CN104320409A - Method for controlling access to cloud disk on basis of Hook technology - Google Patents

Method for controlling access to cloud disk on basis of Hook technology Download PDF

Info

Publication number
CN104320409A
CN104320409A CN201410628420.4A CN201410628420A CN104320409A CN 104320409 A CN104320409 A CN 104320409A CN 201410628420 A CN201410628420 A CN 201410628420A CN 104320409 A CN104320409 A CN 104320409A
Authority
CN
China
Prior art keywords
access control
cloud dish
cloud
drive
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410628420.4A
Other languages
Chinese (zh)
Other versions
CN104320409B (en
Inventor
何文森
李雪兵
孙付
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201410628420.4A priority Critical patent/CN104320409B/en
Publication of CN104320409A publication Critical patent/CN104320409A/en
Application granted granted Critical
Publication of CN104320409B publication Critical patent/CN104320409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses a method for controlling access to a cloud disk on the basis of the Hook technology. The method comprises the steps that an access control policy allocation module is in charge of collecting cloud disk access control strategies allocated by an administrator, and issuing the cloud disk access control strategies to an access control protection module of each client side; after a cloud disc mounting disc drive informing module is mounted on a cloud disk client side, and the access control protection module is informed of the mounted disc drive name; the access control protection module controls file operations carried out in the corresponding cloud disc drive according to the received cloud disc access control strategies and the received drive name. The method for controlling access to the cloud disk on the basis of the Hook technology has the advantages that protection is carried out on files in the specific cloud disc drive through the Hook technology, the operation processes such as reading, copying, moving and renaming of the files are protected by allocating credible processes and credible expanded names in a combination mode, and the grounding safety problem of cloud terminal files is solved; meanwhile, logs are kept for operations in the cloud disc drive, post audit can be carried out conveniently.

Description

Based on the cloud dish access control method of Hook technology
Technical field
The invention belongs to secure cloud field of storage, be specifically related to a kind of cloud dish access control method based on Hook technology.
Background technology
Hook (hook) is a platform of windows messaging treatment mechanism.It is actually the program segment of a processing messages, pass through system call, it is linked into system, whenever specific message sends, before not arriving object window, hook program just first catches this message, that is Hook Function first obtains control, at this moment namely Hook Function can process process (change) this message, also can not deal with and continue to transmit this message, can also force the transmission of end.
Hook principle: each Hook has a pointer list associated therewith, is referred to as hook chained list, is safeguarded by system.That the pointed of this list is specified, application program definition, to be called by the sub-journey of Hook call back function, each of namely this hook processes sub-journey.When the message with the Hook type association of specifying occurs, system just this Message Transmission to the sub-journey of Hook.The sub-journey of some Hook only can monitor message, or amendment message, or stops the advance of message, avoids these Message Transmission to the sub-journey of next Hook or object window.The hook of nearest installation is placed on the beginning of chain, and the hook installed the earliest is placed on finally, the first acquisition control namely added afterwards.
Windows does not require that the sequence of unloading of the sub-journey of hook must be contrary with erection sequence.Whenever having, a hook is unloaded, and Windows just discharges its internal memory taken, and upgrades whole Hook chained list.If program has installed hook, but just finished before not yet unloading hook, so system can automatically for it does the operation of unloading hook.
The sub-journey of hook is the call back function (CALLBACK Function) of an application program definition, can not be defined as the member function of certain class, can only be defined as common C function.In order to the event of surveillance or a certain particular type, these events can associate with a certain particular thread, also can be the events of all threads in system.
Summary of the invention
In order to overcome the above-mentioned shortcoming of prior art; the invention provides a kind of cloud dish access control method based on Hook technology; realize protecting file in appointment cloud dish drive by Hook technology; by the reading of the join protection file of configuration trusted process, trusted-extension name, copy, mobile and rename operating process; solve the safety problem of landing of cloud dish terminal document; operation all logs simultaneously in cloud dish drive, facilitate postaudit.
The technical solution adopted for the present invention to solve the technical problems is: a kind of cloud dish access control method based on Hook technology, comprises access control policy configuration module, cloud dish carry drive notification module and access control protection module, wherein:
Described access control policy configuration module is responsible for the cloud dish access control policy of acquisition management person's configuration, and cloud dish access control policy is issued to the access control protection module in each client;
The drive title of carry, after cloud dish client carry, is notified access control protection module by described cloud dish carry drive notification module;
Described access control protection module, according to the cloud dish access control policy received and drive title, is implemented to control to the file operation carried out in corresponding cloud dish drive;
Whether described cloud dish access control policy comprises: allow acquiescence PE executable file not need through monitoring, allow trusted process freely to copy; Configuration trusted process, only has trusted process just to allow access read-write cloud dish data; Configuration special extension, allows trusted process, in special circumstances, such extension name file copy is gone out cloud dish;
Described access control protection module comprises the control that the file operation carried out in cloud dish drive is implemented: tackle and resolve document creation on cloud dish drive, copy, move, to delete and rename operates, then judge whether the process performing these operations is trusted process, not that refusing operation, is judge further: cloud dish the corresponding interface is then called for the establishment of trusted process, deletion action; For the copying of trusted process, move operation, then determine whether trusted-extension name, be not, refuse, be, call cloud dish the corresponding interface; Rename for trusted process operates, and only allows trusted-extension name RNTO untrusted extension name, otherwise then refuses.
Compared with prior art, good effect of the present invention is:
1) only interception monitoring is carried out, the not operation of other drive of influential system to the cloud dish drive operation of carry in FTP client FTP;
2) only run trusted process operation cloud dish file, prevent trojan horse program from copying and mobile cloud dish data to this locality or network;
3) even if trusted process, if do not configure credible suffix, still data cannot be copied from cloud dish;
4) configurable strategy, convenient, flexible;
5) centralized policy management, the configuration of keeper's single-point can notify all clients;
6) protect important documents, prevent lawless person from stealing enterprise or state secret;
7) record access daily record, facilitates postaudit.
Embodiment
Based on a cloud dish access control method for Hook technology, comprise access control policy configuration module, cloud dish carry drive notification module and access control protection module, wherein:
Access control policy configuration module is responsible for gathering and issuing trusted process strategy and trusted-extension name strategy.Access control policy configuration module receiving management person configures the strategy of cloud dish access control, and is issued in each client.Specifically have, whether administrator configurations allows acquiescence PE executable file not need through monitoring, allows trusted process freely to copy; Configuration trusted process, only has trusted process just to allow access read-write cloud dish data; Configuration special extension, allows trusted process to copy such extension name file copy in special circumstances and goes out cloud dish; After collocation strategy completes, access control policy configuration module automatically by policy distribution to the access control protection module in each client.
Cloud dish carry drive notification module notice access control protection module needs the cloud dish drive of protection.After cloud dish client carry, need the drive title notifying access control protection module carry.
Access control protection module adopts Hook technology, implements to control, prevent illegal process from walking from cloud dish inediting copies data, realize the safety of landing of cloud dish data the file operation carried out in cloud dish drive.Access control protection module receives the drive title of the cloud dish client carry that cloud dish carry drive notification module sends, and the policy information that reception access control policy configuration module issues; Access control protection module tackle and resolve document creation on cloud dish drive, copy, move, the operation such as deletion, then judge whether the process performing these operations is trusted process, not that refusing operation, is judge further: cloud dish the corresponding interface is then called for the establishment of trusted process, deletion action; For the copying of trusted process, move operation, then determine whether trusted-extension name, be not, refuse, be, call cloud dish the corresponding interface; Rename for trusted process operates, and only allows trusted-extension name RNTO untrusted extension name, otherwise then refuses.
Operation principle of the present invention is:
Process communication technology notice access control protection module based on shared drive needs the drive of monitoring, and access control protection module only controls the drive of notice, does not affect the access read-write operation that operating system carries drive.
Realize the access control of cloud dish drive based on Hook technology, comprise document creation, copy, delete and the control of movement.Call CreateRemoteThread function and adopt threading far away, Hook Dll is implanted in each process, by Hook " contact " to the api function entrance point needing amendment, take over the various operations of each process to file.
The details of access control comprises:
1) strategy: only have trusted process can read and write arbitrarily cloud dish data at virtual disk; And except the file that strategy allows, this process does not allow cloud dish alternative document to copy, move to this domain; The operation in handwritten copy domains such as saving as wouldn't be controlled;
2) trusted process controls acquiescence control: allow PE formatted file to copy, move to this domain local; And log;
3) each trusted process control strategy: allow appointment extension name file copy, move to this domain local; And log;
4) program started in cloud dish, the process identical with trusted program;
5) not allowing the file designation of untrusted extension name is trusted-extension name file, prevents to copy, move to this domain local after file rename.
When implementing of the present invention:
1 service end
1.1 keepers log in access control policy configuring application program, configuration trusted process and the manipulable extension name of trusted process.After having configured, automatic distributing policy is to access control module.
2 clients
2.1 initiated access control module reception server distributing policies;
2.2 start cloud dish client, the drive title of notice access control module carry;
2.3 a certain process operation attempt read-write cloud dish data, and access control module judges whether this process is trusted process, is not refuse, is, judge further: then call cloud dish the corresponding interface for the establishment of trusted process, deletion action; For the copying of trusted process, move operation, then determine whether trusted-extension name, be not, refuse, be, call cloud dish the corresponding interface; Rename for trusted process operates, and only allows trusted-extension name RNTO untrusted extension name, otherwise then refuses.

Claims (3)

1. based on a cloud dish access control method for Hook technology, it is characterized in that: comprise access control policy configuration module, cloud dish carry drive notification module and access control protection module, wherein:
Described access control policy configuration module is responsible for the cloud dish access control policy of acquisition management person's configuration, and cloud dish access control policy is issued to the access control protection module in each client;
The drive title of carry, after cloud dish client carry, is notified access control protection module by described cloud dish carry drive notification module;
Described access control protection module, according to the cloud dish access control policy received and drive title, is implemented to control to the file operation carried out in corresponding cloud dish drive.
2. whether the cloud dish access control method based on Hook technology according to claim 1, is characterized in that: described cloud dish access control policy comprises: allow acquiescence PE executable file not need through monitoring, allow trusted process freely to copy; Configuration trusted process, only has trusted process just to allow access read-write cloud dish data; Configuration special extension, allows trusted process, in special circumstances, such extension name file copy is gone out cloud dish.
3. the cloud dish access control method based on Hook technology according to claim 2, it is characterized in that: described access control protection module comprises the control that the file operation carried out in cloud dish drive is implemented: tackle and resolve document creation on cloud dish drive, copy, move, to delete and rename operates, then judge whether the process performing these operations is trusted process, not that refusing operation, is judge further: cloud dish the corresponding interface is then called for the establishment of trusted process, deletion action; For the copying of trusted process, move operation, then determine whether trusted-extension name, be not, refuse, be, call cloud dish the corresponding interface; Rename for trusted process operates, and only allows trusted-extension name RNTO untrusted extension name, otherwise then refuses.
CN201410628420.4A 2014-11-10 2014-11-10 Cloud disk access control method based on Hook technologies Active CN104320409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410628420.4A CN104320409B (en) 2014-11-10 2014-11-10 Cloud disk access control method based on Hook technologies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410628420.4A CN104320409B (en) 2014-11-10 2014-11-10 Cloud disk access control method based on Hook technologies

Publications (2)

Publication Number Publication Date
CN104320409A true CN104320409A (en) 2015-01-28
CN104320409B CN104320409B (en) 2018-11-02

Family

ID=52375579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410628420.4A Active CN104320409B (en) 2014-11-10 2014-11-10 Cloud disk access control method based on Hook technologies

Country Status (1)

Country Link
CN (1) CN104320409B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550593A (en) * 2015-12-11 2016-05-04 北京奇虎科技有限公司 Cloud disk file monitoring method and device based on local area network
CN107547658A (en) * 2017-09-27 2018-01-05 国云科技股份有限公司 A kind of centralized cloud storage platform distributes the method with being connected cloud disk automatically
WO2021124465A1 (en) * 2019-12-17 2021-06-24 富士通株式会社 Information processing system, information processing terminal, and data access control program
CN114816646A (en) * 2022-06-30 2022-07-29 天津联想协同科技有限公司 Shortcut operation method, device, terminal and storage medium suitable for network disk drive letter
CN115150189A (en) * 2022-07-28 2022-10-04 深圳市瑞云科技有限公司 Method for automatically intercepting outgoing files based on enterprise private cloud disk

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035850B2 (en) * 2000-03-22 2006-04-25 Hitachi, Ltd. Access control system
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN103761482A (en) * 2014-01-23 2014-04-30 珠海市君天电子科技有限公司 Method for detecting virus program and virus program detecting device
CN104077244A (en) * 2014-07-20 2014-10-01 湖南蓝途方鼎科技有限公司 Process isolation and encryption mechanism based security disc model and generation method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035850B2 (en) * 2000-03-22 2006-04-25 Hitachi, Ltd. Access control system
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN103761482A (en) * 2014-01-23 2014-04-30 珠海市君天电子科技有限公司 Method for detecting virus program and virus program detecting device
CN104077244A (en) * 2014-07-20 2014-10-01 湖南蓝途方鼎科技有限公司 Process isolation and encryption mechanism based security disc model and generation method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550593A (en) * 2015-12-11 2016-05-04 北京奇虎科技有限公司 Cloud disk file monitoring method and device based on local area network
CN107547658A (en) * 2017-09-27 2018-01-05 国云科技股份有限公司 A kind of centralized cloud storage platform distributes the method with being connected cloud disk automatically
WO2021124465A1 (en) * 2019-12-17 2021-06-24 富士通株式会社 Information processing system, information processing terminal, and data access control program
CN114816646A (en) * 2022-06-30 2022-07-29 天津联想协同科技有限公司 Shortcut operation method, device, terminal and storage medium suitable for network disk drive letter
CN114816646B (en) * 2022-06-30 2022-11-11 天津联想协同科技有限公司 Shortcut operation method, device, terminal and storage medium suitable for network disk drive letter
CN115150189A (en) * 2022-07-28 2022-10-04 深圳市瑞云科技有限公司 Method for automatically intercepting outgoing files based on enterprise private cloud disk
CN115150189B (en) * 2022-07-28 2023-11-07 深圳市瑞云科技有限公司 Method for automatically intercepting file outgoing based on enterprise private cloud disk

Also Published As

Publication number Publication date
CN104320409B (en) 2018-11-02

Similar Documents

Publication Publication Date Title
CN104320409A (en) Method for controlling access to cloud disk on basis of Hook technology
EP3404948B1 (en) Centralized selective application approval for mobile devices
US10747719B2 (en) File system point-in-time restore using recycle bin and version history
US10326841B2 (en) Remote data securement on mobile devices
CN102902909B (en) A kind of system and method preventing file to be tampered
CA2617204C (en) Network security systems and methods
US9536083B2 (en) Securing data on untrusted devices
CN102202062B (en) Method and apparatus for realizing access control
US9959283B2 (en) Records declaration filesystem monitoring
US11768933B2 (en) System and method for protecting against ransomware without the use of signatures or updates
US8321860B2 (en) Local collector
RU2004135454A (en) SECURITY-related SOFTWARE INTERFACE
US11868495B2 (en) Cybersecurity active defense in a data storage system
CN104573530A (en) Security reinforcing system for server
US10503920B2 (en) Methods and systems for management of data stored in discrete data containers
US20120185444A1 (en) Clock Monitoring in a Data-Retention Storage System
US20170235965A1 (en) Prevention of a predetermined action regarding data
US20080301713A1 (en) Systems and methods for electronic evidence management with service control points and agents
US9552491B1 (en) Systems and methods for securing data
CN105631357A (en) System and method for protecting information security of mobile terminals
CN103051608B (en) A kind of method and apparatus of movable equipment access monitoring
JP2008102702A (en) Security management system
US20220121620A1 (en) Hardening system clock for retention lock compliance enabled systems
US9779237B2 (en) Detection of non-volatile changes to a resource
US11250150B2 (en) File synchronization and centralization system, and file synchronization and centralization method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 333, Yunhua Road, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.

CP03 Change of name, title or address