Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtualization protection method in cloud environment, and terminal

A cloud environment and virtualization technology, applied in the field of virtual machine security, can solve problems such as attacks, inability to meet security protection requirements, and inability to guarantee virtual machine security, and achieve the effect of centralized management and control, improving security, and ensuring security.

Inactive Publication Date: 2019-11-19
FUJIAN ETIM INFORMATION & TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, security has always been a major problem in cloud computing. The security of virtual machines under cloud computing cannot be guaranteed. The fragility and loopholes of virtual machines make it possible to tamper, copy, delete and modify configuration data or other data. In order to achieve the purpose of intruding on the virtual machine, or there is a situation where one virtual machine is invaded and then another virtual machine collapses to launch an attack. At the same time, the traffic between different virtual machines cannot be effectively monitored and protected, and traditional security hardware The equipment has gradually failed to meet the security protection requirements in the cloud computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization protection method in cloud environment, and terminal
  • Virtualization protection method in cloud environment, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Please refer to figure 1 , a virtualization protection method in a cloud environment, comprising the steps of:

[0063] S1. Dividing multiple virtual security domains under the cloud environment;

[0064] S2. Preset the security level of each virtual machine, and classify the virtual machines with the same security level and the same security requirements into the same virtual security domain;

[0065] S3. Configure the same security access control policy for each virtual machine in the same virtual security domain;

[0066] S4. Receive a resource access request sent by the client, where the resource access request includes the virtual machine where the resource is located and the corresponding virtual security domain;

[0067] S5. Determine whether the virtual machine in the resource access request is in the corresponding virtual security domain, and whether the resource to be accessed by the client is saved in the corresponding virtual security domain, and if so, se...

Embodiment 2

[0084] Please refer to figure 2 , a virtualization protection terminal 1 in a cloud environment, comprising a memory 2, a processor 3, and a computer program stored in the memory 2 and operable on the processor 3, and the processor 3 executes the Each step in the first embodiment is implemented as a computer program.

[0085] To sum up, the virtualization protection method and terminal in the cloud environment provided by the present invention divide multiple virtual security domains in the cloud environment, and classify virtual machines with the same security level and the same security requirements into the same domain. A virtual security domain, configure the same security access control policy for each virtual machine in the same virtual security domain, and perform real-time detection of the virtual security domain where the virtual machine is located through virtual machines, virtual firewalls and virtual network objects, When abnormal access is detected, it will be n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtualization protection method in a cloud environment, and a terminal. The method comprises the following steps: dividing a plurality of virtual security domains in the cloud environment; presetting the security level of each virtual machine, and classifying the virtual machines with the same security level and the same security requirement into the same virtual security domain; configuring the same security access control strategy for each virtual machine in the same virtual security domain; effective division of the virtual security domain in the cloud computing environment is realized; the virtual machines with the same security level and the same security requirement are classified into the same virtual security domain; the network access of the virtual security domain can be controlled; wherein each virtual machine in the virtual security domain adopts the same security access control strategy; security domain division management in a virtualization environment is realized, network traffic is monitored and protected in a virtualization level, the security of a virtual machine is ensured, a unified cloud security protection platform is constructed, centralized management and control of information security protection of a cloud computing platform are realized, and the security of the virtual machine in the cloud environment is improved.

Description

technical field [0001] The invention relates to the field of virtual machine security, in particular to a virtualization protection method and terminal in a cloud environment. Background technique [0002] Cloud computing has the characteristics of sharing, flexibility, and high efficiency. It has strong scalability and demand. It can coordinate many computer resources together, so that users can obtain unlimited resources through the network, and the resources obtained at the same time Not limited by time and space, cloud computing is widely used in people's lives and has been integrated into today's social life. [0003] However, security has always been a major problem in cloud computing. The security of virtual machines under cloud computing cannot be guaranteed. The fragility and loopholes of virtual machines make it possible to tamper, copy, delete and modify configuration data or other data. In order to achieve the purpose of intruding on the virtual machine, or ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F9/455G06F21/60
CPCG06F9/45558G06F21/604G06F2009/45587G06F2221/2141H04L63/0272H04L63/105H04L63/1408H04L63/20
Inventor 许元进胥景伟吴运晶
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products