Unlock instant, AI-driven research and patent intelligence for your innovation.

User security management method in cloud computing platform

A cloud computing platform and security management technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as lack of managers or users, violation of security rules, etc., to prevent tampering or stealing user privacy.

Inactive Publication Date: 2017-11-24
南京加林系统工程技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The virtual machine monitor also provides a memory sharing method between virtual machines, which may be used by malicious virtual machines, and may also cause inexperienced administrators or users to violate security rules for sharing due to misconfiguration, or maliciously obtain user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User security management method in cloud computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0020] One aspect of the present invention provides a user security management method in a cloud computing platform. figure 1 It is a flowchart of a user security management method in a cloud computing platform according to an embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user security management method for a cloud computing platform. The method includes the steps that a management mode is decomposed by creating multiple management interfaces in a rule base, and multiple users are logically isolated based on role groups of a user zone. According to the user security management method for the cloud computing platform, security services are separated from a management zone, a cloud platform manager is prevented from tampering with or stealing privacy of users, and resource sharing among the users is flexibly controlled and managed.

Description

technical field [0001] The invention relates to cloud computing, in particular to a user security management method in a cloud computing platform. Background technique [0002] Due to the flexibility and low cost of cloud computing, more and more traditional services are deployed on cloud platforms. However, while cloud computing brings convenience to people, it also faces greater security challenges, which has even affected the rapid development of cloud computing. On the one hand, in the mode of multi-user sharing of computing resources, users' resources may be threatened by other malicious users; on the other hand, users worry that their resources will be threatened by the internal management of the cloud platform. The existing technologies are all completed under the condition that the entire virtual machine monitor is believed to be credible, but in fact the virtual machine monitor itself may also become the target of being attacked. The virtual machine monitor also p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/50
CPCG06F21/50
Inventor 高爽
Owner 南京加林系统工程技术有限公司