Method for achieving data center security system based on cloud computation

A cloud data center, data center technology, applied in transmission systems, electrical components, etc., can solve the problems of omissions and losses in protection, complex relationship between applications and hardware, network and operating system, etc., to strengthen security and improve security. Effect

Inactive Publication Date: 2013-02-13
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the current security status of the data center, the data center is an information exchange hub that provides users with multiple network services such as network resources, server resources, host professional hosting, and broadband access. It is the most resource-intensive information system and the most frequent data exchange. The place is also a place where security incidents frequently occur. Any omissions in protection will lead to irreparable losses. In addition, with the deepening of Internet applications, the operating environment of data centers is transforming from traditional client / server to central servers connected to the network. The relationship between applications and hardware, networks and operating systems has become more and more complex, which also introduces many uncertain factors to data center security
The defense measures, information security mechanisms and security services of the data center are all facing huge challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving data center security system based on cloud computation
  • Method for achieving data center security system based on cloud computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The realization of the present invention mainly includes the following steps:

[0027] Step 1: Implement the "cloud security" control center: the controlled party runs a program that listens to the port and receives data packets, and the control party sends data packets to the controlled party port through its own port. According to the principle, two systems should be constructed, one is the controlling party "(cloud security" control center), and the other is the controlled party "(cloud security" submodule), the controlled party waits for the controller to send instructions and perform corresponding operations .

[0028] Step 2: Implement WCF communication. First, Client calls Service Request from Client to Service. Service starts to perform the operation. After the operation is completed, Service sends a Callback Request to Client and displays the result on the client side. After the Client completes the Callback Request operation, it will The Service sends a Callback R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for achieving a data center security system based on cloud computation. According to requirements of the cloud computation, the architecture of a data center security protection system architected by 'cloud security' includes that data of an enterprise can be distributed at different cloud data central terminals, each cloud data center is architected with a 'cloud security' submodule, an enterprise cloud computation data center is provided with a 'cloud security' control center which is responsible for monitoring real-time dynamics of each cloud data center, when potential safety hazard accidents occur, measures are immediately taken to perform remote stopping, the 'cloud security' control center is further responsible for formulating safety regulations and standards and sending the safety regulations and standards to the 'cloud security' submodule of each cloud data center, the 'cloud security' control center and the 'cloud security' submodules commonly maintain the safety of the enterprise computation data center, the safety of the data center is controlled through a visual interface, accordingly the safety of the data center is guaranteed, and the foundation of the development of data center safety system in the future is established.

Description

Technical field [0001] The present invention belongs to the field of cloud computing data center security. Based on the traditional data center security system, combined with the concept of cloud computing and "cloud security", an in-depth study of the data center security system under the new situation is carried out, and the design gives " The data center security protection system based on the “Cloud Security” architecture has been simulated in a laboratory environment using related technologies. The “Cloud Security” control center can control the security of the data center through an intuitive interface, and is in line with the “Cloud Security” "The sub-modules cooperate with each other to ensure and maintain the security of the data center. Background technique [0002] With reference to the OSI information security system framework and the national information security assurance system, the data center security protection system structure consists of a technical system, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 傅涛
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products