WO2014059860A1 - 一种提高云计算数据安全的方法及系统 - Google Patents
一种提高云计算数据安全的方法及系统 Download PDFInfo
- Publication number
- WO2014059860A1 WO2014059860A1 PCT/CN2013/084135 CN2013084135W WO2014059860A1 WO 2014059860 A1 WO2014059860 A1 WO 2014059860A1 CN 2013084135 W CN2013084135 W CN 2013084135W WO 2014059860 A1 WO2014059860 A1 WO 2014059860A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lba address
- virtual
- address space
- cloud computing
- actual
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000013500 data storage Methods 0.000 claims abstract description 59
- 230000001788 irregular Effects 0.000 claims description 3
- 238000002955 isolation Methods 0.000 description 10
- 239000003795 chemical substances by application Substances 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 238000000638 solvent extraction Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Definitions
- the present invention relates to the field of data security technologies, and in particular, to a method and system for improving cloud computing data security. Background technique
- cloud computing By transforming IT (Information Technology) resources into services (IT as a Service), cloud computing delivers to end-users in a pay-as-you-go business model, which greatly reduces user IT usage costs and accelerates IT resource delivery cycles. , improve operational efficiency.
- Cloud computing promotes the concentration and sharing of IT resources. According to its deployment and service categories, cloud computing can be divided into private cloud computing, public cloud computing and hybrid cloud computing. Due to the different types of IT services provided, cloud computing The following modes are embodied: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Storage as a Service (cloud storage, Storage as a Service) and so on.
- IaaS Infrastructure as a Service
- PaaS Platform as a Service
- SaaS Software as a Service
- Storage as a Service cloud storage, Storage as a Service
- cloud computing Although the user's IT cost can be reduced, it also makes the data security risk more concentrated in the cloud computing data center, which is reflected in the following aspects: 1) Data isolation and security issues in multi-tenant mode Public cloud computing data center, in multi-tenant mode, multiple tenants, especially the data of tenants who compete with each other, will cause certain security risks. Private cloud computing data centers also need to be used for various functional departments. The data between the two provides effective data isolation; 2) The hacker's illegal intrusion will lead to the leakage of important data; 3) The cloud computing data center administrator, especially the super administrator's human error or occupational compliance problem may lead to the leakage of user data, etc. Wait.
- cloud computing data security solutions can be broadly divided into two categories:
- One is for storage as a service (ie cloud storage), through logical level multi-tenant data isolation, Lai data encryption technology protects users' data security.
- the so-called logical level of isolation mainly through the metadata information stored in the cloud computing data center side, such as object-based storage system (OSD), typical implementation of EMC Atmos, Amazon S3 storage services, etc.;
- OSD object-based storage system
- level-level isolation although the data seen by different users after login is only the data they authorize, in order to protect data security, users usually need to encrypt the data and transmit it to the cloud computing data center.
- the other category is for cloud computing models other than storage as a service, such as software as a service (SaaS), infrastructure as a service (IaaS), platform as a service (PaaS), and so on.
- SaaS software as a service
- IaaS infrastructure as a service
- PaaS platform as a service
- the storage-as-a-service data security solution does not work because storage-as-a-service is mostly based on the Restful protocol rather than the SCSI-based protocol, accessing data in units of data objects or files, and data security.
- the so-called multi-tenant data physical level isolation is mainly realized by dividing the different LUNs by the cloud computing data center. Each user is assigned one or more exclusive physical LUN devices on the data center side, and the data is only stored on the physical LUN device, thereby achieving physical level isolation between user data, typically
- the solution is Netapp MultiStore.
- Physical level isolation can be guaranteed to a certain extent
- the performance and reliability of data access considering that in order to ensure performance, data is difficult to encrypt on the cloud computing side, and the risk of data security brought by cloud computing is unavoidable for cloud computing tenants.
- the service contract with the cloud computing service provider can reduce the above risks to a certain extent, it cannot be avoided.
- the illegal intruding user or the cloud computing data center administrator can still use the user data without the data owner's unauthorized authorization.
- the saved LUN device is illegally mounted on other terminals to obtain data.
- the existing cloud computing data security solution technology can not solve the data security problem of cloud computing modes other than storage as a service (especially IaaS, PaaS and SaaS), that is, 1 ⁇ in ensuring data security. ], taking into account the requirements of enterprise-class cloud computing applications such as data access performance and reliability. Summary of the invention
- the present invention provides a method for improving the security of the cloud computing data, the method comprising:
- the user establishes a device I information table for the physical LUN device available for the cloud computing service application instance; the user establishes a virtual LUN device, and sets a virtual LBA address space and an actual data storage LBA address space of the virtual LUN device according to the index information table. Corresponding rules;
- the user establishes and maintains a correspondence between the virtual LBA address space of the data access virtual LUN device and the actual data storage LBA address space of the specified cloud computing data center; and according to the corresponding relationship, obtains an external data read/write request pointing
- the virtual LBA address space corresponds to the storage location information of the actual data, completing the I/O redirection.
- the content of the index information table includes a LUN device global ID, a cloud computing data center ID, and a LUN device local ID.
- the cloud computing service application instance includes software as a service, infrastructure as a service, and peace. Taiwan is the service.
- the virtual LUN device is placed on the client or a trusted third party host.
- the step of establishing and saving the corresponding relationship specifically includes:
- the user correspondingly associates the virtual LBA address segment with the actual LBA address segment according to the corresponding rule, and performs a virtual LBA address in the virtual LBA address segment and an actual LBA address in the corresponding actual LBA address segment.
- the correspondence between the virtual LBA address space and the actual data storage LBA address space is established and saved.
- the plurality of LBA addresses are a plurality of consecutive, discontinuous, regular or irregular LBA addresses.
- the obtaining, according to the corresponding relationship, the storage location information of the actual data corresponding to the virtual LBA address space pointed by the external data read/write request, and the step of completing the I/O redirection includes:
- the LBA address of the actual data storage corresponding to each virtual LBA address in the virtual LBA address space is queried and obtained.
- the external data read/write request is forwarded to the actual data storage LBA address space according to the cloud computing data center and the LUN device local ID corresponding to each actual LBA address, and the data I/O request is redirected.
- the method further includes: the user updating the correspondence according to a preset frequency.
- the invention also provides a system for improving the security of cloud computing data, comprising:
- a setting module configured to set up a virtual LUN device, and set a corresponding rule of the virtual LBA address space of the virtual LUN device and the actual data storage LBA address space according to the index information table;
- Establishing a save module configured to establish, according to the corresponding rule, a correspondence between a virtual LBA address space of the data access virtual LUN device and an actual data storage LBA address space of the specified cloud computing data center;
- the redirection module is configured to obtain, according to the correspondence, the storage location information of the actual data corresponding to the virtual LBA address space pointed by the external data read/write request, and complete the I/O redirection.
- the establishing and saving module includes:
- a selection unit configured to select multiple LB A addresses as the smallest partitioning unit of the virtual LB A address space and the actual LB A address space;
- a dividing unit configured to divide the virtual LB A address space and the actual data storage LBA address space into an equal number of virtual LBA address segments and actual LBA address segments according to the minimum dividing unit;
- a correspondence establishing unit configured to: the virtual LBA address segment and the actual LBA address segment are in one-to-one correspondence according to the corresponding rule, and the virtual LBA address in the virtual LBA address segment and the corresponding actual LBA address segment thereof
- the actual LBA addresses in the one-to-one correspondence are corresponding, and the corresponding relationship between the virtual LBA address space and the actual data storage LBA address space is established and saved according to the above corresponding result.
- the redirection module includes:
- the first obtaining unit is configured to: according to the correspondence between the virtual LBA address space specified by the external data read/write request and the actual data storage LBA address space of the specified cloud computing data center, query and obtain corresponding to each virtual LBA address in the virtual LBA address space.
- a second acquiring unit configured to query and acquire a cloud computing data center corresponding to each actual LBA address and a corresponding local device ID of the LUN device according to the global ID of the LUN device in the index information table;
- the cloud computing data center and the LUN device local ID corresponding to each actual LBA address forward the external data read and write request to the actual data storage LBA address space to complete the redirection of the data I/O request.
- the system further includes an update module, configured to update the correspondence by the user according to a preset frequency.
- the invention realizes that the user data is isolated at the physical level of the cloud computing data center, so that the data owner can control the generation method, the saving method and the location information of the metadata, and takes into account the enterprise-level cloud computing service calculation for the I/O. Performance and reliability requirements, so that even if the cloud computing data center is illegally invaded, the physical LUN device where the user data is located will not be illegally mounted, and the user data will not be leaked, thus ensuring the security of the user data.
- DRAWINGS configured to update the correspondence by the user according to a preset frequency.
- FIG. 1 is a schematic diagram of correspondence between a virtual LBA address space and an actual data storage LBA address space according to an embodiment of the present invention
- FIG. 2 is an example 1 of accessing a virtual LUN device by a third-party cloud computing service according to an embodiment of the present invention
- FIG. 3 is an example 2 of accessing a virtual LUN device by a third-party cloud computing service according to an embodiment of the present invention
- a flow chart of methods for improving the security of cloud computing data
- FIG. 5 is a schematic structural diagram of a system for improving cloud computing data security according to an embodiment of the present invention. detailed description
- the embodiment of the invention provides a method for improving the security of the cloud computing data, which is established by the user and saves the cloud computing at the user end (or a trusted third party host)
- the service application instance data accesses the virtual LBA address space of the virtual LUN device and the corresponding data storage LBA address space of the cloud computing data center; and obtains the actual data corresponding to the virtual LBA address space pointed by the external data read/write request according to the correspondence relationship. Stores location information to complete I/O redirection of user data access.
- cloud computing and cloud computing service application examples in the embodiments of the present invention are applicable only to cloud computing modes other than storage as a service (or cloud storage), including software as a service (SaaS), and infrastructure.
- SaaS software as a service
- IaaS Infrastructure as a Service
- PaaS Platform as a Service
- an embodiment of the present invention provides a method for improving security of cloud computing data, including the following steps:
- Step 101 The user establishes an index information table for the physical LUN device available for the cloud computing service application instance.
- the user needs to apply the instance of the cloud computing service owned or leased by the user, and plan the physical LUN device used to store the actual data.
- These physical LUN devices can originate from cloud computing service providers (in their designated cloud computing data centers) or from third-party storage service providers (to ensure data access performance, they need to be built with cloud computing service providers) Good network connection), or It comes from the user's local data center.
- the third-party storage service provider may include a storage-as-a-service provider (ie, a cloud storage service provider), such as an Amazon S3 storage service; it should be noted that most of the current public cloud storage services are based on the Restful protocol.
- the user needs to establish an index information table of the global physical LUN device for the physical LUN device used by the cloud computing service application instance, as shown in Table 1.
- the index information table includes a LUN device global ID, a cloud computing data center ID, and a LUN device local ID.
- the LUN device global ID is one of the main reasons for establishing a correspondence between the virtual LBA address space and the actual data storage location on the future virtual LUN device.
- the LUN device global ID and the assigned cloud computing data center ID are local variables, and their scope is limited to the virtual LUN device of the user.
- the information in the index information table may not be ⁇ ], for example: 1 ⁇ ]
- a cloud computing data center ID is at user A It can be assigned 0, can be assigned 1 at User B, etc.
- This allocation method is good for protecting the privacy of data owner data.
- the index information table is usually stored on the client or a trusted third party.
- LUN device global ID Assigned cloud computing data center ID
- the global ID of the LUN device refers to the unique identifier used by the cloud computing data center LUN device in establishing the LBA address space correspondence, including its corresponding cloud computing.
- the data center ID (which may be the data center of the cloud computing service provider, or the third-party cloud storage service provider, or the data center local to the user) and the local ID of the LUN device at the cloud computing data center end.
- the local ID of the LUN device indicates that the LUN device is assigned a unique identifier in the specified cloud computing data center, such as the specified LUN unit number in the specified storage pool.
- the cloud computing data center LUN device can be implemented in different ways, which can be a real LUN device, or a virtual LUN device implemented by a storage virtualization technology, or a third-party cloud storage service provider.
- the storage space is displayed on the LUN device of the cloud computing service application instance after the conversion from the REST protocol to the SCSI protocol.
- the implementation of the embodiment of the present invention is performed on the physical LUN device for the data storage. No effect.
- Step 102 The user establishes a virtual LUN device, and sets a corresponding rule of the virtual LBA address space of the virtual LUN device and the LBA address space of the actual data according to the global physical LUN device index information table. The user establishes and saves according to the corresponding rule. Correspondence between the virtual LBA address space of the data access virtual LUN device and the actual data storage LBA address space of the specified cloud computing data center.
- the user needs to establish a virtual LUN device for accessing data by the cloud computing service application instance.
- the virtual LUN device can be placed on the client side, or its trusted third-party host (if cloud computing The service provider is authorized by the user, and the cloud computing service provider can also act as a third-party host.
- the LBA address space mapping rules can be manually set or set by the LBA address space corresponding rule setting engine. Specifically, in the process of establishing the correspondence between the LBA and the address space, the user can customize and select the corresponding rule according to the security requirements of the data stored on the virtual LUN device, for example, for data with lower security requirements, A regular algorithm is used as the corresponding rule. For example: After the actual LBA address set (that is, the set of all available actual LBA addresses) is established, the i-th virtual LBA address corresponds to the actual LBA address set.
- Step 1.2 Randomly sort all remaining actual LBA addresses to generate an actual LBA address set IbaSet of length (n+1-i);
- Step 1.3 Corresponding to the actual LBA address of the i-th virtual LBA address, the following operations are required:
- step 1.1 the method for generating a true random number in step 1.1 is already mature.
- the true random number generated in Applied Cryptography Protocols, Algorithms and C Source Code issued by the Machinery Industry Press, page 301 can be used. Methods such as using random noise, using computer clocks, CPU load, or network packet arrivals to generate true random numbers.
- the correspondence between the virtual LBA address space and the actual data storage LBA address space of the cloud computing data center needs to be established.
- the actual data storage LBA address space of the cloud computing data center may be derived from multiple physical LUN devices of multiple cloud computing data centers, and the cloud computing data centers are not limited to the local data center of the cloud computing service provider. , or a remote third-party cloud computing service provider's data center.
- Figure 1 shows the correspondence between the virtual LBA address space of the virtual LUN device accessed by the cloud computing service application instance and the actual data storage LBA address space of the cloud computing data center after the LBA address space correspondence rule is established.
- Virtual LUN device-side virtual LBA address corresponds to the actual data storage LBA address (virtual LUN device ID: virtual LBA address) (LUN device global ID: actual LBA address)
- the information about the correspondence between the virtual LBA address space of the virtual LUN device accessed by the cloud computing service application instance and the actual data storage LBA address space of the specified cloud computing data center is shown in Table 2, and the corresponding relationship information is used in the embodiment of the present invention. It is called metadata information. In a specific application, the metadata information may be selected to be stored on the client or a trusted third party hosting end.
- the correspondence between the virtual LBA address space of the virtual LUN device and the actual data storage LBA address space may occupy different storage spaces due to different corresponding rules of the user, if Metadata information can be used to save storage space and improve performance. You can use the following methods to create and save metadata information:
- Select multiple LBA addresses can be consecutive LBA addresses, such as 0x00000000, 0x00000001, 0x00000002, 0x00000003; or regular non-contiguous LBA addresses, such as: 0x00000000, OxOOOOOOOA, 0x00000014, ⁇ ; or irregular, discontinuous , the random LBA address) as the smallest partition unit of the virtual LBA address space and the actual LBA address space; according to the smallest partition unit, the virtual LBA address space and the actual data storage LBA address space are divided into equal numbers of virtual LBA address segments and The actual LBA address segment; the user associates the virtual LBA address segment with the actual LBA address segment one by one according to the corresponding rule, and performs the virtual LBA address in the virtual LBA address segment and the actual LBA address in the corresponding actual LBA address segment. Correspondingly, according to the above corresponding result, the correspondence between the virtual LBA address space and the actual data storage LBA address space is established and saved.
- Step 103 When the request for reading and writing external data reaches the virtual LBA address space specified by the virtual LUN device, according to the correspondence information of the LBA address space, the virtual LBA address space requested by the request is converted to the actual data storage location, and then completed. User data access I/O redirection.
- the correspondence between the virtual LBA address space of the virtual LUN device and the actual data storage LBA address space of the specified cloud computing data center is established, and then all arrives.
- the read and write I/O request of the virtual LUN address space of the virtual LUN device can be redirected to its corresponding actual data storage LBA address space.
- Step 2.1 An external (read or write) I/O request arrives at a specified virtual LBA address space of the virtual LUN device, the virtual LBA address space containing at least one virtual LBA address;
- Step 2.2 Query and obtain an LBA address of the actual data storage corresponding to each virtual LBA address in the virtual LBA address space according to the established LBA address space correspondence information table (such as Table 2); Step 2.3, according to the cloud computing data center end
- the index information table of the global physical LUN device (such as Table 1) queries and obtains the cloud computing data center ID corresponding to each actual LBA address according to the global ID information of the LUN device corresponding to each actual LBA address obtained in step 2.2. And its corresponding LUN device local ID;
- Step 2.4 Forward the I/O request to the actual data storage LBA address space obtained in step 2.2 according to the cloud computing data center ID and the LUN device local ID corresponding to each actual LBA address obtained in steps 2.2 and 2.3. This completes the redirection of data I/O requests.
- the I/O request initiator that arrives at the virtual LUN device may be an end user; or may be a non-cloud computing service application instance, such as a local or remote application instance; or may be a local (ie, a private cloud service) or Remote public cloud computing service application instance. Because the feasibility of the embodiment of the present invention depends on how to handle the I/O request on the virtual LUN device, and is independent of the initiator of the I/O request, so the following only initiates the local or remote cloud application application instance.
- the I/O request is taken as an example to further discuss the feasibility of the present invention.
- step 2.4 if a third-party public cloud storage service is adopted, the process of identity authentication and accounting of the third-party public cloud storage may be required to complete the data I/O request. Redirect.
- a local or remote cloud computing service application instance includes Software as a Service, Infrastructure as a Service, and Platform as a Service.
- the local cloud computing service application instance occurs in an internal controllable private network (intranet), that is, a private cloud computing service; and the remote cloud computing service application instance occurs in an external uncontrollable public network (internet), that is, a public cloud computing service. .
- the access of the virtual LUN device has two typical topologies: 1) an in-band architecture, which unifies the data and metadata access paths, that is, the data flow and the control flow are on the same line.
- the upper transmission as shown in Figure 2;
- Out-of-band architecture separates the data and metadata access paths, that is, the data stream and the control stream are transmitted separately without lines, as shown in Figure 3.
- Users can choose based on the security of data access and data access performance requirements.
- an agent program needs to be built on the cloud computing service application instance side, and the created virtual LUN device can be presented to the cloud computing service application instance to enable the cloud computing service application instance.
- the access to the data is transparent, and the agent can also access the metadata information server to obtain the metadata information corresponding to each virtual LBA address in real time, and can also forward the I/O request received by the virtual LUN device to the LBA of the actual data storage. Address space.
- the following describes the implementation flow of data read/write I/O redirection under two topologies.
- Step 3.1 After the virtual LUN is mounted by the agent, the cloud computing service application instance reads and writes the I/O request to the specified virtual LBA address space of the virtual LUN device (if it is a write I/O request, the request should also include The written data), the virtual LBA address space contains at least one virtual LBA address;
- Step 3.3 The metadata information server of the client (or the trusted third-party host) obtains the actual data storage LBA address set corresponding to the virtual LBA address space; and further accesses the actual LBA address space information according to the acquired data,
- the data read/write I/O request is sent to the actual data storage LBA address space of the specified cloud computing data center, the I/O redirection is completed, and the data read and write result is passed through the agent, and returned to the cloud computing service application instance (if yes Read I/O, then you need to return the read data to the cloud computing service application instance).
- the cloud computing data center in step 3.3 can be the data center managed by the cloud computing service provider, or the user local data center, or the data center of another storage service provider (such as a cloud storage service provider).
- Step 4.1 After the virtual LUN is mounted by the agent, the third-party cloud computing service reads and writes the I/O request to reach the specified virtual LBA address space of the virtual LUN device, and the virtual LBA address space includes at least one virtual LBA address;
- Step 4.2 The agent associated with the virtual LUN device accesses the metadata information server of the client (or the trusted third-party host) to obtain the LBA address set of the actual data storage corresponding to the virtual LBA address space.
- Step 4.3 The actual LBA address space information is accessed according to the data obtained in step 4.2, and the agent associated with the virtual LUN device sends the data read/write I/O request received by the virtual LUN device to the actual data of the specified cloud computing data center.
- Store the LBA address space complete the I/O redirection, and return the data read and write results to the cloud computing service application instance (if it is read I/O, then the read data needs to be returned to the cloud computing service application instance) .
- the cloud computing data center of the above embodiment is not a data center managed by a cloud computing service provider or a user local data center, that is, other cloud computing service providers
- the information exchanged between the cloud computing service application instance and the virtual LUN device is mainly metadata information, and the amount of information data is small, and has better performance than the in-band architecture.
- users can update the metadata information of virtual LUN devices (only for LBA addresses that are not read or written), regardless of the in-band or out-of-band architecture.
- the metadata information is updated.
- the virtual LUN device accessed by the cloud computing service application instance is placed on the cloud computing service provider end, as described above, if the cloud computing service application end-to-user data access network speed It can meet the requirements (such as 8Gbps fiber or 10Gigabit Ethernet), or users are willing to sacrifice some data access performance and reliability for data security.
- the virtual LUN device can also be placed on the user side. Since the implementation is basically the same, details will not be described here.
- the access object of the virtual LUN device is either a user of the user end, a local or remote application instance (non-cloud computing service application instance), or a local or remote cloud computing service application instance; in the cloud computing service application instance access mode Whether the virtual LUN device is placed on the user end or the third-party cloud computing server; the implementation mode of the data read/write I/O redirection is applicable to both the in-band architecture and the out-band architecture.
- an embodiment of the present invention further provides a system for improving security of cloud computing data, including: an establishing module, configured to establish an index information table for a physical LUN device available to a cloud computing service application instance;
- the setting module is configured to establish a virtual LUN device, and set a corresponding rule of the virtual LBA address space of the virtual LUN device and the actual data storage LBA address space according to the index information table; and establish a save module, configured for the user to establish according to the corresponding rule Corresponding relationship between the virtual LBA address space of the data access virtual LUN device and the actual data storage LBA address space of the specified cloud computing data center;
- the redirection module is configured to obtain storage location information of the actual data corresponding to the virtual LBA address space pointed by the external data read/write request according to the correspondence, and complete the I/O redirection.
- establishing a save module includes:
- a selection unit configured to select multiple LB A addresses as the smallest partitioning unit of the virtual LB A address space and the actual LB A address space;
- a dividing unit configured to divide the virtual LBA address space and the actual data storage LBA address space into an equal number of virtual LBA address segments and actual LBA address segments according to the minimum splitting unit;
- Correspondence relationship establishing unit configured for the user to correspondingly associate the virtual LBA address segment with the actual LBA address segment according to the corresponding rule, and perform the virtual LBA address in the virtual LBA address segment and the actual LBA address in the corresponding actual LBA address segment.
- One-to-one correspondence and according to the above corresponding results, establish and save the correspondence between the virtual LBA address space and the actual data storage LBA address space.
- the redirection module includes:
- the first obtaining unit is configured to: according to the correspondence between the virtual LBA address space specified by the external data read/write request and the actual data storage LBA address space of the specified cloud computing data center, query and obtain corresponding to each virtual LBA address in the virtual LBA address space.
- the second obtaining unit is configured to query and obtain the cloud computing data center corresponding to each actual LBA address and its corresponding LUN device local ID according to the global ID of the LUN device in the index information table;
- Orientation unit used to calculate the data center and LUN according to each actual LBA address
- the local ID is read, and the external data read and write request is forwarded to the actual data storage LBA address space to complete the redirection of the data I/O request.
- the system for improving cloud computing data security in this embodiment further includes an update module, configured for the user to update the correspondence according to a preset frequency.
- the method of the embodiments of the present invention is different from the method and system described in U.S. Patent No. 7,171,453, Virtual Private Volume Method and System.
- the US patent protects the privacy of the storage service consumer and provider by storing a LUN correspondence table in the middle layer, that is, the two parties are invisible to each other, and is not used to solve the problem of cloud computing data security.
- the technical solutions of the embodiments of the present invention are different.
- the purpose of the embodiments of the present invention is to solve the data security problem at the data center of the cloud computing system, and the precondition is that there is no trust relationship between the consumers (users) using the storage service and between the storage service provider and the storage service provider. It is a public cloud computing data center).
- the data access and transmission may be in a public network environment that is vulnerable to illegal attacks (public cloud computing services).
- the LBA address correspondence information between the virtual LUN device and the physical LUN device of the cloud computing data center is specified by the terminal user.
- the method is generated and saved to a location specified by the user.
- the traditional storage virtualization method implements the LBA address mapping information between the virtual LUN device and the physical LUN device in a private network environment that is trusted by each other. Because of this, traditional storage is used. Virtualization technology, whether it is host based storage virtualization, switch based storage virtualization, or storage device based storage virtualization. The created virtual LUN device can be (illegally) mounted to other hosts to access the data on it. Compared with the existing cloud computing data center end data security solution, the method for improving cloud computing data security provided by the embodiments of the present invention has the following advantages:
- the data owner can control the metadata (that is, the LBA address correspondence information between the virtual LUN device and the physical LUN device of the cloud computing data center side)
- the generation method, storage method and location local or trusted third-party host, so that even if the cloud computing data center is illegally invaded, the LUN device where the user data is located will not be illegally mounted, and the user data will not be Leakage, the security of user data is guaranteed.
- the LUN device corresponding to the user is in the cloud data center, and even if it is illegally mounted, the content cannot be obtained, and the security of the user data is guaranteed.
- each functional module and unit involved in this embodiment may be implemented by a computer program running on computer hardware, and the program may be stored in a computer readable storage medium, and the program is executed.
- the hardware refers to a server or a desktop computer, a notebook computer or the like including one or more processors and storage media; the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM) or random access memory (RAM), etc.;
- the computer program is implemented by a computer language not limited to (C++).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/129,980 US20140223576A1 (en) | 2012-10-17 | 2013-09-24 | Method and System for Improving the Data Security of Cloud Computing |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210393824.0A CN102882885B (zh) | 2012-10-17 | 2012-10-17 | 一种提高云计算数据安全的方法及系统 |
CN201210393824.0 | 2012-10-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014059860A1 true WO2014059860A1 (zh) | 2014-04-24 |
Family
ID=47484028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/084135 WO2014059860A1 (zh) | 2012-10-17 | 2013-09-24 | 一种提高云计算数据安全的方法及系统 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20140223576A1 (zh) |
CN (1) | CN102882885B (zh) |
WO (1) | WO2014059860A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015188246A1 (en) * | 2014-06-09 | 2015-12-17 | Royal Canadian Mint/Monnaie Royale Canadienne | Cloud-based secure information storage and transfer system |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9135460B2 (en) * | 2011-12-22 | 2015-09-15 | Microsoft Technology Licensing, Llc | Techniques to store secret information for global data centers |
CN102882885B (zh) * | 2012-10-17 | 2015-07-01 | 北京卓微天成科技咨询有限公司 | 一种提高云计算数据安全的方法及系统 |
US8769644B1 (en) * | 2013-03-15 | 2014-07-01 | Rightscale, Inc. | Systems and methods for establishing cloud-based instances with independent permissions |
WO2015100628A1 (zh) * | 2013-12-31 | 2015-07-09 | 华为技术有限公司 | 网元数据访问方法、装置以及网络管理系统 |
CN104778129B (zh) * | 2014-01-14 | 2021-08-27 | 中兴通讯股份有限公司 | 一种移动终端的虚拟存储的实现方法及装置 |
CN104660578B (zh) * | 2014-04-22 | 2017-12-19 | 董唯元 | 一种实现数据安全存储及数据访问控制的系统及其方法 |
US20150327064A1 (en) * | 2014-05-07 | 2015-11-12 | Mitake Information Corporation | Message transmission system and method for a structure of a plurality of organizations |
US20150326513A1 (en) * | 2014-05-07 | 2015-11-12 | Mitake Information Corporation | Message transmission system and method suitable for individual and organization |
CN105099869B (zh) * | 2014-05-07 | 2018-10-09 | 三竹资讯股份有限公司 | 具有多个组织结构的讯息传递装置与方法 |
CN105100043B (zh) * | 2014-05-07 | 2018-11-13 | 三竹资讯股份有限公司 | 适合个人及组织的讯息传递装置与方法 |
CN105893139B (zh) * | 2015-01-04 | 2020-09-04 | 伊姆西Ip控股有限责任公司 | 在云存储环境中用于向租户提供存储服务的方法和装置 |
US10505862B1 (en) * | 2015-02-18 | 2019-12-10 | Amazon Technologies, Inc. | Optimizing for infrastructure diversity constraints in resource placement |
US9667657B2 (en) * | 2015-08-04 | 2017-05-30 | AO Kaspersky Lab | System and method of utilizing a dedicated computer security service |
CN105554084B (zh) * | 2015-12-10 | 2018-12-07 | 杭州古北电子科技有限公司 | 生成一次性资源地址并与真实资源地址映射的方法 |
US10826973B2 (en) * | 2016-02-04 | 2020-11-03 | Carrier Corporation | Security system including business continuity provider |
US10412168B2 (en) | 2016-02-17 | 2019-09-10 | Latticework, Inc. | Implementing a storage system using a personal user device and a data distribution device |
CN106790082B (zh) * | 2016-12-22 | 2019-10-01 | 北京启明星辰信息安全技术有限公司 | 一种云应用访问控制方法及系统 |
CN106790112B (zh) * | 2016-12-26 | 2020-05-05 | 重庆高开清芯科技产业发展有限公司 | 一种集成轻量级区块链的节点操作系统及数据更新的方法 |
CN107277045A (zh) * | 2017-07-25 | 2017-10-20 | 合肥红铭网络科技有限公司 | 一种虚拟主机云端托管安全系统 |
US10372363B2 (en) | 2017-09-14 | 2019-08-06 | International Business Machines Corporation | Thin provisioning using cloud based ranks |
US10581969B2 (en) | 2017-09-14 | 2020-03-03 | International Business Machines Corporation | Storage system using cloud based ranks as replica storage |
US10372371B2 (en) * | 2017-09-14 | 2019-08-06 | International Business Machines Corporation | Dynamic data relocation using cloud based ranks |
US10721304B2 (en) | 2017-09-14 | 2020-07-21 | International Business Machines Corporation | Storage system using cloud storage as a rank |
CN110086840B (zh) * | 2018-01-26 | 2022-03-11 | 浙江宇视科技有限公司 | 图像数据存储方法、装置及计算机可读存储介质 |
US10824742B2 (en) * | 2018-03-28 | 2020-11-03 | Mitel Cloud Services, Inc. | Method and system for moving customer data to trusted storage |
US10536522B2 (en) * | 2018-04-30 | 2020-01-14 | EMC IP Holding Company LLC | Data storage system with LUN archiving to cloud using volume-to-object translation |
CN108809984B (zh) * | 2018-06-13 | 2020-09-08 | 广东奥飞数据科技股份有限公司 | 一种基于时域的云计算智能安全系统 |
CN109587254B (zh) * | 2018-12-11 | 2021-09-17 | 深圳市口袋网络科技有限公司 | 云服务器访问方法、装置、云服务器及存储介质 |
US11301396B2 (en) * | 2019-03-29 | 2022-04-12 | Intel Corporation | Technologies for accelerated data access and physical data security for edge devices |
CA3177385A1 (en) | 2020-06-29 | 2022-01-06 | Prabhu PALANISAMY | Policy-based genomic data sharing for software-as-a-service tenants |
JP2023532297A (ja) * | 2020-06-29 | 2023-07-27 | イルミナ インコーポレイテッド | セキュアな発見フレームワークを介した一時的なクラウドプロバイダクレデンシャル |
CN113411398B (zh) * | 2021-06-18 | 2022-02-18 | 全方位智能科技(南京)有限公司 | 一种基于大数据的文件清理写入及清理管理系统及方法 |
CN114422265B (zh) * | 2022-02-28 | 2024-05-03 | 海信集团控股股份有限公司 | 数据访问方法及服务器 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477444A (zh) * | 2008-12-29 | 2009-07-08 | 成都市华为赛门铁克科技有限公司 | 一种虚拟存储方法和设备 |
CN102088491A (zh) * | 2011-02-01 | 2011-06-08 | 西安建筑科技大学 | 一种面向分散式的云存储安全架构及其数据存取方法 |
CN102221982A (zh) * | 2011-06-13 | 2011-10-19 | 北京卓微天成科技咨询有限公司 | 块级虚拟化存储设备上实现重复数据删除的方法及系统 |
CN102882885A (zh) * | 2012-10-17 | 2013-01-16 | 北京卓微天成科技咨询有限公司 | 一种提高云计算数据安全的方法及系统 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7171453B2 (en) * | 2001-04-19 | 2007-01-30 | Hitachi, Ltd. | Virtual private volume method and system |
US6934799B2 (en) * | 2002-01-18 | 2005-08-23 | International Business Machines Corporation | Virtualization of iSCSI storage |
GB2422669A (en) * | 2005-01-31 | 2006-08-02 | Hewlett Packard Development Co | Article and a mobile networkable device for reading navigational data from an article |
CN101997929A (zh) * | 2010-11-29 | 2011-03-30 | 北京卓微天成科技咨询有限公司 | 一种云存储的数据存取的方法、装置及系统 |
CN102055797A (zh) * | 2010-11-29 | 2011-05-11 | 北京卓微天成科技咨询有限公司 | 一种云存储的数据存取的方法、装置及系统 |
IL210169A0 (en) * | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
US20120185618A1 (en) * | 2011-01-13 | 2012-07-19 | Avaya Inc. | Method for providing scalable storage virtualization |
CN102325179B (zh) * | 2011-09-07 | 2014-12-24 | 深圳市硅格半导体有限公司 | 移动存储设备及其共享云端内容的方法 |
CN102394923A (zh) * | 2011-10-27 | 2012-03-28 | 周诗琦 | 一种基于n×n陈列结构的云系统平台 |
CN102497428A (zh) * | 2011-12-13 | 2012-06-13 | 方正国际软件有限公司 | 远程存储系统及其进行远程存储的方法 |
-
2012
- 2012-10-17 CN CN201210393824.0A patent/CN102882885B/zh active Active
-
2013
- 2013-09-24 US US14/129,980 patent/US20140223576A1/en not_active Abandoned
- 2013-09-24 WO PCT/CN2013/084135 patent/WO2014059860A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477444A (zh) * | 2008-12-29 | 2009-07-08 | 成都市华为赛门铁克科技有限公司 | 一种虚拟存储方法和设备 |
CN102088491A (zh) * | 2011-02-01 | 2011-06-08 | 西安建筑科技大学 | 一种面向分散式的云存储安全架构及其数据存取方法 |
CN102221982A (zh) * | 2011-06-13 | 2011-10-19 | 北京卓微天成科技咨询有限公司 | 块级虚拟化存储设备上实现重复数据删除的方法及系统 |
CN102882885A (zh) * | 2012-10-17 | 2013-01-16 | 北京卓微天成科技咨询有限公司 | 一种提高云计算数据安全的方法及系统 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015188246A1 (en) * | 2014-06-09 | 2015-12-17 | Royal Canadian Mint/Monnaie Royale Canadienne | Cloud-based secure information storage and transfer system |
Also Published As
Publication number | Publication date |
---|---|
CN102882885A (zh) | 2013-01-16 |
CN102882885B (zh) | 2015-07-01 |
US20140223576A1 (en) | 2014-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014059860A1 (zh) | 一种提高云计算数据安全的方法及系统 | |
US11270006B2 (en) | Intelligent storage devices with cryptographic functionality | |
US10402578B2 (en) | Management of encrypted data storage | |
US10503917B2 (en) | Performing operations on intelligent storage with hardened interfaces | |
KR101966767B1 (ko) | 클라우드 서비스를 위한 암호화 키 관리 시스템 | |
US8769310B2 (en) | Encrypting data objects to back-up | |
KR101579814B1 (ko) | 피어투피어 오버레이 네트워크들에서 액세스 제어를 가능하게 하는 것 | |
CA3117713C (en) | Authorization with a preloaded certificate | |
US9147081B2 (en) | Method of access control to stored information and system thereof | |
US20080022120A1 (en) | System, Method and Computer Program Product for Secure Access Control to a Storage Device | |
US8948399B2 (en) | Dynamic key management | |
US8954760B2 (en) | Authentication of solution topology | |
WO2015196890A1 (zh) | 硬盘安全访问控制方法和硬盘 | |
WO2011147361A1 (zh) | 云计算中实现资源管理的方法、设备及系统 | |
US11930099B2 (en) | Implementing resilient deterministic encryption | |
Malik et al. | Privacy and security in mobile cloud computing | |
US11809589B2 (en) | Secure data structure for database system | |
JP2022007746A (ja) | 情報処理システム及び情報処理方法 | |
WO2017183089A1 (ja) | 計算機、計算機システム、およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 14129980 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13847598 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24/08/2015) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13847598 Country of ref document: EP Kind code of ref document: A1 |