Enhanced data leakage detection in cloud services
First Claim
Patent Images
1. A method for creating benchmark data to enhance data leakage protection in cloud based services, the method comprising:
- receiving, by one or more processors, user data;
monitoring, by the one or more processors, a user data transaction;
identifying, by the one or more processors, a plurality of attribute elements associated with the user data and the user data transaction;
monitoring, by the one or more processors, the plurality of attribute elements, wherein the plurality of attribute elements comprises dynamic content and variable lengths;
creating, by the one or more processors, benchmark data based on the identified plurality of attribute elements and user data gathered from a user data transaction;
determining, by the one or more processors, there are no discrepancies between the user data transaction and the benchmark data;
creating, by the one or more processors, policy attributes based on flagging one or more attribute elements associated with the user data and the user data transaction wherein the flagged attribute elements influence security policy;
sending, by the one or more processors, the policy attributes to an administrator for policy creation;
storing, by the one or more processors, the benchmark data.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments describing an approach to receiving user data, and monitoring a user data transaction. Monitoring a user data transaction. Identifying a plurality of attribute elements associated with the user data and the user data transaction. Creating benchmark data based on one or more identified attributes and user data gathered from a user data transaction, and storing, by the one or more processors, benchmark data.
9 Citations
17 Claims
-
1. A method for creating benchmark data to enhance data leakage protection in cloud based services, the method comprising:
-
receiving, by one or more processors, user data; monitoring, by the one or more processors, a user data transaction; identifying, by the one or more processors, a plurality of attribute elements associated with the user data and the user data transaction; monitoring, by the one or more processors, the plurality of attribute elements, wherein the plurality of attribute elements comprises dynamic content and variable lengths; creating, by the one or more processors, benchmark data based on the identified plurality of attribute elements and user data gathered from a user data transaction; determining, by the one or more processors, there are no discrepancies between the user data transaction and the benchmark data; creating, by the one or more processors, policy attributes based on flagging one or more attribute elements associated with the user data and the user data transaction wherein the flagged attribute elements influence security policy; sending, by the one or more processors, the policy attributes to an administrator for policy creation; storing, by the one or more processors, the benchmark data. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for creating benchmark data to enhancing data leakage protection in cloud based services, the computer program product comprising:
-
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive user data; program instructions to monitor a user data transaction; program instructions to identify a plurality of attribute elements associated with the user data and the user data transaction; program instructions to monitor the plurality of attribute elements, wherein the plurality of attribute elements comprises dynamic content and variable lengths; program instructions to create benchmark data based on the identified plurality of attribute elements and user data gathered from a user data transaction; program instructions to determine there are no discrepancies between the user data transaction and the benchmark data; program instructions to create policy attributes based on flagging one or more attribute elements associated with the user data and the user data transaction wherein the flagged attribute elements influence security policy; and program instructions to send the policy attributes to an administrator for policy creation. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A computer system comprising:
-
one or more computer processors; one or more computer readable storage devices; program instructions stored on the one or more computer readable storage devices for execution by at least one of the one or more computer processors, the stored program instructions comprising; program instructions to, receive user data; program instructions to, monitor a user data transaction; program instructions to, identify a plurality of attribute elements; program instructions to monitor the plurality of attribute elements, wherein the plurality of attribute elements comprises dynamic content and variable lengths program instructions to, create benchmark data based on one or more identified attributes and user data gathered from a user data transaction; program instructions to determine there are no discrepancies between the user data transaction and the benchmark data; program instructions to create policy attributes based on flagging one or more attribute elements associated with the user data and the user data transaction wherein the flagged attribute elements influence security policy; and program instructions to send the policy attributes to an administrator for policy creation. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification