Container security system based on cloud computing

A security system and cloud computing technology, applied in the field of communication, can solve problems such as data confidentiality, integrity, usability damage, multi-tenant security threats, and difficulty in handling, so as to improve the security level, realize security isolation, and reduce the scope of influence Effect

Active Publication Date: 2019-09-13
GUANGZHOU VCMY TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Multi-tenant security threats: Containers of tenants with different security requirements may run on the same physical machine, which is difficult for traditional security measures to handle;
[0009] Privileged user problem: The separation of application system and resource ownership leads to the possibility of administrators accessing user data, thereby causing damage to data confidentiality, integrity, and availability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container security system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment 1 of the present invention provides a cloud computing-based container security system that utilizes cloud computing multi-tenancy, computing virtualization, storage virtualization, and network virtualization technologies to deploy containerized applications in a cloud computing environment. The container can be perfectly matched with the virtualization technology that can protect the virtual machine itself, and provide defense in depth for the host. Specifically, the implementation process of the cloud computing-based container security system provided in this embodiment depends on a cloud computing environment or an environment with a similar architecture, and provides security protection measures for container platform applications. Containerized applications are deployed in a cloud computing environment. All container applications and container resource interface APIs that provide external services are subject to the detection and control of the access layer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a container security system based on cloud computing, and belongs to the technical field of communication. An access layer security subsystem of the system comprises a network access security module, an API access security module and a WEB access security module. The security service subsystem comprises a host security service module, a network security service module, a data security module and an auditing module, and the resource layer security subsystem comprises a physical resource security module and a virtual resource security module. The system adopts network access security, API access security and WEB access security to realize multi-dimensional access security detection and control. Container deployment is transferred from a physical server to a virtual machine of cloud computing, so that the security problem of poor isolation of the container is solved, the influence range when the risk of the container occurs is reduced, and the security level of thecontainer is improved. Secure isolation of the container is achieved through multi-tenant isolation of cloud computing. Various security mechanisms are adopted, and the security of the container is realized by utilizing multiple tenants of cloud computing.

Description

Technical field [0001] The invention belongs to the field of communication technology, and specifically relates to a container security system based on cloud computing. Background technique [0002] At present, container-based virtualization technology has swept the entire software development community at lightning speed. After the application is containerized, it can be created faster, and is easier to maintain, and at the same time can get higher quality. [0003] At the same time, more and more application containerization is accompanied by the security issues of containerization. Containers, like virtual machines, are virtualization technologies, but compared to virtual machines, containers have more security issues to consider. Companies that use containers must take data privacy and security seriously, and evaluate when and where the containers play a role, as well as the risks. Although various manufacturers provide a variety of security products, there is no mature over...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/0272H04L63/10H04L63/1408H04L63/1433H04L63/1441
Inventor 熊常春成胜
Owner GUANGZHOU VCMY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products