud side multi-tenant data storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The cloud multi-tenant data storage security isolation method of the present invention will be described in detail below with reference to the accompanying drawings.

[0012] When cloud tenant A wants to access 1G data, first encrypt the private data through the key mechanism of the multi-tenant data storage To the cloud data center, the cloud storage software slices the data according to a specific algorithm. For example, if each slice is 128M in size, the data will be divided into 8 parts, and then the data will be transmitted to isolated spaces scattered in different physical locations. . When a tenant reads or queries data, after the cloud storage server passes the identity verification, the tenant completes operations such as querying, reading or deleting data through the virtual view provided by the distributed storage manager, and then the distributed storage manager passes through the virtual view provided by the device. record table, perform corresponding oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety isolation method for cloud side multi-tenant data storage. According to the safety isolation method for cloud side multi-tenant data storage, isolated distributed storage is applied to multi-tenant data storage, when a tenant applies for a data storage space, storage software API provided by an operator is called, a specific virtual storage area is provided for the tenant through division according to the ID of the tenant, the storage area of each tenant is relatively independent and isolated, and when a tenant uses private data, the distributive storage software collects tenant data from a private space in a disk array on the physical layer according to the ID of the user and provides a data service for the tenant in a concentrated mode; for each tenant, the data isolated distributed storage process is automatically completed by a system, transparent encryption and decryption is conducted on the volume levels, of cloud side multi-tenant data, in the storage disk array on the physical layer, safety isolation of the multi-tenant data in the cloud computing environment is achieved, and the problem that a cloud service provider administrator views, tampers and deletes sensitive data of the tenants without authorization is solved.

Description

technical field [0001] The present invention relates to the technical field of computer applications, in particular to a cloud multi-tenant data storage security isolation method. Background technique [0002] With the rapid development of cloud computing and changes in business models, "data" is the cornerstone of survival, with a wide variety, complex applications, and frequent leaks. Data security issues have become increasingly prominent. Data security in the cloud has become the most important issue for users. The concerns mainly focus on two aspects: one is worrying about cloud operators or cloud operation and maintenance personnel illegally viewing, using or leaking cloud data; the other is worrying about other tenants’ unauthorized access to their own data, or worrying about data migration under the tenant’s usage mode Or after the service is cancelled, the deletion of tenant data is not complete, causing key data leakage risks. At present, there are many types of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/08
Inventor 赵媛蔡一兵宋桂香
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products