Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for safety management of cloud computing

A technology of security management and cloud computing, applied in the field of cloud computing, can solve the problem that the protection scheme is not suitable for the cloud computing environment

Active Publication Date: 2012-05-16
ZTE CORP
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of users with diverse needs and diverse usage environments, a single security level protection scheme is no longer suitable for cloud computing environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safety management of cloud computing
  • Method and system for safety management of cloud computing
  • Method and system for safety management of cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0037] The present invention aims at the business diversity of the cloud computing platform. The security levels required by different businesses may be different, and the security levels required by different users of the same business may also be different. According to the personalized security requirements from business categories and business users, Provide on-demand security solutions.

[0038] In order to realize on-demand supply of security capabilities, the present invention provides a cloud computing security management method, such as figure 1 As shown, the method includes:

[0039] Step 101, divide the cloud computing business system into security domains, divide the areas with the same type of security threat characteristics into the same security domain, and build corresponding security function models...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for safety management of cloud computing. The method comprises the steps as follows: dividing security domains for a cloud computing service system, namely, areas with the same security threat characteristic are classified in a same security domain, and establishing corresponding security function models in the divided security domains; and performing safety protection to the cloud computing service by utilizing the corresponding security function models according to security demands of a service in the divided security domains. By adopting the invention, fine-grained and personalized security solutions can be provided for different services and different users, so that the purpose of supplying security capability as required can be achieved.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to a cloud computing security management method and system. Background technique [0002] With the rapid development of computer technology, cloud computing is attracting more and more attention. Whether it is Internet manufacturers and operators, or communication manufacturers and basic network operators, they all show great concern for cloud computing. [0003] Cloud computing in a narrow sense refers to the delivery and use mode of Internet technology (IT, Internet Technology) infrastructure, which refers to obtaining the required resources through the network in an on-demand and easy-to-expand manner; cloud computing in a broad sense refers to the delivery and use of services The mode refers to obtaining the required services through the network in an on-demand and easy-to-expand manner. This kind of service can be related to IT and software, the Internet, or an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04L12/14
Inventor 陈剑勇林兆骥陈小华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products