Multitask security isolation system and method under virtual-real interconnected environment of cloud platform

A security isolation and cloud platform technology, applied in the information field, can solve problems such as poor isolation of virtual resources

Active Publication Date: 2017-12-01
XIDIAN UNIV
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the deficiencies in the above-mentioned prior art, and propose a multi-task security isolation system and method under the virtual-real interconnection environment of the cloud platform, which is us...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multitask security isolation system and method under virtual-real interconnected environment of cloud platform
  • Multitask security isolation system and method under virtual-real interconnected environment of cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] refer to figure 1 : A multi-task security isolation system in a cloud platform virtual-real interconnection environment, including a task flow identification module, an access control module, a task isolation module and a resource management module, wherein:

[0063] The task flow identification module is used to add a unique security label to the user's application task and the resources required by the user to apply for the task. Resources with the same security label belong to the same task; Get ready for quarantine.

[0064] The access control module is used to realize the identity authentication, information management and authorization of users according to the security label of the task, and access virtual resources and physical resources through the network at the same time;

[0065] The task isolation module is used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multitask security isolation system and method under a virtual-real interconnected environment of a cloud platform to solve the technical problem existing in the prior art that the unified management of multiple virtual and physical resources and the task security isolation cannot be implemented at the same time. The system comprises a task flow identification module for identifying different tasks, an access control module creating task resources according to the task identification, a task isolation module for security isolation between the tasks and between the resources, and a resource management module for unified management of the securely isolated resources. The implementing steps are as follows: the task flow label module adds a security label to a task and required resources thereof; the access control module verifies user identity and authority information and applies for the virtual and physical resources required by the task; the access control module performs network isolation and virtual resource isolation on the resources applied for the task; and the resource management module performs unified management on the securely isolated virtual and physical resources in the cloud platform and assigns the resources required by the task to the task.

Description

technical field [0001] The invention belongs to the field of information technology, and relates to a multi-task security isolation system and method in a cloud platform virtual-real interconnection environment, which can be used in the cloud computing platform to isolate private resources used by users. Background technique [0002] Cloud computing is a kind of distributed computing technology. Its most basic concept is to automatically split a huge computing processing program into countless smaller subroutines through the network, and then hand it over to a huge system composed of multiple servers. After searching, calculation and analysis, the processing results are sent back to the user. Through this technology, network service providers can process tens of millions or even billions of information in a few seconds, and achieve network services with the same powerful performance as supercomputers. Therefore, the cloud computing service platform is the development of appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCH04L61/103H04L63/0272H04L63/0807H04L63/101H04L67/10H04L67/2876
Inventor 朱辉宋超李晖肖瑞董健王刘飞肖伟龙
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products