Security monitoring method for protecting cloud system

A security monitoring and cloud system technology, applied in the computer field, can solve problems such as privacy leakage, cloud service providers or other official institutions cannot view, cloud system has no clear answer, etc., and achieve the effect of improving security

Inactive Publication Date: 2015-09-09
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when user information is stored on cloud system products, there is no clear law stipulating that cloud service providers or other official organizations cannot view this information, and what kind of punishment will be imposed on these privacy leaks
[0005] At present, most cloud system products only solve how to realize the cloud platform, but there is no clear answer on how to protect the security of the cloud system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method for protecting cloud system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so that implementers of the present invention can fully understand how the present invention uses technical means to solve technical problems, and achieve the realization process of technical effects and according to the above-mentioned realization process The present invention is implemented concretely. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0036] With the deepening of the application of cloud computing technology, users pay more and more attention to the security of cloud products while paying attention to the convenience of using cloud system products. Especially the security issues of the data that you put...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security monitoring method for protecting a cloud system. The method is characterized by comprising: a monitoring step of performing security monitoring on an application layer and / or basic layer of the cloud system based on a credible third-party authentication center to obtain and record operation executed specific to the cloud system; a validity verifying step of verifying the validity of the operation through the third-party authentication center in order to judge whether or not the operation is abnormal; and an alarming step of sounding an alarm when the operation is abnormal. According to the security monitoring method, multiple security monitoring is constructed specific to the application layer and the basic layer of the cloud system, so that illegal operation executed on the cloud system by illegal users can be checked effectively in time, and the system security degree is increased greatly.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safety monitoring method for protecting a cloud system. Background technique [0002] With the introduction of the concept of cloud computing and the continuous application of cloud technology, various cloud system products have also appeared in front of the public. Examples include Amazon Web Services (AWS), Google Cloud Platform, and Apple's ICloud. [0003] Cloud computing is based on virtualization, using virtual machines to fully utilize resources and provide services. Cloud computing can be divided into three levels of services: infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). With the deepening of the application of cloud computing technology, users pay more and more attention to the security of cloud products while paying attention to the convenience of using cloud system products. Especially the security issues of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/30
Inventor 李小勇高泽锋
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products