Security control method of virtual machine

A technology of security control and virtual machine, which is applied in the field of cloud computing, can solve problems such as no binding and failure to meet the security requirements of cloud system users, and achieve the effect of meeting security requirements

Active Publication Date: 2013-02-13
GCI SCI & TECH
View PDF8 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the existing technology is that there is no binding between the virtual machine and the user, which cannot meet the security requirements of the cloud system user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method of virtual machine
  • Security control method of virtual machine
  • Security control method of virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0018] see figure 1 , is a schematic flowchart of user registration and key pair generation provided by the present invention.

[0019] The process of cloud system user registration and key pair generation includes:

[0020] S01. The cloud security authentication server receives the new user request sent by the administrator through the cloud management console, and the new user request includes the user name, email address of the user to be registered, and the nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security control method of a virtual machine. The method includes that a cloud management console receives a virtual machine establishing request sent by a user; a cloud control server receives the virtual machine establishing request forwarded by the cloud management console, selects a node controller according to a preset scheduling policy, and sends the virtual machine establishing request; and the node controller requests public key data in a key pair generated in advance by the user from a cloud security authentication server, builds a virtual machine source file, encrypts the virtual machine source file by using the public key data to obtain a virtual machine encrypted file, and returns virtual machine information and corresponding user information back to the cloud management console and the cloud security authentication server. According to an embodiment of the method, the public key data of the user is used for encrypting the configured virtual machine file, the user who builds the virtual machine can achieve decryption only through applying for private key data of the user who possesses the virtual machine when accessing the virtual machine, and binding of the virtual machine with the user can be achieved.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a method for controlling security of a virtual machine. Background technique [0002] Cloud computing is grid computing (Grid Computing), distributed computing (Distributed Computing), parallel computing (Parallel Computing), utility computing (Utility Computing), network storage (Network Storage Technologies), virtualization (Virtualization), load balancing ( Load Balance) and other traditional computer technology and network technology development fusion product. It aims to integrate multiple relatively low-cost computing entities into a perfect system with powerful computing capabilities through the network. Cloud computing centralizes all computing resources and automatically manages them by software without human participation. Enterprises only need to customize the corresponding services, and the cloud service provider or the cloud provides the required infrastructure, serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 吴文青吴海玲邓书芬
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products