Tenant security isolation method under cloud computing

A security isolation and cloud computing technology, applied in electrical components, transmission systems, etc., can solve the problems of increasing the pressure of operation and maintenance personnel, the probability of errors, and many other problems, and achieve the effect of improving data security and rational planning

Active Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, ACL is more suitable for all routing protocols, not as pure as physical isolation, and maintenance personnel need to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tenant security isolation method under cloud computing
  • Tenant security isolation method under cloud computing
  • Tenant security isolation method under cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Introduced below are some of the various embodiments of the invention, intended to provide a basic understanding of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of protection.

[0019] The security isolation method for cloud computing tenants of the present invention mainly includes the following two steps:

[0020] (1) Isolation steps between tenants: Based on VRF, assign different IPs to different tenants to distinguish different tenants; and

[0021] (2) Isolation steps inside the tenant: For each tenant, design different PVLAN modes according to the DMZ, APP, and DB of the business.

[0022] Next, the inter-tenant isolation steps and the intra-tenant isolation steps are described in detail.

[0023] figure 1 is a schematic diagram showing the isolation steps between tenants in the security isolation method for cloud computing tenants of the present invention.

[0024] First, explain VRF (VPNRou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a tenant security isolation method under cloud computing, comprising a tenant isolation step: distinguishing different tenants based on a VRF (Virtual Routing & Forwarding Instance) so as to isolate tenants; and a tenant inner isolation step: for each tenant, utilizing the PVLAN (Private VLAN) technology to realize tenant inner security isolation. Accordingly, the tenant security isolation method under cloud computing can meanwhile realize external isolation and internal isolation, is applicable to cloud computing multi-tenant conditions, and can reasonably program and manage tenants, and improve data security.

Description

technical field [0001] The invention relates to cloud technology, in particular to a method for security isolation of tenants under cloud computing capable of ensuring the security of cloud computing. Background technique [0002] With the increasing number of cloud computing tenants day and night and the rapid development of the network, users put forward higher requirements for the security of network data communication, such as preventing hacker attacks, controlling the spread of viruses, etc., to ensure the relative security of the network to users . If the cloud computing data center is regarded as an ISP carrier-level network environment, how to isolate a large number of scattered tenants is an important issue to prevent security issues inside and outside the tenants. [0003] In the existing technology, in order to ensure the security of tenants, it is necessary to use security policies to ensure that unauthorized users can only access specific network resources, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L67/10
Inventor 张高磊刘国宝
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products