Virtual machine communication data encryption method and system

A technology of communication data and encryption method, which is applied in the field of data security

Inactive Publication Date: 2016-01-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, how to strengthen the communication data isolation and security of virtual machines in the virtual network has become a major challenge for cloud computing applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine communication data encryption method and system
  • Virtual machine communication data encryption method and system
  • Virtual machine communication data encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The core of the present invention is to provide a virtual machine communication data encryption method and system to enhance the isolation of communication data between virtual machines of different tenants, thereby improving the transmission security of communication data between virtual machines.

[0034] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual machine communication data encryption method and system. The method comprises the following steps: acquiring communication data of a source-end virtual machine, and allocating a corresponding key to the communication data, wherein the communication data is an IP (Internet Protocol) message of the source-end virtual machine on a network layer; performing IPSec encryption and encapsulation operations on the communication data by using an allocated key; and transmitting the communication data being subjected to IPSec encryption and encapsulation to a destination-end virtual machine through a physical network card of a Host. Through adoption of the method and the system, encryption transmission of the communication data between the source-end virtual machine and the destination-end virtual machine is realized, and the aims of enhancing isolation of communication data among different tenant virtual machines and enhancing transmission security of the communication data among the virtual machines are fulfilled.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a virtual machine communication data encryption method and system. Background technique [0002] At present, in the cloud environment, virtual machines of different tenants are only isolated through VLANs in the virtual network, but the administrator of the cloud platform can monitor the network communication data of the tenant virtual machines on the network device (such as a bridge) of the computing node; Hackers who attack and obtain the superuser authority of the computing node can also monitor the network communication data of any tenant's virtual machine on the computing node. Therefore, how to strengthen the communication data isolation and security of the virtual machine in the virtual network has become a major challenge for cloud computing applications. [0003] The invention implements IPsec encryption on the network data packets of the virtual machine based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L29/06
Inventor 雷波董贵山王运兵侯建宁冷青松夏凡黄斌李林啸唐中乾
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products