Securely accessing and processing data in a multi-tenant data store

作者: Szeto Kit Pang , Skucha Karl Ryszard , Chen Bilong , Au Ka Chun , Levine Eli

DOI:

关键词: PATH (variable)Data accessAccess controlData storeDatabaseVirtual computingData objectsComputer scienceData processingSet (abstract data type)

摘要: Methods, systems, and devices for data access processing are described. To set up secure environments (e.g., including machine learning), an control system may first receive approval from authorized user approver) granting to objects in a multi-tenant store. The determine tenant-specific paths retrieving the store, initialize number of virtual computing engines accessing data. Each engine be based on path(s) used by that engine, each include role defining or object types accessible engine. By requested according path prefixes roles, securely maintain separate different tenants only allow approved tenant

参考文章(23)
Venkata S. Evani, Beomsuk Kim, Ching-Wen Chu, Ajay Sondhi, Uppili Srinivasan, Multiple resource servers interacting with single OAuth server ,(2014)
Goran Saradzic, Xiao Hu Gao, Sunil Cherukuri, Path selection in a multi-service and multi-tenant secure cloud environment ,(2013)
Gareth Richards, Riaz Zolfonoon, Nirav Mehta, Secure cross-tenancy federation in software-as-a-service system ,(2013)
Yochai Konig, Eric Tamblyn, Chad David Hendren, Arnaud Lejeune, Simon Wright, Christopher Connolly, Multi-tenant based analytics for contact centers ,(2015)
Neil Shipp, David Hetherington, Gavin Ackroyd, Jiahui Wang, Anand Menon, Zhaoan Liu, Nick Voicu, Rajalakshmi Dani, Liqiang Zhu, Yi Zeng, Yu (Kyle) Huang, Guanghui He, Security and permission architecture ,(2015)
James Kawamoto, Ravinder Verma, Srikanth Devarajan, Vladimir Stepanenko, Multi-tenant cloud-based firewall systems and methods ,(2015)
Ariel Gordon, Benjamin Richard Vincent, Konstantin Ryvkin, Ross Peter Adams, Restricting Access to Public Cloud SaaS Applications to a Single Organization ,(2016)
Luke R. Meyer, Eric M. Wolinetz, Jeffrey Jon Cantrill, Access guards for multi-tenant logging ,(2016)