Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud host security reinforcement method and device, storage medium and electronic equipment

A cloud host, security technology, applied in the field of cloud computing security, can solve the problem of low security of cloud host

Pending Publication Date: 2021-09-10
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present disclosure provides a cloud host security hardening method, a cloud host security hardening device, a computer-readable storage medium, and an electronic device, thereby at least to a certain extent overcoming the problem of low security of the cloud host due to limitations of related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud host security reinforcement method and device, storage medium and electronic equipment
  • Cloud host security reinforcement method and device, storage medium and electronic equipment
  • Cloud host security reinforcement method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud host security reinforcement method and device, a storage medium and electronic equipment, and relates to the technical field of cloud computing security. The method comprises the following steps: acquiring application information of cloud host resources, and issuing a to-be-reinforced cloud host according to the application information; scanning the to-be-reinforced cloud host to obtain a security scanning report of the to-be-reinforced cloud host; reinforcing the to-be-reinforced cloud host according to the application information and the security scanning report to obtain a security reinforcing result; and verifying the security reinforcement result and outputting a corresponding reinforcement cloud host resource. In the opening process of the cloud host, the cloud host is subjected to security scanning, reinforcement, verification and delivery, so that the integration of distribution and security reinforcement of the cloud host is realized, the security of the cloud host can be improved, and the security reinforcement efficiency of the cloud host is improved.

Description

technical field [0001] The present disclosure relates to the technical field of cloud computing security, and in particular, to a cloud host security hardening method, a cloud host security hardening device, a computer-readable storage medium, and electronic equipment. Background technique [0002] With the rapid popularization and application of cloud computing technology, the security issues of cloud hosts are becoming more and more prominent. Cloud host is a virtualization technology that virtualizes multiple parts similar to independent hosts on a group of cluster hosts, which can effectively solve the defects of difficult management and weak business scalability existing in traditional physical host and virtual machine services. At present, the security protection technology for cloud hosts is still relatively backward, for example, the security protection standards are not uniform, and the security protection levels are uneven. Therefore, improving the security of clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 任航王行洲王金栋云婵李进
Owner CHINA TELECOM CORP LTD