Cloud resource authorizing method under cloud computing environment

A technology of cloud computing environment and cloud resources, which is applied in the field of cloud computing security, can solve problems such as lack, and achieve the effect of preventing random changes and protecting against loss

Inactive Publication Date: 2014-07-23
ECDATA INFORMATION TECHNOLOGY CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The common disadvantage of the current cloud resource management platform is that it lacks a legal authorization mechanism to determine which resources, including physical and logical resources, can be legally connected to the cloud computing platform and provide external services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud resource authorizing method under cloud computing environment
  • Cloud resource authorizing method under cloud computing environment
  • Cloud resource authorizing method under cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1, in the scenario where the cloud platform operator interacts with the cloud platform software and hardware vendors.

[0048] The authorization license generation module is deployed at the cloud platform software and hardware manufacturer, and the cloud resource authorization verification module is deployed at the cloud platform software and hardware manufacturer or cloud platform operator;

[0049] Such as figure 1As shown, when a new cloud resource needs to be added, an authorization step is performed. The authorization step is completed by an authorization license generation module set on the cloud resource platform. The authorization step includes the following steps:

[0050] Step 1. The resource adding party inputs the unique identification information of the cloud resources to be added to the cloud resource platform into the authorization license generation module;

[0051] The resource adding party is the cloud platform operator;

[0052] What is a...

Embodiment 2

[0066] Embodiment 2, in the scene where the cloud platform tenant interacts with the cloud platform operator.

[0067] Both the authorization license generation module and the cloud resource authorization verification module are deployed at the cloud platform operator.

[0068] Such as figure 1 As shown, when a new cloud resource needs to be added, an authorization step is performed. The authorization step is completed by an authorization license generation module set on the cloud resource platform. The authorization step includes the following steps:

[0069] Step 1. The resource adding party inputs the unique identification information of the cloud resources to be added to the cloud resource platform into the authorization license generation module;

[0070] The resource adding party is a cloud platform tenant;

[0071] What is added is software cloud resources, usually for software or software instances, and the unique identification information of cloud resources is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud resource authorizing method under a cloud computing environment. When new cloud resources need to be added, an authorization step is performed, an authorization licence generation module uses an encryption algorithm to generate secret keys and serial numbers according to unique identification information of the input cloud resources, a verification step is performed when the new cloud resources need to be used, a cloud resource authorization verifying module automatically detects verification files, if a verifying result is correct, the cloud resource authorization verifying module is used for decrypting the serial numbers of the cloud resources, and comparative verification is performed on decrypted information and real-time true information of the cloud resources. According to the cloud resource authorizing method under the cloud computing environment, a cloud platform operator can conduct validity verification on the cloud resources used by different lessees in a platform of the cloud platform operator through an authorization mechanism, it is ensured that the cloud resources are mutually isolated, a cloud platform software and hardware manufacturer can conduct use validity verification on products sold by the cloud platform software and hardware manufacture, and therefore a cloud computing service provider is prevented from changing the application range of the products at will, and the legitimate interests of the cloud computing service provider are protected against losses.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a cloud resource authorization method in a cloud computing environment. Background technique [0002] Cloud computing is a dynamic, scalable, and virtualized resource computing method, usually provided through the Internet, and users do not need to understand the details of the cloud. Cloud computing services include three layers, infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). Infrastructure as a service is the management of basic resources such as networks, hosts, and storage. Managed for user applications. [0003] In the cloud computing environment, the cloud computing resource management platform is mainly the management of the IaaS level, that is, the server, storage, network and other infrastructure are virtualized PCs, and a flexible resource pool is established to realize the automatic allocation of re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 倪巍尹雪蓉
Owner ECDATA INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products