Unlock instant, AI-driven research and patent intelligence for your innovation.

A security control method in cloud and virtual environments

A virtual environment, security control technology, applied in the Internet field

Inactive Publication Date: 2019-05-28
国网江西省电力有限公司信息通信分公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The latter two requirements require some new planning principles or technologies to implement, which pose challenges to current network security strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security control method in cloud and virtual environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0021] The invention provides a security control method in cloud and virtual environment. refer to figure 1 , the security control method under the cloud and virtual environment, comprising the following steps:

[0022] Step 101, research security authentication technology based on one-time password protocol;

[0023] Step 102, research virtual machine security protection technology, virtual network isolation technology and data isolation and access control technology in virtual environment;

[0024] Step 103, research virtual environment security application audit technology;

[0025] Step 104, researching and developing virtual environment access control technology and security device virtualization.

[0026] Aiming...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method in cloud and virtual environments. The security control method comprises the following steps of: researching a security authentication technology based on a one-time password protocol; researching a virtual machine security protection technology, a virtual network isolation technology and a data isolation and access control technology in a virtualenvironment; researching a virtual environment security application auditing technology; And researching a virtual environment access control technology and safety equipment virtualization research and development. According to the invention, authentication security in cloud and virtual environments cannot be ensured; The security problems that a virtual security domain is not effectively isolated, a virtual network cannot effectively monitor and access control, and data sharing storage resources are unauthorized to access are solved, cloud and virtual environment security protection technology research is carried out, and the security control method under the cloud and virtual environment is safe and efficient.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a security control method in cloud and virtual environments. Background technique [0002] Cloud and virtual environments put forward three requirements for network security: 1) To ensure traffic access control between different users or different services; 2) Network security policies can support members in computing clusters to join, leave or migrate flexibly; 3) Network security Policies can automatically migrate along with virtual machines. Among the above three requirements, the first requirement is the enhancement of the existing network security strategy. The latter two requirements require some new planning principles or technologies to implement, which pose challenges to current network security strategies. Contents of the invention [0003] In view of this, the purpose of the present invention is to propose a safe and efficient security control method in cloud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F9/455
Inventor 李敏王国欢于仕
Owner 国网江西省电力有限公司信息通信分公司