Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computation system and application access method thereof

A technology of application access and cloud computing, applied in the field of cloud computing, can solve problems such as system crash, insecurity, and loss of user information, and achieve the effect of improving security and minimizing system exposure

Inactive Publication Date: 2013-09-18
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The above-mentioned application method, that is, all the applications used by the user are on a single machine (or virtual machine), this method has original inherent deficiencies in security:
[0015] For the host machine (the target machine where the application is installed), it will become unsafe as the number of applications increases
Because more applications are added, which means opening more system services or ports, etc., leaking more system resources to the outside world
At the same time, the probability of defects in the application itself (which may lead to information leakage or system crash) will increase greatly with the increase in the number of installed applications
[0016] For users, all applications on one machine (All-in-One) means that once a hacker has mastered this machine, he will gain control of all applications, including chat records, email records, credit card Account number, etc., in this case, means that user information will be completely lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computation system and application access method thereof
  • Cloud computation system and application access method thereof
  • Cloud computation system and application access method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical means and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0056] The basic idea of ​​the present invention is to discretize the application so as to improve the security of the cloud computing system.

[0057] Specifically, in the present invention, applications are classified, and different virtual machines are created for different types of applications, and the virtual machines are optimized for corresponding application types to minimize system exposure and improve system security. In the following, for the convenience of description, the optimized virtual machine running only one type of application is called APPHole.

[0058] figure 2 It is a specific flow chart of the application access method of the cloud computing system in the present invention, and the flow of the method may correspond to image 3 Implemented...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application access method of a cloud computation system, comprising the steps that different types of applications are installed in different virtual machines, a virtual machine (APPHole) which only runs one type of application is optimized to improve the safety performance according to the type of the application installed; a Hole agent establishes connection with the corresponding APPHole according to the demand of a user on the application, and provides the application of the connected APPHole for the user; after the user finishes running the application, the Hole agent disconnects from the APPHole, and the cloud computation system recovers the resource provided for the user in the APPHole. The invention also provides the cloud computation system. With the cloud computation system and the application access method thereof, the safety of the cloud computation system is greatly reinforced.

Description

technical field [0001] The invention relates to cloud computing technology, in particular to a cloud computing system and an application access method thereof. Background technique [0002] One form of cloud computing service is that the system provides a virtual machine for users to use. The virtual machine has an operating system pre-installed, and the user can use the virtual machine as if using a local computer. figure 1 It is a schematic diagram of the architecture of the existing cloud computing system. [0003] Such as figure 1 As shown, the cloud computing system includes the following components: [0004] 1. Product network: a network that users can access, and a user-oriented network provided to virtual machines. Users can connect to the virtual machine through the network and use the resources on the virtual machine. [0005] 2. Host or Hypervisor: physical machine, which provides the operating environment of the virtual machine and the virtual hardware simula...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455H04L29/06
Inventor 宋卓申骞牛立新
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products