Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing network server inner core safe access method

A cloud computing server and cloud computing network technology, applied in electrical components, transmission systems, etc., can solve the problems of insufficient credit level access control capabilities of server core reinforcement technology, and achieve the effect of ensuring communication security

Inactive Publication Date: 2013-12-18
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the complex environment of cloud computing, server kernel hardening technology is obviously insufficient for credit rating, distributed computing storage and Internet-based access control capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing network server inner core safe access method
  • Cloud computing network server inner core safe access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0035] This embodiment is applied in a cloud computing server, and access control is performed on resources at the driver kernel layer. Referring to the trusted operation grading standard of the secure operating system, UCON (usage control) access control technology is adopted. The basic elements of UCON include: subject, object authority and elements related to authorization: conditions (authorization rules) and obligations, conditions have trust, Resource reference counting, etc. When the system accesses cloud computing resources, it authorizes the accessed objects according to the user's trust degree, reference technology and mandatory access control rules, and performs operations such as read-only and disable.

[0036] In terms of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing network server inner core safe access, in particular to a cloud computing network server inner core safe access method. According to the cloud computing network server inner core safe access method, actual requirements of cloud computing safety are combined, and a next-generation network access control model (UCON) is utilized. The UCON not only has the capacity of a traditional access control model, but also integrates the ability of credible management and digital right management. The UCON access control model is used to control system resources in the storage and document layer. The access control model capable of being tailored in a custom-made mode is adopted on a server virtualization platform to protect the safety of cloud computing virtualization. In a network layer, and DDOS is attacked against, DNS safety communication monitoring is conducted. Illegal access is discovered and forbidden in time so as to ensure server communication safety.

Description

technical field [0001] The invention relates to the technical field of secure access to the core of a cloud computing network server, in particular to a method for secure access to the core of a cloud computing network server. Background technique [0002] Most of the servers under the cloud computing network are deployed in the cloud computing center for distributed collaborative computing and centralized management. In addition to bringing huge computing power for computing and applications, cloud computing also poses security threats to cloud computing center data. The service models of cloud computing include SaaS (software as a service), PaaS (platform as a service) and IaaS (infrastructure as a service). In addition to security threats such as malware intrusion, software vulnerabilities, etc., cloud computing security also faces risks such as privileged user access, data location, isolation or failure caused by data encryption, disaster data recovery, and privacy expo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈伟东王超徐峥邢希双
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products