Security system for cloud data center

A cloud data center and security system technology, applied in the security field, can solve problems such as failure to consider the security of the virtualization layer, hindering the development of the cloud computing industry, and lack of security architecture solutions for cloud data centers

Inactive Publication Date: 2015-10-21
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, cloud security has become a hot spot in cloud computing. However, complete cloud data center security architecture solutions are relatively scarce, and most of the security architecture solutions that have been applied still focus on traditional data center security, using traditional border security reinforcement. , such

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system for cloud data center
  • Security system for cloud data center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other if there is no conflict.

[0018] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.

[0019] Cloud data centers are usually divided into two parts: service and management. In terms of services, it mainly provides users with various cloud-based services, including three levels: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security system for a cloud data center, which is applied to security protection of the cloud data center. The security system comprises a conventional security layer, which is used for carrying out security protection on the periphery of the cloud data center through a boundary security reinforcing method; a virtual resource security layer, which is used for carrying out security protection on virtual resources in the cloud data center through isolating the virtual resources; and a virtual resource platform security layer, which is used for a security tool based on a virtual architecture to monitor a virtual machine to carry out security protection on a virtual resource platform in the cloud data center. According to the security system, security protection is fully carried out on the cloud data center from protection of the conventional security layer to protection of the virtual platform layer to the security protection of the virtual resource layer.

Description

technical field [0001] The invention relates to the technical field of security, in particular to a cloud data center security system. Background technique [0002] Cloud Data Center is a data center built to provide cloud computing services. The data center required for cloud computing comes from the Internet, but it evolves to an integrated platform. Therefore, the cloud computing data center is continuous and integral from infrastructure to computing and applications, and is interrelated and adaptable. [0003] At present, cloud security has become a hot field of cloud computing. However, there is a lack of complete security architecture solutions for cloud data centers, and most of the security architecture solutions that have been applied still focus on traditional data center security, using traditional boundary security reinforcement. , such as hardware firewalls, web application-level intrusion prevention systems (WAF, Web Application Firewall), authentication serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0209H04L63/0272H04L63/1458H04L67/02
Inventor 郭锋刘俊朋胡玉鹏于辉李新虎
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products