Big data test field safety initialization method based on trusted third party

An initialization and big data technology, applied in the direction of electrical components, transmission systems, platform integrity maintenance, etc., can solve cloud platform security disputes, cloud provider difficult to detect, user data loss and other issues, to improve security and fairness reliability, data protection, and high-confidence effects

Active Publication Date: 2020-01-07
FUDAN UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Representative companies include Amazon, Tencent, Alibaba, etc. These large cloud service providers reduce IT investment and maintenance costs for enterprises by providing various cloud computing services, but the security issues of such cloud platforms has been controversial
The second problem comes from the cloud provider. The cloud provider is also worried that the cloud user's password is stolen or the user's access host is hacked, resulting in the loss of user data, and this loss is very important to the cloud provider. Difficult to detect because this loss is the result of normal user actions
[0004] According to the research conducted by the inventor of this application, the cloud servers provided by some large domestic cloud service providers all have certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data test field safety initialization method based on trusted third party
  • Big data test field safety initialization method based on trusted third party
  • Big data test field safety initialization method based on trusted third party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Such as image 3 The described invention is composed of a mirror image management device, an OpenStack cluster deployment management device, a security initialization management device, and a system integrity verification device. On the server, the OpenStack cluster deployment management device is installed on the cloud platform management server of the cloud service provider, and the security initialization management device and the system integrity verification device are installed on each virtual machine in the cloud environment.

[0058] As a software running on a trusted third-party server, the image management device can run in the background service mode, continuously receive the requirements collected from the cloud service provider for the big data operating environment in the sandbox, and use the official OpenStack project as required Diskimage-builder makes and packages the cloud image, and inserts scripts related to security initialization during the process;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of cloud computing resource management. The invention relates to a sandbox management system based on OpenStack. According to the cloud platform safety initialization method provided by the invention, safety initialization and safety delivery of various test sandboxes in a big data test field are realized by adding a trusted third party, so that the initial control right of the sandboxes is safely transferred to the trusted third party from a platform operator, and integrity verification of the sandboxes is realized. The method has the advantages that in thetraditional cloud service providing process, the trusted third-party platform independent of the cloud service provider is added, and the safety and fairness of the whole cloud service renting processare improved. By separating mirror image making and deployment from a management cluster and comparing a mirror image ID recorded by a trusted third party with a mirror image ID to be registered by acloud service provider, it is ensured that a mirror image file is not tampered and other functions are not added; by adding the initialization module and the integrity check module, safety initialization, safety delivery and later corresponding account management and authority management of the sandbox are guaranteed, and the sandbox cloud service behavior guarantee method is a cloud service behavior guarantee scheme supporting privacy protection.

Description

technical field [0001] The invention belongs to the field of cloud computing resource management and relates to a cloud platform security initialization method, in particular to an OpenStack-based sandbox management system. The invention aims to ensure the security initialization and safety of various experimental sandboxes related to transactions in a big data testing field Delivery, and the initial control of the sandbox is safely transferred from the platform operator to the relevant participants, and a trusted third party is especially proposed to ensure the security of the process. Background technique [0002] Since Google first proposed the concept of cloud computing in 2006, through cloud computing, computing resources and information can be allocated to users on demand. Information and resources are highly shared in cloud computing, which is considered to be the inevitable direction of next-generation computing. In recent years, cloud computing has developed rapidl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/53
CPCH04L67/10H04L63/123H04L67/1095G06F21/53H04L67/51
Inventor 王国平肖惠娟吴承荣
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products