Supercharge Your Innovation With Domain-Expert AI Agents!

Access control method and system in cloud computing system

An access control and cloud computing technology, which is applied in the transmission system, electrical components, data exchange through path configuration, etc., can solve the problems of aggravating the security of cloud computing applications and the impact of information services

Inactive Publication Date: 2014-03-26
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2009, the cloud computing services of companies such as Google, Microsoft, and Amazon experienced major failures, which affected the information services of thousands of customers and further aggravated the industry's concerns about the security of cloud computing applications.
[0013] The development of cloud computing provides powerful redundant storage and fault-tolerant mechanisms, as well as more reliable data physical storage security, but there is a sufficiently secure solution in terms of access control. The security issues mentioned above are also access caused by control security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system in cloud computing system
  • Access control method and system in cloud computing system
  • Access control method and system in cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0064] figure 1 It is a schematic flowchart of an embodiment of a method for access control in a cloud computing system provided by the present invention. figure 1 Embodiments of the methods shown include:

[0065] Step 101, receiving a user's access request to the cloud computing system, wherein the access request includes the user's identity information;

[0066] The user's identity information may be the user's name or ID information.

[0067] Step 102: Determine the user's role in the cloud computing system according to the user's identity information, and q...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method and system in a cloud computing system. The method comprises: receiving an access request of the could computing system from a user, wherein the access request comprises identify information of the user; according to the identify information of the user, determining the role of the user in the could computing system, and according to the role of the user, checking the operation authority of the roll in the could computing system; according to the identity information of the user, determining resources accessible to the user in the could computing system; according to the operation authority of the roll of the user and the resources accessible to the user, obtaining an authorization certificate, wherein the authorization certificate records the user's operation authority over the accessible resources; and after obtaining the access request of the user, according to the authorization certificate of the user, controlling the access request of the user.

Description

technical field [0001] The invention relates to the field of computer applications, in particular to a method and system for access control in a cloud computing system. Background technique [0002] With the rise of cloud computing, the computer field is undergoing profound changes. my country's cloud computing service market is in its infancy, and cloud computing technology and equipment already have a certain foundation for development. The overall scale of my country's cloud computing service market is small, but the momentum of catching up is obvious. According to Gartner estimates, in 2011, my country accounted for less than 3% of the global cloud computing service market of about 90 billion US dollars, but the annual growth rate reached 40%. It is expected that the gap between my country and foreign countries in cloud computing will gradually narrow in the future. [0003] To sum up, cloud computing has the following characteristics: [0004] (1) Ultra-large scale: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04L12/28
Inventor 刘正伟张东亓开元
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More