Cloud data center service subnet security management method and system

A cloud data center and security management technology, applied in transmission systems, electrical components, etc., can solve problems such as deployment, affecting data security of cloud data centers, and complexity of cloud data center security design, and achieve the effect of improving security

Inactive Publication Date: 2016-06-08
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since traditional physical hardware firewalls cannot be deployed inside physical hosts (also known as physical servers), they can only provide security protection for the network entrance of the cloud data center, but cannot provide security protection between different business subnets in the data center. function, affecting the security of data inside the cloud data center
[0004] The above challenges have brought great complexity to the security design of cloud data centers, and the existence of this contradiction has seriously affected the development of data centers and the requirements of enterprises for data center security, and has become a technical problem that needs to be solved urgently. Therefore, There is an urgent need for a new security management method for cloud data center business subnets to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data center service subnet security management method and system
  • Cloud data center service subnet security management method and system
  • Cloud data center service subnet security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The core of the present invention is to provide a security management method and system for a cloud data center service subnet, so as to realize the purpose of providing security protection functions for different service subnets in the data center, thereby improving the security of internal data in the cloud data center.

[0036] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data center service subnet security management method and system. The cloud data center service subnet security management method comprises the steps: according to service security requirements of each service subnet, determining a firewall rule corresponding to the service security requirements of each service subnet; by referring to the firewall rule corresponding to each service subnet, configuring a virtual firewall corresponding to each service subnet; by utilizing all configured virtual firewalls, performing security protection on access data of each service subnet; wherein the service security requirements of each service subnet are data access security requirements between a service subnet and another service subnet in a cloud data center. According to the cloud data center service subnet security management method and system, the virtual firewalls capable of being configured in the interior of a physical server are introduced; furthermore, each virtual firewall can be configured with the self corresponding firewall rule according to the service security requirements of different service subnets; therefore, a purpose that a security protection function is provided for different service subnets in the data center so as to improve the security of internal data in the cloud data center is implemented.

Description

technical field [0001] The invention relates to the technical field of cloud computing and firewall design, in particular to a security management method and system for a cloud data center service subnet. Background technique [0002] At present, with the rapid development of cloud computing and large-scale data centers, more and more enterprises and governments choose to rent cloud data center services. For example, an enterprise leases the services of a cloud data center to run its business and store all business data. These business data are related to the normal operation of the enterprise and even involve the core secrets of the enterprise. Once the key data of the cloud data center is illegally read or destroyed , will cause the core business of the enterprise to fail to operate normally, which in turn will bring irreparable losses to the enterprise. It can be seen that this brings great challenges to the security design and management of cloud data centers. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/20H04L67/10
Inventor 李丰启
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products