Method and system for implementing secure migration of virtual machine password information
A virtual machine migration and information security technology is applied in the implementation method and system field of virtual machine password information security migration, which can solve the problems that the migration of password equipment and key password information cannot be guaranteed, so as to ensure consistency and improve safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0035] The implementation method of virtual machine password information security migration of the present invention, the method is to deploy a monitoring module and a migration module on each computing node, each component in the OpenStack realizes interaction through a message queue, and the monitoring module monitors the information in the message queue at all times, when The migration module is triggered when the successful migration of the virtual machine is detected; after the migration module is triggered, the migration module sends an unbinding request to the key management system, and the key management system calls the corresponding interface to realize the migration of the virtual machine password information. Virtual machine migration can be performed manually or automatically.
[0036] as attached figure 1 As shown, the specific working process of the monitoring module is as follows:
[0037] (1) The monitoring module continuously monitors whether Nova's live_mig...
Embodiment 2
[0055] A system for safe migration of virtual machine password information based on Embodiment 1, the system includes a key management system, computer node 1 and computer node 2, and computer node 1 and computer node 2 are both deployed with a message queue, a listening module and a migration module, The key management system is used to manage password information, and the monitoring module is used to monitor messages in the message queue at all times, and is responsible for triggering the migration module, which is used to call the corresponding interface to complete the safe migration of virtual machine password information. The corresponding interface invoked by the migration module includes a key recycling interface, a device unbinding interface, a device binding interface and a key distribution interface.
[0056] In addition to computer underlying hardware, computer node 1 and computer node 2 also include cryptographic devices, and virtual machines may allocate virtual c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

