Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual machine access control system and method based on cloud computing environment

A cloud computing environment and access control technology, applied in the protection of internal/peripheral computer components, transmission systems, electrical components, etc., can solve problems such as system management program loopholes, and achieve the effect of isolation and crash prevention

Active Publication Date: 2014-06-25
ECDATA INFORMATION TECHNOLOGY CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, if the attacker breaks through the virtual machine and obtains all the control rights of the virtual machine, or there are loopholes in the system management program (Hypervisor), there will be many security problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine access control system and method based on cloud computing environment
  • Virtual machine access control system and method based on cloud computing environment
  • Virtual machine access control system and method based on cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0036] Such as figure 1 As shown, a virtual machine access control system based on a cloud computing environment, the control system includes: an identifier identification matching module 50, and a storage pool identification module 10 connected to it, a creation / opening resource pool module 20, an allocation / update identification Module 30 , identifier conversion module 40 and result output module 60 .

[0037] The above-mentioned storage pool identification module 10 , creation / opening resource pool module 20 , allocation / update identification module 30 , identifier conversion module 40 are sequentially connected; the above-mentioned result output module 60 is connected with the above-mentioned creation / opening resource pool module 20 .

[0038] Such as figure 2 As shown, when multiple virtual machines based...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine access control system and method based on cloud computing environment. The method comprises the steps of judging whether a mounting protocol of a virtual machine conforms to a mounting protocol of a physical resource server or not; judging whether a resource pool required by a command sent by the external virtual machine exists in a storage pool or not; if the resource pool exists, opening and decrypting the resource pool inside the storage pool; if the resource pool does not exist, creating and encrypting the required resource pool; creating the required resource pool and a corresponding safety sign, judging whether the safety sign of the resource pool conforms to the matching principle or not, and when the safety sign of the resource pool conforms to the matching principle, judging whether the attribute of the safety sign of the resource pool needs to be modified or not; opening and decrypting the existing resource pool; when decryption succeeds, judging whether the safety sign of an access process of the external virtual machine is matched with the decrypted safety sign or not, and calling a result output module. According to the virtual machine access control system and method based on the cloud computing environment, a host machine and the virtual machine can be isolated from each other according to the matching rate of the signs, the resource pool encryption method and the mounting protocol of the storage server.

Description

technical field [0001] The invention relates to the field of virtual machine access control in the computer field, in particular to a virtual machine access control system and a control method based on a cloud computing environment. Background technique [0002] Cloud computing is the product of the integration of traditional computer and network technologies such as distributed computing, parallel computing, utility computing, network storage, virtualization, and load balancing. Computer processes running in a cloud-based virtual environment are isolated from other virtual machines running on the same physical hardware. Each virtual machine can actually be stored on a physical hard drive, shut down and carried away for continued isolation and security. [0003] However, in practice, the above safety measures still cannot avoid the existence of some safety hazards. Generally, virtual machines share hardware on the machine, such as CPU, memory, disk, and network devices; on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F21/78H04L29/08
Inventor 邹丹丹
Owner ECDATA INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products