Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for dynamically establishing secure connection of virtual host in cloud computing environment

A cloud computing environment and virtual host technology, applied in transmission systems, electrical components, etc., can solve problems such as illegal access to sensitive data resources, difficult maintenance and management of user virtual hosts, secure connections, and illegal access to sensitive information, etc., to achieve simple, efficient and cost-effective , Solve the effect of manual pre-configuration

Active Publication Date: 2013-04-17
XIAN UNIV OF POSTS & TELECOMM +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. There are large-scale user virtual hosts in the cloud computing environment. If user virtual host identity authentication is not performed, malicious virtual hosts will illegally access sensitive data resources in the cloud computing environment, resulting in illegal access to sensitive information
[0004] 2. Virtual hosts are manually established in advance and static IP addresses are set, and the establishment of secure connections between user virtual hosts is realized through configuration files. With the increase in the number of user virtual hosts and the change, deletion and creation of secure connections, Will make it difficult to maintain and manage secure connections between user virtual hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for dynamically establishing secure connection of virtual host in cloud computing environment
  • Method and system for dynamically establishing secure connection of virtual host in cloud computing environment
  • Method and system for dynamically establishing secure connection of virtual host in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The method and system for dynamically establishing a virtual host security connection in the cloud computing environment of the present invention will be described in detail below in conjunction with the accompanying drawings. In the description, numerous specific details are given to ensure a thorough understanding of examples of the invention.

[0027] figure 1 is a system block diagram according to an embodiment of the present invention.

[0028] figure 2 It is a diagram of internal modules of a security server according to an embodiment of the present invention.

[0029] like figure 1 and figure 2As shown, the trusted authentication server 4 under the cloud computing environment is connected to the virtual IP network 3, and the third-party trusted authentication server 4 includes a DHCP module 5 for managing the dynamic virtual IP address of the virtual host node of the user accessing the virtual IP network . A digital certificate authorization module CA6 for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for dynamically establishing secure connection of a virtual host in a cloud computing environment. According to the method and the system, in the cloud computing environment, nodes of a zero-credibility user virtual host are accessed into a virtual network, and a virtual IP (Internet Protocol) address is obtained through a credibility certification server; and the credibility certification server is used for carrying out strategy-based credible identity certification on the nodes of a source virtual host and a target virtual host, matching the security levels of the nodes of the source and target virtual hosts and assigning the type of an established secure connection protocol stack, and then, a source user virtual host can initiate secure connection establishment to a target user virtual host. According to the method and the system, the public online third-party credibility certification server is introduced in the cloud computing environment, so that the user virtual hosts with different service attributes and cross security domains dynamically establish the secure connection, and the problems that the conventional secure connection needs to be configured in advance, is established statically, is complicated in upgrading and maintenance, and the like are effectively solved. The method and the system have the advantages of simplicity, high efficiency, low cost and the like.

Description

technical field [0001] The invention relates to the field of communication and information security, in particular to a method and system for dynamically establishing secure connections between virtual hosts in a cloud computing environment. Background technique [0002] Establishing a secure connection between user virtual host nodes in a cloud computing environment is a major research topic. Traditional virtual host node secure connection establishment is often statically set manually through configuration files. In this mode, with virtual The growth of host scale, such as the creation of virtual hosts for new business types, virtual host migration, and virtual host withdrawal, will make it very difficult to maintain and manage secure connections to virtual hosts. There are some problems with traditional virtual host secure connection establishment: [0003] 1. There are large-scale user virtual hosts in the cloud computing environment. If user virtual host identity authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 朱志祥王茜任学强张磊王佩史晨昱刘盛辉赵伟
Owner XIAN UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More