Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for controlling user access permission in cloud platform

A technology of control method and access authority, applied in the field of cloud computing, it can solve the problems that resources cannot be effectively protected, and only users cannot be provided, so as to achieve the effect of double protection

Inactive Publication Date: 2013-07-03
OPZOON TECH
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Coarse-grained authorization control: The management interface of cloud services tends to provide an over-coarse-grained authorization control model. Therefore, standard security measures such as separation of duties cannot be implemented, because this method cannot only provide users with those Just enough authority to carry out their work;
[0008] 2. The system administrator is the authorizer of all user permissions. He has all permissions at the same time, so he can access the object resources of ordinary users, so that the specific object resources of ordinary users cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling user access permission in cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0031] The technical solution of the invention adopts the strategy of separating user authority and object access authority. User permissions are the various operation permissions assigned to each user by the system administrator or super user, and object access permissions are the object operation permissions assigned to other users by the object owner.

[0032] Such as figure 1 As shown, the control method of user access authority in the cloud platform proposed by the present invention comprises the following steps:

[0033] S1. The system administrator or super user assigns each user its user authority to object i,

[0034] The owner of object i assigns each user its object access rights to object i;

[0035] S2. When user j requests the cloud platform server to perform an operation on object i, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for controlling user access permission in a cloud platform. The method comprises the steps that S1. a system administrator or a super user distributes the user right to an object i for each user, and the owner of the object i distributes the object access right to the object i for each user; S2. when a user j requests a cloud platform server to conduct certain operation on the object i, the server judges whether the user j has the user right to conduct the operation on the object i or not, if so, go to step S3, and if not, reject the operation request of the user j; and S3. the server judges whether the user j has the object access right to the object i or not, if so, accept the operation request of the user j, and if not, reject the operation request of the user j. According to the method, the access of different users to the object can be controlled and separated in the cloud platform, and dual protection on the confidential information of a common user can be realized by utilizing a VPN (virtual private network).

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a method for controlling user access rights in a cloud platform. Background technique [0002] Cloud computing is the growth, usage and delivery model of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. With the help of virtualization technology, cloud computing can integrate computing resources distributed in different regions and realize the sharing of infrastructure resources. At the same time, users can use different terminal devices to realize access to network resources through standard applications, making access to network resources ubiquitous. [0003] While cloud computing and cloud platforms provide users with great convenience, the accompanying information security and privacy protection issues have always been the focus of the industry's attention and solutions. Among...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 周瑜
Owner OPZOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products