Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud data security protection method

A data security and cloud technology, applied in electrical components, transmission systems, etc., can solve the problems of using leaked cloud data, protection loopholes, unauthorized access by tenants, etc., to improve security, realize security protection, and solve user privacy leakage. Effect

Inactive Publication Date: 2015-07-08
INSPUR GROUP CO LTD
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of cloud computing, data is stored in the cloud, and data security has become the most worrying issue for users. It mainly focuses on two aspects: one is to worry about illegal viewing, use or disclosure of cloud data by cloud operators or cloud operation and maintenance personnel; the other is to worry about Other tenants have unauthorized access to their own data, or worry that after data migration or service cancellation under the tenant’s usage mode, the tenant’s data will not be deleted completely, causing key data leakage risks
[0003] In the existing technology, data application access control technology is mainly adopted to realize data access control of cloud users to cloud data and applications; tenant data encryption and distributed tenant security storage technology are adopted to solve the problem of multi-tenant data isolation; administrator application security control is adopted technology to realize the audit of key operations of cloud operation and maintenance managers. Although it can protect cloud data to a certain extent, there will still be a large number of protection loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] as attached figure 1 As shown, the cloud data security protection method of the present invention deeply protects the security of cloud data through measures such as cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention, and service firewall. There are four levels of data layer and data service layer to realize all-round security protection for cloud data.

[0023] The cloud data security protection method proposed by the present invention can be realized by four security suites including cloud host security enhancement, cloud multi-tenant data isolation, cloud data leakage prevention and service firewall.

[0024] The service firewall uses service access control technology to realize the security control and service availability protection of data services. It is mainly composed of functional modules such as service interface interception, strong authentication and authorization, protocol compliance check, attack filtering, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data security protection method, and belongs to the field of data security. The cloud data security protection method comprises the steps that the leakage protection to cloud data is achieved through data leakage protection; through cloud multi-tenant data security isolation, the leakage prevention of multi-tenant data is achieved, and the problem that a service provider manager views, interpolates and deletes user sensitive data without being authorized is solved; the self-security of a server host is promoted through cloud host security enhancement measures; malicious attack detection, service unified authorization and access control, service request identification and service parameter security check of data services are conducted through a service firewall suite, the security protection to big data is achieved, and the problem of user privacy leakage is solved. Compared with the prior art, according to the cloud data security protection method, all-dimensional security protection to the cloud data can be achieved from four levels, namely, the operation system level, the logical storage level, the data level and the data service level, and the cloud data security protection method has good application and popularization value.

Description

technical field [0001] The present invention relates to the field of data security, specifically a cloud data security protection method, which is a security protection measure mainly developed for cloud data centers such as governments, military forces, Internet services, telecommunication services, and large enterprises, and is mainly used to ensure The data security of the cloud center solves the problem of loss of confidentiality by background administrators in traditional data collection, solves the problem of isolation of data tenants in cloud multi-tenant applications, and solves the problem of data service loss of confidentiality caused by cloud data service interfaces. Background technique [0002] With the development of cloud computing, data is stored in the cloud, and data security has become the most worrying issue for users. It mainly focuses on two aspects: one is to worry about illegal viewing, use or disclosure of cloud data by cloud operators or cloud operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 赵媛蔡一兵宋桂香
Owner INSPUR GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products