Method and device for distributing cloud security resources

A resource and security technology, applied in the field of cloud security, can solve problems such as cloud security service demand differentiation

Active Publication Date: 2018-06-29
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for allocating cloud security resources, which are used to rationally allocate cloud security resources, realize full utilization of resource pools, and solve the problem of differentiated cloud security service requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for distributing cloud security resources
  • Method and device for distributing cloud security resources
  • Method and device for distributing cloud security resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1 of the present invention provides a method for allocating cloud security resources, see figure 1 , the method includes:

[0048] S110. Determine the security capability level corresponding to the service package according to the service package selected by the user;

[0049] S120. According to the security capability level determined in step S110, determine a resource group corresponding to the security capability level;

[0050] S130. Use the resource group determined in step S120 to provide security services for the user.

[0051]Wherein, the service package includes multiple labels, and the security capability level is only one of them, that is, the correspondence between the service package and the labels is a one-to-many correspondence.

[0052] Among them, the service package includes preset service requirements; specifically, the service requirements include the processing capacity required to handle security events (the size of the security capabi...

Embodiment 2

[0099] Embodiment 2 of the present invention provides a device for allocating cloud security resources, see figure 2 , the method includes:

[0100] The security level module 210 is configured to determine the security capability level corresponding to the service package according to the service package selected by the user; wherein, the service package includes preset service requirements, and the service requirements include the size of the security capability;

[0101] A resource group module 220, configured to determine a resource group corresponding to the security capability level according to the security capability level;

[0102] A service providing module 230, configured to use the resource group to provide security services for the user.

[0103] Specifically, the resource group module 220 is specifically used for:

[0104] If there are multiple resource groups corresponding to the security capability level, and the service package includes the user information,...

Embodiment 3

[0118] Embodiment 3 of the present invention provides a computing device, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the program, the implementation of A method for allocating cloud security resources described in Example 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for distributing cloud security resources, is used for reasonably distributing the cloud security resources and realizing the full utilization of a resourcepool, and solves the problem of the differentiation of cloud security service requirements. The method comprises the following steps: determining a security capability level corresponding to a servicepackage according to the service package selected by a user, wherein the service package includes a preset service requirement, and the service requirement includes the amplitude of the security capability; determining a resource group corresponding to the security capability level according to the security capability level; and using the resource group to provide security services for the user.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a method and device for allocating cloud security resources. Background technique [0002] Cloud computing uses virtualization technology to turn computing resources, storage, and networks into different resource pools, that is, to liberate resources such as CPU and memory of different devices and bring them together in CPU pools, memory pools, and network pools. When users generate When there is a demand, the configuration that can meet the demand is selected from the corresponding pool. The pooling of resources makes users no longer care about the physical location and existence form of computing resources, maximizing the efficiency of resources. [0003] Since traditional security processing solutions and security event processing capabilities can no longer meet the requirements of cloud tenants for data security, deploying a security zone with security devices...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L12/24H04L12/927H04L47/80
CPCH04L41/0896H04L47/805H04L63/107H04L67/025H04L67/1074H04L63/1458H04L63/145H04L63/1425H04L63/10
Inventor 张龙冯超罗金蓉
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products