Unlock instant, AI-driven research and patent intelligence for your innovation.

A security testing method, device, equipment and medium for cluster encrypted migration

A technology for security testing and clustering, which is applied in the field of security testing of cluster encryption and migration, can solve problems such as data leakage, and achieve the effect of increasing security and reliability

Active Publication Date: 2022-02-22
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] InCloud Sphere Enterprise Edition, the virtual machine hot migration (computing migration and whole machine migration) and offline migration (storage migration) use the TCP protocol by default. Data is not encrypted during the migration process, and the virtual machine can be captured through the network plaintext data, this migration method has the risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security testing method, device, equipment and medium for cluster encrypted migration
  • A security testing method, device, equipment and medium for cluster encrypted migration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0042] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used to distinguish two entities with the same name but different parameters or different parameters. It can be seen that "first" and "second" " is only for the convenience of expression, and should not be understood as a limitation to the embodiments of the present invention, and will not be described one by one in the subsequent embodiments.

[0043] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a security testing method for cluster encrypted migration. figure 1 A schematic block diagram of an embodiment of a secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security testing method for cluster encrypted migration, comprising: changing the migration protocol of computing nodes to be tested in the cluster from the TCP protocol to the TLS protocol, configuring the computing nodes to support the TLS protocol and enabling the TLS protocol to take effect; Protocol deployment CA certificate; create a virtual machine on any computing node of the cluster, and create the first text file containing memory test data and the second text file containing disk test data for the virtual machine; in the computing node where the virtual machine is created Run the packet capture command, and output the packet capture information obtained by the packet capture command to the third text file; migrate the virtual machine to the destination host, and search the first text file and the second text file in the third text file; according to whether it is possible Memory test data and disk test data to confirm the security of cluster encrypted migration. The invention also discloses a device, equipment and medium. The invention increases the security and reliability of cloud platform data.

Description

technical field [0001] The present invention relates to the technical field of data migration, and more specifically, to a security testing method, device, equipment and medium for cluster encrypted migration. Background technique [0002] InCloud Sphere Enterprise Edition, the virtual machine hot migration (computing migration and whole machine migration) and offline migration (storage migration) use the TCP protocol by default. Data is not encrypted during the migration process, and the virtual machine can be captured through the network plaintext data, this migration method has the risk of data leakage. [0003] Data encryption is one of the most important aspects of cyber defense and protection of sensitive data. In order to increase the security and reliability of cloud platform data and enhance core competitiveness, the version has added the function of supporting encrypted migration and using TLS protocol for virtual machine migration. The testing method of encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L43/08H04L9/40H04L9/08G06F9/455
CPCH04L43/08H04L63/0428H04L9/0825G06F9/45558G06F2009/45562G06F2009/4557
Inventor 程秀
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD