Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety control method and device for virtual machine mirror images

A technology of virtual machine mirroring and security control, applied in the field of cloud computing security, can solve problems such as insecurity and hidden dangers, and achieve the effect of preventing information leakage, preventing mirror deception, and ensuring legality

Inactive Publication Date: 2013-12-18
ZTE CORP
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention is proposed in view of the problem of potential insecurity when accessing virtual machine images in the prior art. Therefore, the main purpose of the present invention is to provide a security control method and device for virtual machine images to solve the above problems at least

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method and device for virtual machine mirror images
  • Safety control method and device for virtual machine mirror images
  • Safety control method and device for virtual machine mirror images

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, in this embodiment, the security control method of a virtual machine image may include the following steps:

[0032] S102. In the virtual machine system, a security policy is preset to protect the security of the virtual machine image during the entire life cycle; preferably, the above security policy may include but not limited to one of the following: during the running and dormancy stages of the virtual machine image , using an access control mechanism to prevent theft and modification; before the virtual machine image is started, a security check is used to prevent misconfiguration and deception of the pre-configured virtual machine image.

[0033] S104. During the running and dormant stages of the virtual machine image, an access control mechanism is adopted to prevent stealing and modification of the virtual machine image; before the virtual machine image is started, a security check is adopted to prevent misconfiguration and deception o...

Embodiment 2

[0067] Such as Figure 4 As shown, in this embodiment, the security control device for the virtual machine image may include:

[0068] 1) The setting unit 402 is used to pre-set security policies in the virtual machine system to protect the security of the virtual machine image during the entire life cycle; preferably, the above security policies may include but not limited to one of the following: During the running and dormant stages of the virtual machine image, an access control mechanism is adopted to prevent the theft and modification of the virtual machine image; before the virtual machine image is started, a security check is adopted to prevent misconfiguration and deception of the pre-configured virtual machine image.

[0069] 2) The control unit 404 is connected to the setting unit 402, and is used to adopt an access control mechanism during the running and dormant stages of the virtual machine image to prevent theft and modification; before the virtual machine image...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety control method and device for virtual machine mirror images. The method comprises the steps that in a virtual machine system, a safety strategy is preset and is used for protecting the safety of the virtual machine images in the whole life period; in the operation period and in the rest period of the virtual machine mirror images, an access control mechanism is adopted so as to prevent theft and modification conducted on the virtual machine mirror images; before the virtual machine images start, safety inspection is adopted to prevent mis-configuration and cheat to the preset virtual machine mirror images. The safety control method and device for the virtual machine mirror images solve the problem that potential safety hazards exist when the virtual machine mirror images are accessed, and ensures the access safety of a virtual machine mirror images.

Description

technical field [0001] The present invention relates to the field of cloud computing security, in particular to a security control method and device for a virtual machine image. Background technique [0002] Cloud computing describes the use of "resource pool" computing, network, information and storage services, applications, information and infrastructure. These components can be rapidly planned, provisioned, deployed, and decommissioned, and scaled up or down rapidly, providing an on-demand, utility-computing-like distribution and consumption model. Generally speaking, cloud computing service models can be divided into IaaS (cloud infrastructure as a service), PaaS (cloud platform as a service), and SaaS (cloud software as a service). [0003] Virtualization is one of the key technologies of cloud computing, and it is also one of the important elements of IaaS cloud services. There are many benefits brought by virtualization technology, including multi-tenancy and highe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06G06F9/455
Inventor 陈小华张恒生林兆骥张瑞山
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products