Security control method used for cloud platform network

A technology of security control and cloud platform, applied in data exchange network, user identity/authority verification, digital transmission system, etc., can solve problems such as eavesdropping, and achieve high data transmission security effect

Active Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technical solutions have the following problems: (1) Since the control commands in the cloud network platform are usually transmitted in plain text, attackers in the network can attack the entire cloud network platform by tampering with the control commands ; (2) The attacker can try to instantiate some new flow rules into the flow table of the network device to allow forged new data flows to pass, and to eavesdrop on the flows in the cloud network platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method used for cloud platform network
  • Security control method used for cloud platform network
  • Security control method used for cloud platform network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 It is a flowchart of a security control method for a cloud platform network according to an embodiment of the present invention. Such as figure 1 As shown, the security control method for the cloud platform network disclosed in the present invention includes the following steps: (A1) When the controller of the cloud network platform sends the control data message, based on the preset security level value and the first current effective encryption key and a predetermined hash function to perform a hash operation on the application layer data in the control data message to obtain an operation result; (A2) attach the first part of the operation result to the control data message as authentication data , and use the second part of the operation result as the new first current valid key for the next hash operation; (A3) Send the control data message with the authentication data attached to the cloud A target node in the network platform, and then the target node v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security control method used for a cloud platform network. The security control method comprises the steps that: a controller of the cloud network platform performs hash operation on application layer data in a control data message based on a preset security level value, a first currently valid secret key and a predetermined hash function when sending the control data message, so as to obtain an operation result; a first part of the operation result serves as authentication data and is attached to the control data message, and the second part of the operation result serves as a new first currently valid secret key to be used in the next hash operation; and the control data message with the authentication data is sent to a target node in the cloud network platform, and the target node adopts an algorithm corresponding to the hash operation adopted by the controller to authenticate the authentication data. The security control method used for the cloud platform network disclosed by the invention has high security level.

Description

technical field [0001] The present invention relates to a security control method, and more particularly, to a security control method for a cloud platform network. Background technique [0002] At present, with the increasingly wide application of computers and networks and the increasing variety of services in different fields, it is becoming more and more important to control each node in the cloud platform network through a controller in a safe manner. [0003] In the existing technical solutions, the security control of the nodes in the cloud platform network is generally implemented in the following manner: using a security channel based on the SLL protocol as a security mechanism for data transmission between the controller and the cloud network nodes. [0004] However, the existing technical solutions have the following problems: (1) Since the control commands in the cloud network platform are usually transmitted in plain text, attackers in the network can attack the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/743H04L9/32H04L29/06H04L29/08
Inventor 杜学凯叶家炜祖立军严逸兴李戈
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products