Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for finding malicious service provider of composite service in cloud system

A combined service and cloud system technology, applied in the field of computer security, can solve problems such as vulnerability to malicious attacks, unreal data processing, inability to accurately identify attackers, etc., and achieve the effect of restraining and limiting the scope of attack damage and suppressing partner attacks.

Inactive Publication Date: 2019-01-04
INNER MONGOLIA UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, cloud computing infrastructure is often shared among service providers, making them vulnerable to malicious attacks
For example, an attacker can pretend to be a legitimate service provider to provide fake service components, causing users to receive untrue data processing
Although the confidentiality and privacy protection issues have been extensively studied in previous studies, the service data integrity authentication issue has not been well resolved.
However, in a large multi-tenant cloud system, multiple malicious attackers may carry out cooperative attacks on some specific service functions.
Therefore, when there are a majority of malicious attackers, the method of detecting malicious behavior using majority voting cannot accurately identify the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for finding malicious service provider of composite service in cloud system
  • Method and device for finding malicious service provider of composite service in cloud system
  • Method and device for finding malicious service provider of composite service in cloud system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0044] First of all, it needs to be explained that SaaS (Software-as-a-Service, short for software as a service), with the development of Internet technology and the maturity of application software, a completely innovative software application model that began to emerge in the 21st century , the concept of SaaS cloud-based software as a service and service-oriented architecture allows application service providers to provide their applications through large-scale cloud computing infrastructure. For example, Amazon Web Services and Google AppEngine both provide a set of support for enterprise Application services for high-level applications and big data processing. Each service component provides specific data processing functionality, such as sorting, filtering, correlation, or data mining. Each service component can have one or more input ports, and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for searching a malicious service provider of a combined service in a cloud system. The method comprises the steps of inputting original data to a plurality of service providers with same function so that the plurality of service providers return data processing results; receiving the data processing results of the plurality of service providers, comparing the data processing results of the plurality of service providers, obtaining function consistency relationship and function inconsistency relationship of the plurality of service providers; and determining the malicious service provider according to the function consistency relationship and the function inconsistency relationship of the plurality of service providers. According to the method and the device provided by the embodiment of the invention, an attacker can be effectively disclosed, thereby finding the malicious service provider. Even a majority of malicious service providers exist, the attackers can be effectively determined. Furthermore coordinated attack can be restrained and attack damage range is restrained. Furthermore the method and the device do not require supporting of any specific hardware or security kernel. The method and the device has high practicability for the large cloud system.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method and device for searching malicious service providers of combined services in a cloud system. Background technique [0002] Cloud computing has become a cost-effective resource leasing model, which eliminates the need for users to maintain complex physical computing infrastructure by themselves. Software-as-a-service (SaaS) cloud systems (for example, Amazon Web Services (AWS) and Google AppEngine) are built on the concepts of software as a service and service-oriented architecture (SOA), which enable application service providers to Computing infrastructure implements their applications. Our work mainly focuses on data stream processing services. [0003] However, cloud computing infrastructure is often shared by service providers, which makes them vulnerable to malicious attacks. For example, an attacker can impersonate a legitimate service provider to prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L2463/146
Inventor 于磊
Owner INNER MONGOLIA UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products