CN103118011B - The method protecting customer data in multi-tenant environment - Google Patents

The method protecting customer data in multi-tenant environment Download PDF

Info

Publication number
CN103118011B
CN103118011B CN201310011059.6A CN201310011059A CN103118011B CN 103118011 B CN103118011 B CN 103118011B CN 201310011059 A CN201310011059 A CN 201310011059A CN 103118011 B CN103118011 B CN 103118011B
Authority
CN
China
Prior art keywords
data
user
app
encryption
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310011059.6A
Other languages
Chinese (zh)
Other versions
CN103118011A (en
Inventor
邱大坤
李颖和
唐舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui tengling Technology Co., Ltd
Original Assignee
HEFEI HUAYUN COMMUNICATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEFEI HUAYUN COMMUNICATION TECHNOLOGY Co Ltd filed Critical HEFEI HUAYUN COMMUNICATION TECHNOLOGY Co Ltd
Priority to CN201310011059.6A priority Critical patent/CN103118011B/en
Publication of CN103118011A publication Critical patent/CN103118011A/en
Application granted granted Critical
Publication of CN103118011B publication Critical patent/CN103118011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method protecting customer data in multi-tenant environment, use the mode that high in the clouds encryption storage+terminal deciphering calculates;Data store on the server, but store in the way of encryption;Key is saved in user's hands;The process of data is at user terminal, and encryption and decryption carries out preventing penetration attack the most on the server.The method protecting customer data in the multi-tenant environment of the present invention, has and can improve the safety of customer data under multi-tenant environment, it is possible to meet the advantages such as use demand disclosed in part data confidentiality another part data simultaneously.

Description

The method protecting customer data in multi-tenant environment
Technical field
A kind of method that the present invention relates to protect customer data in multi-tenant environment.
Background technology
The cloud computing mode of rising in recent years has become as industrial quarters and the focus of academia concern.For storage resource, cloud computing carries out centralized management resource, and one or more clients can be with shared memory systems hardware and software.The approach of this shared hardware and software, can be with far below the independently purchased software and hardware of user at double, it is provided that storage service.Many tenants are that is multiple tenant shares an example, and the existing isolation of data of tenant has again shared, thus the problem solving data storage.Analyzing from framework aspect, it is exactly Multi-Tenant pattern that SaaS (SoftwareasaService, and software i.e. service) is different from the important difference of conventional art.
In traditional multi-tenant architecture (as shown in Figure 3), each tenant uses different virtual mappings or application program, accesses the data base isolated by physics or logical course, and data, during transmission, are encrypted by the way of HTTPS.In traditional multi-tenant architecture, many tenants are in the flow process accessed by APP (Application, application program) as shown in Figure 4.In traditional multi-tenant architecture, there are following three kinds of main schemes in many tenants on the data store.
1) self contained data base.This is the first scheme, one data base of i.e. one tenant, and the user data isolation level of this scheme is the highest, and safety is best, but cost is the highest.Its advantage is: provide independent data base for different tenants, contributes to simplifying the extension design of data model, meets the unique need of different tenant;If there is fault, recover data fairly simple.Its shortcoming is: increases the installation quantity of data base, brings the increase of maintenance cost and acquisition cost therewith.This scheme and traditional client, a sets of data, a set of deployment are similar, and difference is only that software unified plan is in operator there.If faced by is the tenant of the highest data isolation rank of needs such as bank, hospital, can select this pattern, improve the price rented.Relatively low if fixed a price, product walks route at a low price, and this scheme is typically unaffordable for operator.
2) shared data bank, isolated data framework.This is first scheme, and the most multiple or all tenants share Database (data base), but mono-Schema of a Tenant.Its advantage is: provides the isolation of a certain degree of logical data for the tenant that security requirement is higher, is not completely isolated;Each data base can support more tenant's quantity.Its shortcoming is: if there is fault, and data recover relatively difficult, because recovering data base will involve the data of other tenants;If needed across tenant's statistical data, there is certain difficulty.
3) shared data bank, shares data framework.This is that the third scheme, i.e. tenant share same Database, same Schema, but is distinguished the data of tenant in table by TenantID.This is the pattern that degree of share is the highest, isolation level is minimum.Its advantage is: safeguard and acquisition cost is minimum, it is allowed to tenant's quantity that each data base supports is most.Its shortcoming is: isolation level is minimum, and safety is minimum, needs to strengthen the exploitation amount to safety when designing and developing;Data backup and resume is the most difficult, needs by table backup-and-restore one by one.
The problem that the scheme of prior art mainly solves transmission safety at secure context, the storage of DB data is then ensured to integrity and the privacy of data with suitable isolation, but whole system yet suffers from following shortcoming: 1) be capable of identify that for APP and process, data in DB with stored in clear;2) many APP run at same station server, there is the possibility maliciously being permeated, stealing data;3) in the case of usemame/password is cracked, the data in DB can not only be checked, it is also possible to the data in amendment DB.
Under traditional many tenants pattern, user data is saved in data center DB, APP process for convenience, and its data preserved are not encrypted, and the most APP run at same station server, there is the possibility maliciously being permeated, stealing data;In the case of usemame/password is cracked, the data in DB not only can be gone beyond one's commission use, it is also possible to by unauthorized update.
Summary of the invention
The present invention is for avoiding weak point present in above-mentioned prior art, it is provided that the method protecting customer data in multi-tenant environment, to improve the safety of customer data under multi-tenant environment.
The invention provides the method protecting customer data in multi-tenant environment.
The method protecting customer data in multi-tenant environment, it uses the mode that high in the clouds encryption storage+terminal deciphering calculates;Data store on the server, but store in the way of encryption;Key is saved in user's hands;The process of data is at user terminal, and encryption and decryption carries out preventing penetration attack the most on the server.Key in user's hands preserves in the way of USB, can not derive;The method allowing user be manually entered password can also be used, password is protected.
The feature protecting the method for customer data in the multi-tenant environment of the present invention lies also in:
Tenant includes following step in the process accessed by APP:
A. user submits access request to APP;
User is authenticated by b.APP, and user is by after certification, and APP orients DB data base according to user profile;
C.APP does not processes data in service end, and server end only processes the unrelated part of data and this result passback user;APP is sent to subscription client the program being used for processing data, needs user data to be processed also issue subscription client in the way of encryption;
D. in the client of user, the user data received is decrypted by user, then calls the program obtained from server end, processes data;
E. the data-independent part result that the result of data will be sent by the client of user with server end, presents to user jointly;
F. in the client of user, Crypted password preserves with the form of usb;APP, in decrypting process, preferentially obtains the password of USB;
If g. user has amendment to data, being then encrypted in client, encrypted data sends server end, and is saved in user DB.
In described step b, if user is new user, then a new DB data base is opened up in application.
Compared with the prior art, the present invention has the beneficial effect that:
The method protecting customer data in the multi-tenant environment of the present invention; use server end preservation, the mode of client end encryption and decryption under multi-tenant environment; use asymmetric algorithm to meet safety and open demand simultaneously; improve the safety of customer data under multi-tenant environment; also part data confidentiality can be met, use demand disclosed in another part data.
The method protecting customer data in the multi-tenant environment of the present invention, has and can improve the safety of customer data under multi-tenant environment, it is possible to meet the advantages such as use demand disclosed in part data confidentiality another part data simultaneously.
Accompanying drawing explanation
Fig. 1 be the present invention multi-tenant environment in protect the multi-tenant data schematic diagram of method of customer data.
Fig. 2 be the present invention multi-tenant environment in protect the tenant of method of customer data by APP browsing process figure.
Fig. 3 is many tenants application model of the prior art.
Fig. 4 is that the tenant of the many tenants application model in Fig. 3 is by APP browsing process figure.
Below by way of detailed description of the invention, and the invention will be further described to combine accompanying drawing.
Detailed description of the invention
See Fig. 1, the method protecting customer data in multi-tenant environment, use the mode that high in the clouds encryption storage+terminal deciphering calculates;Data store on the server, but store in the way of encryption;Key is saved in user's hands;The process of data is at user terminal, and encryption and decryption carries out preventing penetration attack the most on the server.Key in user's hands preserves in the way of USB, can not derive;The method allowing user be manually entered password can also be used, password is protected.
As in figure 2 it is shown, tenant includes following step in the process accessed by APP:
A. user submits access request to APP;
User is authenticated by b.APP, and user is by after certification, and APP orients DB data base according to user profile;If user is new user, then a new DB data base is opened up in application;
C.APP does not processes data in service end, and server end only processes the unrelated part of data (such as frame part) and this result passback user;APP is sent to subscription client the program being used for processing data, needs user data to be processed (these data are encryptions) also issue subscription client in the way of encryption;Sendaisle uses traditional cipher mode, such as SSL mode;
D. in the client of user, the user data received is decrypted by user, then calls the program obtained from server end, processes data;
E. data-independent part (such as the frame part) result that the result of data will be sent by the client of user with server end, presents to user jointly;
F. in order to preferably ensure safety and the universality of cloud client, in the client of user, Crypted password suggestion preserves with the form of usb;APP, in decrypting process, preferentially obtains the password of USB;The method allowing user be manually entered password can also be used.The store method of password is an ingredient of native system, but is not the essential part of native system.
If g. user has amendment (including the amendment operations such as increase, deletion) to data, being then encrypted in client, encrypted data sends server end, and is saved in user DB.
The data of certain customers need to a certain degree to disclose, and as a example by Dropbox, the data of user are saved in server end, do not allow other people to revise, but allow other people to watch, or part data allow other people to watch, then need using rivest, shamir, adelman encryption.
When user's registration for the first time, user needs to generate a pair public-key cryptography (publickey) and private cipher key (privatekey), provides public-key cryptography to server end, and is preserved by server end, and user preserves private cipher key.User can mention the amendment to double secret key at any time.Owing to private key confidentiality is high, it is recommended that use usb to preserve, and be set to derive.
During user's data modification disclosed to needs, processing procedure is slightly changed, and uses public-key cryptography during deciphering, uses private cipher key during encryption.For need not disclosed data, then using the mode of public key encryption, during deciphering, using private cipher key.
Being authorized to the user watched, its flow process watching data is as follows: 1) user being authorized to watch submits access request to APP;2) after by certification and scope check, the object that APP accesses according to request, obtain the data that DB data base preserves;3) APP obtains data owner and is saved in the public-key cryptography of server end, and uses public-key cryptography to be decrypted data.The subscription client that data after deciphering are sent to be authorized to watch by server end presents to user.

Claims (2)

1. the method protecting customer data in multi-tenant environment, is characterized in that, uses the mode that high in the clouds encryption storage+terminal deciphering calculates;Data store on the server, but store in the way of encryption;Key is saved in user's hands;The process of data is at user terminal, and encryption and decryption carries out preventing penetration attack the most on the server;
Tenant includes following step in the process accessed by APP:
A. user submits access request to APP;
User is authenticated by b.APP, and user is by after certification, and APP orients DB data base according to user profile;
C.APP does not processes data in service end, and server end only processes the unrelated part of data and this result passback user;APP is sent to subscription client the program being used for processing data, needs user data to be processed also issue subscription client in the way of encryption;
D. in the client of user, the user data received is decrypted by user, then calls the program obtained from server end, processes data;
E. the data-independent part result that the result of data will be sent by the client of user with server end, presents to user jointly;
F. in the client of user, Crypted password preserves with the form of usb;APP, in decrypting process, preferentially obtains the password of USB;
If g. user has amendment to data, being then encrypted in client, encrypted data sends server end, and is saved in user DB;
During user's data modification disclosed to needs, during deciphering, use public-key cryptography, during encryption, use private cipher key;For need not disclosed data, then using the mode of public key encryption, during deciphering, using private cipher key;
Being authorized to the user watched, its flow process watching data is as follows: 1) user being authorized to watch submits access request to APP;2) after by certification and scope check, the object that APP accesses according to request, obtain the data that DB data base preserves;3) APP obtains data owner and is saved in the public-key cryptography of server end, and uses public-key cryptography to be decrypted data;The subscription client that data after deciphering are sent to be authorized to watch by server end presents to user.
The method protecting customer data in multi-tenant environment the most according to claim 1, is characterized in that, in described step b, if user is new user, then a new DB data base is opened up in application.
CN201310011059.6A 2013-01-12 2013-01-12 The method protecting customer data in multi-tenant environment Active CN103118011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310011059.6A CN103118011B (en) 2013-01-12 2013-01-12 The method protecting customer data in multi-tenant environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310011059.6A CN103118011B (en) 2013-01-12 2013-01-12 The method protecting customer data in multi-tenant environment

Publications (2)

Publication Number Publication Date
CN103118011A CN103118011A (en) 2013-05-22
CN103118011B true CN103118011B (en) 2016-08-03

Family

ID=48416285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310011059.6A Active CN103118011B (en) 2013-01-12 2013-01-12 The method protecting customer data in multi-tenant environment

Country Status (1)

Country Link
CN (1) CN103118011B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763355B (en) * 2014-01-07 2017-02-01 天地融科技股份有限公司 Cloud data uploading and access control method
CN105446828B (en) * 2014-09-30 2019-05-31 北京金山云网络技术有限公司 A kind of DB Backup, restoration methods, apparatus and system
CN113342827A (en) * 2021-07-01 2021-09-03 广东电网有限责任公司 Power grid data storage method, storage medium and system based on multi-tenant technology

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467421A (en) * 2010-11-19 2012-05-23 深圳市金蝶友商电子商务服务有限公司 Tenant-data-based processing method and computer
CN102833346A (en) * 2012-09-06 2012-12-19 上海海事大学 Storage metadata based security protection system and method for cloud sensitive data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2952778B1 (en) * 2009-11-17 2011-12-23 Thales Sa SECURE DATA TRANSMISSION METHOD AND ENCRYPTION AND ENCRYPTION SYSTEM FOR SUCH TRANSMISSION

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467421A (en) * 2010-11-19 2012-05-23 深圳市金蝶友商电子商务服务有限公司 Tenant-data-based processing method and computer
CN102833346A (en) * 2012-09-06 2012-12-19 上海海事大学 Storage metadata based security protection system and method for cloud sensitive data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
云计算密钥管理框架研究;孙磊,戴紫珊,郭锦娣;《电信科学》;20100930(第9期);第71页 *

Also Published As

Publication number Publication date
CN103118011A (en) 2013-05-22

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
CN103618728B (en) A kind of encryption attribute method at more mechanism centers
US9473467B2 (en) Customer controlled data privacy protection in public cloud
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
US10469253B2 (en) Methods and apparatus for migrating keys
US9020149B1 (en) Protected storage for cryptographic materials
TWI724555B (en) Key management method, security chip, business server and information system
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
CN108701094A (en) The safely storage and distribution sensitive data in application based on cloud
CN103561034A (en) Secure file sharing system
CN102724215A (en) Method for storing user key safely and improving data security of cloud platform based on user login password
CN106027503A (en) Cloud storage data encryption method based on TPM
US9954828B1 (en) Protection of data stored in the cloud
CN105407119A (en) Cloud computing system and method thereof
WO2016130406A3 (en) Protecting sensitive data security
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
Tajadod et al. Microsoft and Amazon: A comparison of approaches to cloud security
CN202455386U (en) Safety system for cloud storage
Vegesna Investigations on Different Security Techniques for Data Protection in Cloud Computing using Cryptography Schemes
CN107453880A (en) A kind of cloud secure storage method of data and system
CN103118011B (en) The method protecting customer data in multi-tenant environment
CN107181589B (en) Bastion machine private key management method and device
WO2016086787A1 (en) Data security encryption method and device
CN104184736B (en) A kind of method and system realizing secure cloud and calculate
CN106790145B (en) A kind of cloud Data Hosting system and cloud Data Hosting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200821

Address after: Room 1103, B1 / F, Hefei Innovation Industrial Park, 800 Wangjiang West Road, hi tech Zone, Hefei City, Anhui Province

Patentee after: Anhui tengling Technology Co., Ltd

Address before: 230088 building B1, building 11, animation and service outsourcing industry base, hi tech Zone, Anhui, Hefei

Patentee before: Hefei Huayun Communication Technology Co.,Ltd.